Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

An Efficient Multimedia DRM Technique using Secure Arithmetic Coding

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 61 - Number 17
Year of Publication: 2013
Authors:
Sudhish N George
Arun Raj R
Deepthi P P
10.5120/10017-4593

Sudhish N George, Arun Raj R and Deepthi P P. Article: An Efficient Multimedia DRM Technique using Secure Arithmetic Coding. International Journal of Computer Applications 61(17):1-8, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Sudhish N George and Arun Raj R and Deepthi P P},
	title = {Article: An Efficient Multimedia DRM Technique using Secure Arithmetic Coding},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {61},
	number = {17},
	pages = {1-8},
	month = {January},
	note = {Full text available}
}

Abstract

The digital rights management (DRM) techniques are very important in the fields of multimedia security. The major areas of multimedia data security includes secrecy, ownership protection and traitor tracing. Even though, a number of encryption techniques were developed for multimedia encryption, most of them are vulnerable to several types of attacks. Hence, an encryption system having better security with minimal level of system complexity is an important requirement in multimedia security. In this paper, the cryptanalysis of two arithmetic coding based encryption techniques (randomized arithmetic coding(RAC) and chaotic binary arithmetic coding(CBAC))were proposed and proved that these schemes are vulnerable to known-plaintext attack. Then, a modified secure arithmetic coding based encryption system by providing block-wise shuffling of DCT matrix prior to the CBAC stage (block-shuffled CBAC)is proposed to improve the overall security of the system. In order to provide content protection after decryption for the proposed scheme, the joint fingerprinting and decryption (JFD) technique is provided at the receiver stage. Finally, this idea of image encryption has been extended to video (H. 264 coding standard). Here, the work is based on a correlation preserving sorting algorithm whereby a comparable compression performance is obtained in addition to the high level of security. The proposed systems are tested against various types of attacks and it has been proved that these methods are able to withstand various types of attacks with good compression performance and minimal level of increase in system complexity.

References

  • PUB FIPS. 197: advanced encryption standard. National Inst. of Standards & Tech, 2001.
  • M. Grangetto, E. Magli, and G. Olmo. Multimedia selective encryption by means of randomized arithmetic coding. Multimedia, IEEE Transactions on, 8(5):905–917, 2006.
  • J. I. Guo et al. A new chaotic key-based design for image encryption and decryption. In Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on, volume 4, pages 49–52. IEEE, 2000.
  • G. Jakimoski and KP Subbalakshmi. Cryptanalysis of some multimedia encryption schemes. Multimedia, IEEE Transactions on, 10(3):330–338, 2008.
  • R. S. Katti, S. K. Srinivasan, and A. Vosoughi. On the security of randomized arithmetic codes against ciphertext-only attacks. Information Forensics and Security, IEEE Transactions on, 6(1):19–27, 2011.
  • H. Kim, J. Wen, and J. D. Villasenor. Secure arithmetic coding. Signal Processing, IEEE Transactions on, 55(5):2263– 2272, 2007.
  • D. Kundur and K. Karthik. Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE, 92(6):918–932, 2004.
  • Y. Mao and M. Wu. A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on, 15(7):2061–2075, 2006.
  • A. Pande, J. Zambreno, and P. Mohapatra. Joint video compression and encryption using arithmetic coding and chaos. In Internet Multimedia Services Architecture and Application (IMSAA), 2010 IEEE 4th International Conference on, pages 1–6. IEEE, 2010.
  • D. Socek, S. Magliveras, O. Marques, H. Kalva, B. Furht, et al. Digital video encryption algorithms based oncorrelation-preserving permutations. EURASIP Journal on Information Security, 2007.
  • D. E. Standard. Fips pub 46-2. National Bureau of Standards, 1993.
  • S. W. Sun, C. S. Lu, and P. C. Chang. Aacs-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions. Signal Processing: Image Communication, 23(3):179–193, 2008.
  • W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu. Anticollusion fingerprinting for multimedia. Signal Processing, IEEE Transactions on, 51(4):1069–1087, 2003.
  • Z. J. Wang, M. Wu, H. V. Zhao, W. Trappe, and K. J. R. Liu. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Image Processing, IEEE Transactions on, 14(6):804–821, 2005.
  • J. Wen, H. Kim, and J. D. Villasenor. Binary arithmetic coding with key-based interval splitting. Signal Processing Letters, IEEE, 13(2):69–72, 2006.
  • T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the h. 264/avc video coding standard. Circuits and Systems for Video Technology, IEEE Transactions on, 13(7):560–576, 2003.
  • C. P. Wu and C. C. J. Kuo. Design of integrated multimedia compression and encryption systems. Multimedia, IEEE Transactions on, 7(5):828–839, 2005.
  • M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu. Collusionresistant fingerprinting for multimedia. Signal Processing Magazine, IEEE, 21(2):15–27, 2004.
  • H. V. Zhao and K. J. R. Liu. Fingerprint multicast in secure video streaming. Image Processing, IEEE Transactions on, 15(1):12–29, 2006.
  • J. Zhou, O. C. Au, and P. H. W. Wong. Adaptive chosenciphertext attack on secure arithmetic coding. Signal Processing, IEEE Transactions on, 57(5):1825–1838, 2009.
  • J. Zhou, Z. Liang, Y. Chen, and O. C. Au. Security analysis of multimedia encryption schemes based on multiple huffman table. Signal Processing Letters, IEEE, 14(3):201– 204, 2007.
  • Q. Zhou, K. Wong, X. Liao, and Y. Hu. On the security of multiple huffman table based encryption. Journal of Visual Communication and Image Representation, 22(1):85– 92, 2011.
  • Z. Zhu, W. Zhang, K. Wong, and H. Yu. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6):1171–1186, 2011.