Open Access Open Access  Restricted Access Subscription or Fee Access

Multimedia Content Protection by Biometrics-Based Scalable Encryption and Watermarking

K.P. Mohammed Basheer, K. Meena, Dr.K.R. Subramanian

Abstract


With the huge development of broadband network, distribution of multimedia by means of Internet is an uncomplicated method of communication and data exchange. Intellectual Property (IP) protection is a vital component in a multimedia broadcast system. Traditional IP protection methods can be classified into two major categories: encryption and watermarking. Content protection has turned out to be one of the most considerable and demanding problems of this field. This paper proposes a multimedia content protection framework that is dependent on biometric data of the users, a layered encryption/decryption scheme and watermarking. Scalable encryption algorithms result from a transaction between implementation cost and resulting performances. In addition, this approach generally aims to be exploited competently on a large range of platforms. The computational necessities and applicability of the proposed method are addressed. By utilizing the benefit of the nature of cryptographic schemes and digital watermarking, the copyright of multimedia contents can be protected. In this paper, the scalable transmission technique is utilized over the broadcasting environment for encryption. The embedded watermark can be thus extracted with high confidence.

Keywords


Multimedia, Security, Biometrics, Watermarking, Scalable Encryption

Full Text:

PDF

References


Sun, X., Wu, F., Li, S., Gao, W., Zhang, Y.-Q.: Seamless switching of scalable video bitstreams for efficient streaming. IEEE Transactions on Multimedia 6 (2004) 291–303

Almeida, J.M., Eager, D.L., Vernon, M.K., Wright, S.J.: Minimizing delivery cost in scalable streaming content distribution systems. IEEE Transactions on Multimedia 6 (2004) 356–365.

Wiegand, T., Sullivan, G.J., Bjntegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology 13 (2003) 560–576.

Parviainen, R., Parnes, P.: Large scale distributed watermarking of multicast media through encryption. Proceedings of the International Federation for Information Processing, Communications and Multimedia Security Joint Working Conference IFIP TC6 and TC11 (2001) 149–158.

Lim, Y., Xu, C., Feng, D.D.: Web-based image authentication using invisible fragile watermark. Conferences in Research and Practice in Information Technology (2002) 31–34.

Lan Juan; Huang Tie-Jun; Qu Jun-Hua; “A Perception-based Scalable Encryption Model for AVS Audio”, IEEE International Conference on Multimedia and Expo, Pp. 1778 – 1781, 2007.

Shahid, Z.; Chaumont, M.; Puech, W.; “Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns”, 16th IEEE International Conference on Image Processing (ICIP), Pp. 1273 – 1276, 2009.

Mingyu Li; Xiaowei Yi; Hengtai Ma; “A scalable encryption scheme for CCSDS image data compression standard”, IEEE International Conference on Information Theory and Information Security (ICITIS), Pp. 646 – 649, 2010.

Zhe-Ming Lu; Dian-Guo Xu; Sheng-He Sun; “Multipurpose image watermarking algorithm based on multistage vector quantization”, IEEE Transactions on Image Processing, Vol. 14, No. 4, Pp. 822 – 831, 2005.

F. Bao, Q. Sun, J. Hu, R. H. Deng, J. Wu, “Copyright protection through watermarking: towards tracing illegal Users”, The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS’98), 4-6 November 1998, Melbourne, Australia, 1998.

I.J.Cox, J.P.M.G.Linnartz, “Some general methods for tampering with watermarks”, in IEEE international Conference on Image Processing”, 1997.

S.Craver, N. Memon, B. Yeo, M. Yeung, “Can invisible watermarks resolve rightful ownership”, IBM Research Report, RC 20509, July 25, 1996.

J. Zhao and E. Koch, “Embedding robust label into images for copyright protection”, Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21-25, 1995.

F. Bao, R. Deng, Y. Han, A. Jeng, D. Narasimhalu, T. Nagir, “Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults”, The Second Workshop on Secure Protocols, Paris, April, 1997, LNCS, Springer-Verlag, 1997.

L. Tang, “Methods for Encrypting and decrypting MPEG video data efficiently”, Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.

U. Uludag and A. Jain. Multimedia content protection via biometricsbased encryption. In Proc. IEEE International Conference on Multimedia and Expo (ICME2003), Baltimore, MD, 3:237–240, 2003.

U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain. Biometric cryptosystems: Issues and challenges. IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, 92(6):948–960, 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.