Multimedia Tools and Applications

, Volume 52, Issue 2–3, pp 529–549 | Cite as

A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting

Article

Abstract

Digital Rights Management (DRM) of videos is an important issue nowadays. Considering that H.264/AVC videos will be widely used in various applications, we propose a practical design, which combines the methodologies of selective encryption and fingerprinting, for effective DRM of H.264/AVC streaming videos. A selective encryption scheme is first presented to scramble the video content by encrypting a small amount of data in the compressed bit-stream. The scrambled video is H.264-compliant to reduce the complexity of decoder since it can still be played without triggering errors in the decoding process. A fingerprinting scheme is then introduced to provide further protection. We extract a reasonable amount of data from the video and embed the watermark acting as the fingerprint of the video recipient. To acquire the high-quality video for viewing, the user has to decrypt the video obtained from a video server and then combine it with the watermarked data provided from a user information server. The resulting viewable video is thus fingerprinted to deter the user from illegally redistributing the content. Experimental results will demonstrate the feasibility of the proposed approach.

Keywords

Selective encryption H.264/AVC Digital watermark Fingerprinting Digital rights management Trailer tracking 

References

  1. 1.
    Anderson R, Manifavas C (1997) Chamleon: a new kind of stream cipher. In: Lecture notes in computer science, fast software encryption, pp 107–113Google Scholar
  2. 2.
    Bergeron C, Lamy-Bergot C (2005) Compliant selective encryption for H.264/AVC video streams. In: IEEE 7th workshop on multimedia signal processing, Shanghai, China, pp 1–4Google Scholar
  3. 3.
    Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673–1687CrossRefGoogle Scholar
  5. 5.
    Jeon B, Ahn J, Shim H, Choi I (2004) Digital video scrambling method using intra prediction mode. Lect Notes Comput Sci 3333:386–393CrossRefGoogle Scholar
  6. 6.
    Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG (2003) Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264 | ISO/IEC 14496-10 AVC). ITU-T, Doc. JVT-G050r1Google Scholar
  7. 7.
    Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92(6):918–932CrossRefGoogle Scholar
  8. 8.
    Lemma A, Katzenbeisser S, Celik M, van der Veen M (2006) Secure watermark embedding through partial encryption. In: International workshop on digital watermarking, Jeju Island, Korea, pp 433–445Google Scholar
  9. 9.
    Lian S, Liu Z, Ren Z (2005) Selective video encryption based on advanced video coding. In: Pacific-rim conference on multimedia (PCM), Jeju Island, Korea, pp 281–290Google Scholar
  10. 10.
    Lian S, Liu Z, Ren Z, Wang H (2006) Secure distribution scheme for compressed data streams. In: IEEE conference on image processing, ICIP, Atlanta, GA, pp 1953–1956Google Scholar
  11. 11.
    Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774–778CrossRefGoogle Scholar
  12. 12.
    Mian C, Jia J, Lei Y (2007) An H.264 video encryption algorithm based on entropy coding. In: The third international conference on intelligent information hiding and multimedia signal processing, IIHMSP, Kaohsiung, Taiwan, vol 2, pp 41–44Google Scholar
  13. 13.
    Park S-W, Shin S-U (2008) Efficient selective encryption scheme for the H.264/scalable video coding(SVC). In: The fourth international conference on networked computing and advanced information management, Gyeongju, Korea, vol 1, pp 371–376Google Scholar
  14. 14.
    Parnes P, Parviainen R (2001) Large scale distributed watermarking of multicast media through encryption. In: IFIP international conference on communications and multimedia security issues of the new century, pp 17–20Google Scholar
  15. 15.
    Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In: 6th ACM international multimedia conference, Bristol, UK, pp 81–88Google Scholar
  16. 16.
    Shi T, King B, Salama P (2006) Selective encryption for H.264/AVC video coding. In: Proceedings of the SPIE, security, steganography, and watermarking of multimedia contents VIII, San Jose, CA, pp 461–469Google Scholar
  17. 17.
    Spinsante S, Chiaraluce F, Gambi E (2005) Masking video information by partial encryption of H.264/AVC coding parameters. In: The 13th European signal processing conference, Antalya, TurkeyGoogle Scholar
  18. 18.
    Tang L (1996) Methods for encrypting and decrypting MPEG video data efficiently. In: Fourth ACM international multimedia conference (ACM) multimedia, Boston, MA, pp 219–230Google Scholar
  19. 19.
    Wang J, Fan Y, Ikenaga T, Goto S (2007) A partial scramble scheme for H.264 video. In: The 7th international conference on ASIC (ASICON), Guilin, China, pp 802–805Google Scholar
  20. 20.
    Yen J-C, Guo J-I (1999) A new MPEG encryption system and its VLSI architecture. In: IEEE workshop on signal processing systems, Taipei, Taiwan, pp 430–437Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Central UniversityJhongliRepublic of China

Personalised recommendations