Skip to main content

Protection of Multimedia Data in Distribution and Storage

  • Reference work entry
  • 54 Accesses

Definition:Multimedia data needs to be protected from unauthorized duplication and consumption, from unauthorized disclosure and misuse, and from unauthorized use and exploitation.

Introduction

Multimedia can be defined as a combination of different types of media (e.g., text, images, audio, video, and graphics) to communicate information in a given application.

Recent advances in digital technologies have drastically increased the capacity of both data channels and storage:

  • When compare with floppy disks and CDs, the capacity of DVDs, digital tapes, and hard disk is much larger. Personal computers can be configured with a processor speed of 3 GHz, main memory of 2 GB, and a hard disk of 500GB. DVDs manufactured with a double sided format, each side having a dual layer, have a data capacity of 17GB. Digital Linear Tapes (DTLs) come with a storage space above 200GB for compressed data.

  • Asymmetric digital subscriber line (ADSL) is a new technology that allows more data to be sent over...

This is a preview of subscription content, log in via an institution.

References

  1. M. Eskicioglu and E. J. Delp, “Overview of Multimedia Content Protection in Consumer Electronics Devices,” Signal Processing: Image Communication, Vol. 16, No. 7, pp. 681–699, April 2001.

    CrossRef  Google Scholar 

  2. M. Eskicioglu, J. Town, and E. J. Delp, “Security of Digital Entertainment Content from Creation to Consumption,” Signal Processing: Image Communication, Special Issue on Image Security, Vol. 18, No. 4, pp. 237–262, April 2003.

    Google Scholar 

  3. E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk, and E. J. Delp, “Advances in Digital Video Content Protection,” Proceedings of the IEEE, Special Issue on Advances in Video Coding and Delivery, 2004.

    Google Scholar 

  4. I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, 2002.

    Google Scholar 

  5. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, 1997.

    Google Scholar 

  6. B. Schneier, “Applied Cryptography,” John Wiley and Sons, Inc., 1996.

    Google Scholar 

  7. I.J. Cox, M. L. Miller, and J. A. Bloom, “Digital Watermarking,” Morgan Kaufmann Publishers, 2001.

    Google Scholar 

  8. M. Arnold, M. Schmucker, and S. D. Wolthusen, “Techniques and Applications of Digital Watermarking and Content Protection,” Artech House, Inc., 2003.

    Google Scholar 

  9. R. de Bruin and J. Smits, “Digital Video Broadcasting: Technology, Standards and Regulations,” Artech House, Inc., 1999.

    Google Scholar 

  10. W. Mooij, “Advances in Conditional Access Technology,” International Broadcasting Convention, IEE Conference Publication, No. 447, September 1997, pp. 461–464.

    Google Scholar 

  11. A._M. Eskicioglu, J. Town, and E. J. Delp, “Security of Digital Entertainment Content from Creation to Consumption,” Signal Processing: Image Communication, Special Issue on Image Security, Vol. 18, Issue 4, pp. 237–262, April 2003.

    Google Scholar 

  12. Microsoft Windows Media DRM, available at http://www.microsoft.com/windows/windowsmedia/drm.aspx.

    Google Scholar 

  13. Helix DRM, available at http://www.realnetworks.com/products/drm/index.htm.

    Google Scholar 

  14. Content Protection System Architecture (CPSA), available at http://www.4Centity.com.

    Google Scholar 

  15. Content Scramble System, available at http://www.dvdcca.org.

    Google Scholar 

  16. Content Protection for Prerecorded Media, available at http://www.4Centity.com.

    Google Scholar 

  17. Content Protection for Recordable Media, available at http://www.4Centity.com.

    Google Scholar 

  18. 4C/Verance Watermark, available at http://www.verance.com.

    Google Scholar 

  19. High Definition Copy Protection, available at http://www.jvc-victor.co.jp/english/products/vcr/D-security.html.

    Google Scholar 

  20. Digital Transmission Content Protection, available at http://www.dtcp.com.

    Google Scholar 

  21. High-bandwidth Digital Content Protection, available at http://www.digital-CP.com

    Google Scholar 

  22. Content Protection Status Report III, November 7, 2002, available at http://judiciary.senate.gov/special/mpaa110702.pdf.

    Google Scholar 

  23. W. Bender, D. Gruhl, and N. Morimoto, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3–4, 1996, pp. 313–336.

    CrossRef  Google Scholar 

  24. Y. Wang, J. F. Doherty, R. E. Van Dyck, “A Wavelet-based Watermarking Algorithm for Ownership Verification of Digital Images,” IEEE Transactions on Image Processing, Vol. 11, No. 2, February 2002.

    Google Scholar 

  25. W. Zhu, Z. Xiong, and Y.-Q. Zhang, “Multiresolution Watermarking for Images and Video,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 9, No. 4, June 1999, pp. 545–550.

    CrossRef  Google Scholar 

  26. R. Liu and T. Tan, “A SVD-Based Watermarking Scheme for Protecting Rightful Ownership,” IEEE Transactions on Multimedia, Vol. 4, No. 1, March 2002, pp.121–128.

    CrossRef  MATH  Google Scholar 

  27. J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding-New Paradigm in Digital Watermarking,” EURASIP Journal on Applied Signal Processing, Special Issue on Emerging Applications of Multimedia Data Hiding, Vol. 2002, Issue 2 February 2002, pp. 185–196.

    MATH  Google Scholar 

  28. D. Kundur and D. Hatzinakos, “Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles,” IEEE Transactions on Multimedia, Vol. 6, No. 1, February 2004.

    Google Scholar 

  29. I._J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, 6(12), December 1997, pp. 1673–1687.

    CrossRef  Google Scholar 

  30. R. Dugad, K. Ratakonda, and N. Ahuja, “A New Wavelet-Based Scheme for Watermarking Images,” Proceedings of 1998 International Conference on Image Processing (ICIP 1998), Vol. 2, Chicago, IL, October 4–7, 1998, pp. 419–423.

    Google Scholar 

  31. S. Pereira and T. Pun, “Robust Template Matching for Affine Resistant Image Watermarks,” IEEE Transactions on Image Processing, Vol. 9, No. 6, June 2000, pp. 1123–1129.

    CrossRef  Google Scholar 

  32. M._L. Miller, G. J. Doerr, I. J. Cox, “Applying Informed Coding and Embedding to Design a Robust, High Capacity Watermark,” IEEE Transactions on Image Processing, Vol. 13, No. 6, June 2004, pp. 792–807.

    CrossRef  Google Scholar 

  33. B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, 1999.

    Google Scholar 

  34. R. Mehul and R. Priti, “Discrete Wavelet Transform Based Multiple Watermarking Scheme,” Proceedings of IEEE Region 10 Technical Conference on Convergent Technologies for the Asia-Pacific, Bangalore, India, October 2003.

    Google Scholar 

  35. P. Tao and A. M. Eskicioglu, “A Robust Multiple Watermarking Scheme in the Discrete Wavelet Transform Domain,” Proceedings of Optics East 2004 Symposium, Internet Multimedia Management Systems V Conference, Philadelphia, PA, October 2004.

    Google Scholar 

  36. E. Ganic, S. D. Dexter, and A. M. Eskicioglu, “Embedding Multiple Watermarks in the DFT Domain Using Low and High Frequency Bands,” IS&T/SPIE’s 17th Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII Conference, San Jose, CA, January 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, Inc.

About this entry

Cite this entry

Eskicioglu, A.M. (2006). Protection of Multimedia Data in Distribution and Storage. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_196

Download citation

Publish with us

Policies and ethics