CFP last date
20 May 2024
Reseach Article

Digital Rights Management on Video Files using Integration Algorithms AES and RSA Cryptography

by Tuah Rus Ariandy, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 26
Year of Publication: 2022
Authors: Tuah Rus Ariandy, Imam Riadi
10.5120/ijca2022922302

Tuah Rus Ariandy, Imam Riadi . Digital Rights Management on Video Files using Integration Algorithms AES and RSA Cryptography. International Journal of Computer Applications. 184, 26 ( Aug 2022), 54-60. DOI=10.5120/ijca2022922302

@article{ 10.5120/ijca2022922302,
author = { Tuah Rus Ariandy, Imam Riadi },
title = { Digital Rights Management on Video Files using Integration Algorithms AES and RSA Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2022 },
volume = { 184 },
number = { 26 },
month = { Aug },
year = { 2022 },
issn = { 0975-8887 },
pages = { 54-60 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number26/32481-2022922302/ },
doi = { 10.5120/ijca2022922302 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:31.869989+05:30
%A Tuah Rus Ariandy
%A Imam Riadi
%T Digital Rights Management on Video Files using Integration Algorithms AES and RSA Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 26
%P 54-60
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Advances in technology make it easy to distribute, copy, and share digital content. However, digital content such as video files has disadvantages in terms of secure copying and redistribution, making important video files that are still in the production process accessible by anyone. With the support of technology and the widespread use of the internet, digital content has become widely used, especially in video files. As technology develops, it becomes easier to copy, modify, and access video files. To overcome this problem, digital rights management technology needs to be developed. Digital rights management (DRM) is one of the technologies that can be used to secure and restrict access to video files, one of which is using cryptographic algorithms to encrypt video files. This study proposes that video files are encrypted using the integration of AES and RSA algorithms. The AES algorithm is used in the system to encrypt video files, and the RSA 4096-bit algorithm is used to wrap the AES 256-bit secret key. These two cryptographic algorithms are integrated into one system to encrypt video files. In this study, the DRM application developed was successfully implemented in UAD TV studios using the integration of AES and RSA cryptographic algorithms so that mp4 video files produced have access control by encrypting video files using public keys and decrypting them using private keys.

References
  1. S. Rana and D. Mishra, “Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems,” Security and Privacy, vol. 4, no. 1, Jan. 2021, doi: 10.1002/spy2.133.
  2. H. Zhao, Y. Liu, Y. Wang, and Y. Huang, “Hiding Data into Blockchain-based Digital Video for Security Protection,” in Proceedings - 2020 3rd International Conference on Smart BlockChain, SmartBlock 2020, Oct. 2020, pp. 23–28. doi: 10.1109/SmartBlock52591.2020.00012.
  3. R. J. Mstafa, Y. M. Younis, H. I. Hussein, and M. Atto, “A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector,” IEEE Access, vol. 8, pp. 161825–161837, 2020, doi: 10.1109/ACCESS.2020.3021356.
  4. A. Alarifi, S. Sankar, T. Altameem, K. C. Jithin, M. Amoon, and W. El-Shafai, “A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications,” IEEE Access, vol. 8, pp. 128548–128573, 2020, doi: 10.1109/ACCESS.2020.3008644.
  5. M. K. Lee and E. S. Jang, “Cryptanalysis of Start Code-Based Encryption Method for HEVC,” IEEE Access, vol. 9, pp. 92568–92577, 2021, doi: 10.1109/ACCESS.2021.3092005.
  6. . Xu, “Commutative Encryption and Data Hiding in HEVC Video Compression,” IEEE Access, vol. 7, pp. 66028–66041, 2019, doi: 10.1109/ACCESS.2019.2916484.
  7. E. Adali, Akdeniz Üniversitesi, and Institute of Electrical and Electronics Engineers, 2. UluslararasıBilgisayarBilimleriveMühendisliğiKonferansı = 2nd International Conference on Computer Science and Engineering: Antalya - T̈ürkiye 5-8 Ekim (October) 2017.
  8. H. Jiaming and Z. Hongbin, “Digital right management model based on cryptography and digital watermarking,” in Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008, 2008, vol. 3, pp. 656–660. doi: 10.1109/CSSE.2008.1000.
  9. A. C. Prihandoko and H. Ghodosi, “Oblivious Content Distribution System to Advantage Digital Rights Management.”
  10. D. Mishra and S. Rana, “Authenticated content distribution framework for digital rights management systems with smart card revocation,” International Journal of Communication Systems, vol. 33, no. 9, Jun. 2020, doi: 10.1002/dac.4388.
  11. S. Rana and D. Mishra, “Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems,” Security and Privacy, vol. 4, no. 1, Jan. 2021, doi: 10.1002/spy2.133.
  12. C. T. Yen, H. T. Laiw, N. W. Lo, T. C. Liu, and J. Stu, “Transparent digital rights management system with superdistribution,” in Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010, 2010, pp. 435–440. doi: 10.1109/BWCCA.2010.110.
  13. E. Becker, W. Buhse, D. Günnewig, and N. Rump, “LNCS 2770 - Digital Rights Management (Frontmatter Pages).”
  14. J. Gao, H. Yu, X. Zhu, and X. Li, “Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption,” IEEE Systems Journal, vol. 15, no. 4, pp. 5233–5244, Dec. 2021, doi: 10.1109/JSYST.2021.3064356.
  15. K. Pavani and P. Sriramya, “Enhancing public key cryptography using RSA, RSA-CRT and N-Prime RSA with multiple keys,” in Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021, Feb. 2021, pp. 661–667. doi: 10.1109/ICICV50876.2021.9388621.
  16. A. Baksi, “Computer Architecture and Design Methodologies Classical and Physical Security of Symmetric Key Cryptographic Algorithms.”
  17. M. Islam, M. Shah, Z. Khan, T. Mahmood, and M. J. Khan, “A New Symmetric Key Encryption Algorithm Using Images as Secret Keys,” in Proceedings - 2015 13th International Conference on Frontiers of Information Technology, FIT 2015, Feb. 2016, pp. 1–5. doi: 10.1109/FIT.2015.12.
  18. W. Easttom, Modern Cryptography. Springer International Publishing, 2021. doi: 10.1007/978-3-030-63115-4.
  19. N. Kabir and S. Kamal, “Secure Mobile Sensor Data Transfer using Asymmetric Cryptography Algorithms,” Oct. 2020. doi: 10.1109/ICCWS48432.2020.9292392.
  20. A. Siddiqa and S. Ahmed, “Scalable Asymmetric Security Mechanism for Internet of Things,” 2020. [Online]. Available: www.ijacsa.thesai.org
  21. J. Vincenttrijmen, “Information Security and Cryptography TheeDesignoffRijndaelTheeAdvanced Encryption Standard (AES) Second Edition.”
  22. Z. Lu and H. Mohamed, “A Complex Encryption System Design Implemented by AES,” Journal of Information Security, vol. 12, no. 02, pp. 177–187, 2021, doi: 10.4236/jis.2021.122009.
  23. Y. Yuan, Y. Yang, L. Wu, and X. Zhang, “A High-Performance Encryption System Based on AES Algorithm with Novel Hardware Implementation.”
  24. C. H. Hsia, S. J. Lou, H. H. Chang, and D. Xuan, “Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences,” IEEE Access, 2021, doi: 10.1109/ACCESS.2021.3121252.
  25. L. Zhang, B. Li, and X. Zhao, “Reconfigurable Hardware Implementation of AES-RSA Hybrid Encryption and Decryption,” in 2020 IEEE 5th International Conference on Signal and Image Processing, ICSIP 2020, Oct. 2020, pp. 970–974. doi: 10.1109/ICSIP49896.2020.9339251.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Rights Management DRM Cryptography AES RSA Video File