Definition:Multimedia data needs to be protected from unauthorized duplication and consumption, from unauthorized disclosure and misuse, and from unauthorized use and exploitation.
Introduction
Multimedia can be defined as a combination of different types of media (e.g., text, images, audio, video, and graphics) to communicate information in a given application.
Recent advances in digital technologies have drastically increased the capacity of both data channels and storage:
When compare with floppy disks and CDs, the capacity of DVDs, digital tapes, and hard disk is much larger. Personal computers can be configured with a processor speed of 3 GHz, main memory of 2 GB, and a hard disk of 500GB. DVDs manufactured with a double sided format, each side having a dual layer, have a data capacity of 17GB. Digital Linear Tapes (DTLs) come with a storage space above 200GB for compressed data.
Asymmetric digital subscriber line (ADSL) is a new technology that allows more data to be sent over...
This is a preview of subscription content, log in via an institution.
References
M. Eskicioglu and E. J. Delp, “Overview of Multimedia Content Protection in Consumer Electronics Devices,” Signal Processing: Image Communication, Vol. 16, No. 7, pp. 681–699, April 2001.
M. Eskicioglu, J. Town, and E. J. Delp, “Security of Digital Entertainment Content from Creation to Consumption,” Signal Processing: Image Communication, Special Issue on Image Security, Vol. 18, No. 4, pp. 237–262, April 2003.
E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk, and E. J. Delp, “Advances in Digital Video Content Protection,” Proceedings of the IEEE, Special Issue on Advances in Video Coding and Delivery, 2004.
I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, 2002.
J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, 1997.
B. Schneier, “Applied Cryptography,” John Wiley and Sons, Inc., 1996.
I.J. Cox, M. L. Miller, and J. A. Bloom, “Digital Watermarking,” Morgan Kaufmann Publishers, 2001.
M. Arnold, M. Schmucker, and S. D. Wolthusen, “Techniques and Applications of Digital Watermarking and Content Protection,” Artech House, Inc., 2003.
R. de Bruin and J. Smits, “Digital Video Broadcasting: Technology, Standards and Regulations,” Artech House, Inc., 1999.
W. Mooij, “Advances in Conditional Access Technology,” International Broadcasting Convention, IEE Conference Publication, No. 447, September 1997, pp. 461–464.
A._M. Eskicioglu, J. Town, and E. J. Delp, “Security of Digital Entertainment Content from Creation to Consumption,” Signal Processing: Image Communication, Special Issue on Image Security, Vol. 18, Issue 4, pp. 237–262, April 2003.
Microsoft Windows Media DRM, available at http://www.microsoft.com/windows/windowsmedia/drm.aspx.
Helix DRM, available at http://www.realnetworks.com/products/drm/index.htm.
Content Protection System Architecture (CPSA), available at http://www.4Centity.com.
Content Scramble System, available at http://www.dvdcca.org.
Content Protection for Prerecorded Media, available at http://www.4Centity.com.
Content Protection for Recordable Media, available at http://www.4Centity.com.
4C/Verance Watermark, available at http://www.verance.com.
High Definition Copy Protection, available at http://www.jvc-victor.co.jp/english/products/vcr/D-security.html.
Digital Transmission Content Protection, available at http://www.dtcp.com.
High-bandwidth Digital Content Protection, available at http://www.digital-CP.com
Content Protection Status Report III, November 7, 2002, available at http://judiciary.senate.gov/special/mpaa110702.pdf.
W. Bender, D. Gruhl, and N. Morimoto, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3–4, 1996, pp. 313–336.
Y. Wang, J. F. Doherty, R. E. Van Dyck, “A Wavelet-based Watermarking Algorithm for Ownership Verification of Digital Images,” IEEE Transactions on Image Processing, Vol. 11, No. 2, February 2002.
W. Zhu, Z. Xiong, and Y.-Q. Zhang, “Multiresolution Watermarking for Images and Video,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 9, No. 4, June 1999, pp. 545–550.
R. Liu and T. Tan, “A SVD-Based Watermarking Scheme for Protecting Rightful Ownership,” IEEE Transactions on Multimedia, Vol. 4, No. 1, March 2002, pp.121–128.
J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding-New Paradigm in Digital Watermarking,” EURASIP Journal on Applied Signal Processing, Special Issue on Emerging Applications of Multimedia Data Hiding, Vol. 2002, Issue 2 February 2002, pp. 185–196.
D. Kundur and D. Hatzinakos, “Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles,” IEEE Transactions on Multimedia, Vol. 6, No. 1, February 2004.
I._J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, 6(12), December 1997, pp. 1673–1687.
R. Dugad, K. Ratakonda, and N. Ahuja, “A New Wavelet-Based Scheme for Watermarking Images,” Proceedings of 1998 International Conference on Image Processing (ICIP 1998), Vol. 2, Chicago, IL, October 4–7, 1998, pp. 419–423.
S. Pereira and T. Pun, “Robust Template Matching for Affine Resistant Image Watermarks,” IEEE Transactions on Image Processing, Vol. 9, No. 6, June 2000, pp. 1123–1129.
M._L. Miller, G. J. Doerr, I. J. Cox, “Applying Informed Coding and Embedding to Design a Robust, High Capacity Watermark,” IEEE Transactions on Image Processing, Vol. 13, No. 6, June 2004, pp. 792–807.
B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, 1999.
R. Mehul and R. Priti, “Discrete Wavelet Transform Based Multiple Watermarking Scheme,” Proceedings of IEEE Region 10 Technical Conference on Convergent Technologies for the Asia-Pacific, Bangalore, India, October 2003.
P. Tao and A. M. Eskicioglu, “A Robust Multiple Watermarking Scheme in the Discrete Wavelet Transform Domain,” Proceedings of Optics East 2004 Symposium, Internet Multimedia Management Systems V Conference, Philadelphia, PA, October 2004.
E. Ganic, S. D. Dexter, and A. M. Eskicioglu, “Embedding Multiple Watermarks in the DFT Domain Using Low and High Frequency Bands,” IS&T/SPIE’s 17th Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII Conference, San Jose, CA, January 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this entry
Cite this entry
Eskicioglu, A.M. (2006). Protection of Multimedia Data in Distribution and Storage. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_196
Download citation
DOI: https://doi.org/10.1007/0-387-30038-4_196
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24395-5
Online ISBN: 978-0-387-30038-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering
