Multimedia Security Technologies for Digital Rights Management (eBook)
520 Seiten
Elsevier Science (Verlag)
978-0-08-046389-6 (ISBN)
Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.
* Discusses state-of-the-art multimedia authentication and fingerprinting techniques
* Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking
* Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices
Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate proteges with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.* Discusses state-of-the-art multimedia authentication and fingerprinting techniques * Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking * Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices
Front Cover 1
Table of Contents 7
PREFACE 21
Part A - OVERVIEW 25
Chapter 1 - Introduction—Digital Rights Management 27
1.1 PROPERTY AND VALUE 27
1.2 “ORIGINALWORK” 28
1.3 LOOKING BACK AT THE COPYRIGHT ACT OF 1976 29
1.4 COMMUNICATION THEORY—WHO SCREAMS LOUDEST? 33
1.5 CRYPTOGRAPHY—MUCH TO DO 38
1.6 DIGITAL RIGHTS MANAGEMENT—WRAPPING AND EMBEDDING 39
1.7 NOW, THE FUTURE 45
ACKNOWLEDGMENTS 46
REFERENCES 46
Chapter 2 - Digital Rights Management Systems 47
2.1 INTRODUCTION—WHAT IS DIGITAL RIGHTS MANAGEMENT? 47
2.2 THE BASIC STRUCTURE OF A DRM SYSTEM 48
2.3 EXAMPLE: THE DVD CONTENT SCRAMBLING SYSTEM 50
2.4 EXAMPLE: THE OMA DRM 52
2.5 THE MPEG LA® DRM REFERENCE MODEL 56
2.6 MAPPING AN APPLICATION ONTO THE MPEG LA® DRM RM 67
2.7 CONCLUSION 70
REFERENCES 73
Chapter 3 - Putting Digital Rights Management In Context 75
3.1 INTRODUCTION 75
3.2 VALUE-CHAINS 76
3.3 DIGITAL TECHNOLOGIES 78
3.4 WORKING WITH DIGITAL MEDIA 79
3.5 DIGITAL RIGHTS MANAGEMENT 80
3.6 MAKING DRM INTEROPERABLE 81
3.7 THE DMP RESULTS SO FAR 83
3.8 THE DMP SPECIFICATIONS PHASE I 84
3.9 BEYOND TECHNICAL SPECIFICATIONS 90
3.10 ADAPTING TO THE NEW ENVIRONMENT 91
3.11 INTEROPERABLE DRM PLATFORM, PHASE II 94
3.12 CONCLUSION 94
REFERENCES 95
Part B - FUNDAMENTALS OF MULTIMEDIA SECURITY 97
Chapter 4 - Multimedia Encryption 99
4.1 INTRODUCTION 99
4.2 FUNDAMENTALS OF MODERN ENCRYPTION 100
4.3 THE MULTIMEDIA ENCRYPTION PARADIGM 104
4.4 MULTIMEDIA ENCRYPTION SCHEMES 110
4.5 CONCLUSION 127
REFERENCES 127
Chapter 5 - Multimedia Authentication 135
5.1 INTRODUCTION 135
5.2 IMAGE AUTHENTICATION 147
5.3 VIDEO AUTHENTICATION 150
5.4 AUDIO AUTHENTICATION 157
5.5 SUMMARY 159
REFERENCES 159
Chapter 6 - Key Management for Multimedia Access and Distribution 163
6.1 INTRODUCTION 163
6.2 SECURITY OF MULTIMEDIA IN DISTRIBUTION 166
6.3 SUMMARY OF CA, DRM, AND CP SYSTEMS 186
REFERENCES 188
Chapter 7 An Overview of Digital Watermarking 191
7.1 INTRODUCTION 191
7.2 CLASSIFICATION OFWATERMARKING SCHEMES 193
7.3 TOOLS AND MATHEMATICAL BACKGROUND 195
7.4 DATA HIDING WITH SIDE INFORMATION 200
7.5 QUANTIZATION-BASED DATA HIDING 203
7.6 LOSSLESSWATERMARKING 208
7.7 FREQUENCY DOMAINWATERMARKING 209
7.8 SECURITY AND ROBUSTNESS 212
7.9 SUMMARY 214
REFERENCES 214
Chapter 8 - Biometrics in Digital Rights Management 221
8.1 INTRODUCTION 221
8.2 BIOMETRICS 223
8.3 INTEGRATING BIOMETRICS WITH DRM SYSTEMS 231
8.4 CONCLUSION 239
REFERENCES 240
Part C - ADVANCED TOPICS 243
Chapter 9 - Format-Compliant Content Protection 245
9.1 INTRODUCTION 245
9.2 SECURITY ARCHITECTURES FOR CONTENT PROTECTION 247
9.3 RATIONALES FOR FORMAT-COMPLIANT CONTENT PROTECTION 250
9.4 FORMAT-COMPLIANT CONTENT ENCRYPTION 253
9.5 FORMAT-AGNOSTIC CONTENT PROTECTION 259
9.6 SEMI-FORMAT-COMPLIANT CONTENT PROTECTION 260
9.7 CONCLUSION 261
REFERENCES 262
Chapter 10 - Secure Media Streaming and Secure Transcoding 265
10.1 INTRODUCTION 265
10.2 SECURE STREAMING AND SECURE TRANSCODING FOR SCALABLE CODERS 271
10.3 SECURE STREAMING AND ADAPTATION FOR NON-SCALABLE CODERS 280
10.4 SECURE MEDIA SYSTEMS 286
10.5 SUMMARY 295
REFERENCES 296
Chapter 11 - Scalable Encryption and Multi- Access Control for Multimedia 299
11.1 INTRODUCTION 299
11.2 SCALABLE CODING 302
11.3 SCALABLE ENCRYPTION 305
11.4 MULTI-ACCESS ENCRYPTION AND KEY SCHEMES 312
11.5 CONCLUSION 322
REFERENCES 323
Chapter 12 - Broadcast Encryption 327
12.1 INTRODUCTION 327
12.2 PUBLIC KEY CRYPTOGRAPHY VERSUS BROADCAST ENCRYPTION 329
12.3 A TUTORIAL EXAMPLE 330
12.4 SOME PRACTICAL SYSTEMS 331
12.5 SOME EXTENSIONS TO BROADCAST ENCRYPTION 343
12.6 CONCLUSION 345
REFERENCES 346
Chapter 13 - Practical “Traitor Tracing” 347
13.1 INTRODUCTION 347
13.2 PROBLEM: OVERHEAD 350
13.3 PROBLEM: INEFFICIENT TRACING 353
13.4 PROBLEM: REDUCE THE NUMBER OF KEYS STORED IN THE DEVICE 358
13.5 PROBLEM: LACK OF FLEXIBILITY 359
13.6 PROBLEM: TRACING TO MODELS INSTEAD OF TO INDIVIDUAL DEVICES 360
13.7 PROBLEM: EVIL MANUFACTURERS 365
13.8 PROBLEM: WHAT TO DO AFTER YOU TRACE 366
13.9 PROBLEM: WHEN TO APPLY THE TRACING TECHNOLOGY 368
13.10 CONCLUSION 369
REFERENCES 370
Chapter 14 - Steganalysis 373
14.1 BASIC CONCEPTS 373
14.2 STEGANOGRAPHY—HISTORICAL PERSPECTIVE 376
14.3 TARGETED STEGANALYSIS 379
14.4 BLIND STEGANALYSIS 388
14.5 THE FUTURE 398
REFERENCES 400
Chapter 15 - Passive-blind Image Forensics 407
15.1 INTRODUCTION 407
15.2 OVERVIEW OF PBIF 409
15.3 FORGERY DETECTION AND SOURCE IDENTIFICATION 410
15.4 CHALLENGES AND RESOURCES FOR PBIF 424
15.5 SUMMARY AND CONCLUSION 430
15.6 FORGERY CREATION TECHNIQUES 430
REFERENCES 433
Chapter 16 - Security in Digital Cinema 437
16.1 INTRODUCTION 437
16.2 DIGITAL CINEMA STANDARDIZATION EFFORTS 438
16.3 GOALS OF THE DIGITAL CINEMA SECURITY SYSTEM 440
16.4 TOOLS OF DIGITAL CINEMA CONTENT SECURITY 441
16.5 DCI DIGITAL CINEMA SPECIFICATION 445
16.6 SUMMARY 454
REFERENCES 455
Part D - STANDARDS AND LEGAL ISSUES 457
Chapter 17 - DRM Standard Activities 459
17.1 INTRODUCTION 459
17.2 MPEG 460
17.3 OMA 470
17.4 CORAL 473
17.5 DMP 474
17.6 ISMA 475
17.7 AACS 476
17.8 LIST OF DRM STANDARD ORGANIZATIONS AND CONSORTIUMS 477
REFERENCES 479
Chapter 18 - The Digital Millennium Copyright Act 481
18.1 DIGITAL MEDIA AND SIX-TOED CATS 481
18.2 SPECIAL INTEREST GROUPS, A TREATY, AND THE DIGITAL MILLENNIUM COPYRIGHT ACT IS BORN 482
18.3 THE DIGITAL MILLENNIUM COPYRIGHT ACT IN A NUTSHELL 484
18.4 CIRCUMVENTING A TECHNOLOGICAL MEASURE—A DMCA VIOLATION OF THE FIRST KIND 485
18.5 OVERSEEING THE PROCESS SHALL BE TWO COMPETING GOVERNMENT AGENCIES 489
18.6 LOOPHOLES ONLY A LAWYER COULD LOVE 490
18.7 A COLLECTION OF SAFETY VALVES 496
18.8 A CHILLING EFFECT UPON REVERSE ENGINEERING 499
18.9 REMOVING COPYRIGHT MANAGEMENT INFORMATION—A DMCA VIOLATION OF THE SECOND KIND 502
18.10 MORE LOOPHOLES 503
18.11 CONCLUSION—THE SIX-TOED CATS ARE PROBABLY WINNING 505
INDEX 507
Erscheint lt. Verlag | 28.7.2011 |
---|---|
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Grafik / Design |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Technik ► Elektrotechnik / Energietechnik | |
ISBN-10 | 0-08-046389-4 / 0080463894 |
ISBN-13 | 978-0-08-046389-6 / 9780080463896 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich