Multimedia Encryption Technology for Content Protection

Author(s):  
Shiguo Lian

The principal concern of this chapter is to provide those in the multimedia or content protection community with an overview of multimedia content encryption technology. Multimedia (image, audio, or video) content encryption technologies are reviewed, from the background, brief history, performance requirement, to research progress. Additionally, the general encryption algorithms are classified, and their performances are analyzed and compared. Furthermore, some special encryption algorithms are introduced. Finally, some open issues and potential research topics are presented, followed by some conclusions. The author hopes that the chapter will not only inform researchers of the progress of multimedia content encryption, but also guide the design of practical applications in the industry field.

Author(s):  
Shiguo Lian

The principal concern of this chapter is to provide those in the secure multimedia communication or content protection community with an overview of multimedia content encryption technology. Multimedia (image, audio or video) content encryption technologies are reviewed, from the background, brief history, and performance requirement, to research progress. Additionally, the general encryption algorithms are classified, and their performances are analyzed and compared. Furthermore, some special encryption algorithms are introduced. Finally, some open issues and potential research topics are presented, followed by some conclusions. The author hopes that the chapter will not only inform researchers of the progress of multimedia content encryption but also guide the design of practical applications in industry field.


Author(s):  
Shiguo Lian

Multimedia content distribution is a key technique for multimedia services, which transmits multimedia content from a sender to certain receiver(s). With the popularity of multimedia services, the trust issues in content distribution becomes urgent, including the authorized access, privacy protection, trusted payment, piracy surveillance, and so forth. This chapter introduces the trust issues in multimedia content distribution (e.g., authorization, authentication, privacy, payment, ownership, illegal distribution, forgery, etc.), reviews the latest research progress of the solutions, and presents some open issues and promising research topics. It is expected to provide valuable information to researchers or engineers in this field.


Author(s):  
Shiguo Lian

Secure multimedia transcoding is a challenge that operates the encrypted multimedia content directly. For example, the encrypted multimedia data’s bit rate is changed directly in order to adapt a narrow channel. However, since it avoids the triple operations decryption-transcoding-re-encryption, it is suitable for the application scenarios requiring low cost operations, such as wireless or mobile multimedia communication. In this chapter, the secure transcoding scheme for scalable video coding is proposed and analyzed, together with the introduction to scalable video coding and multimedia encryption, the overview of existing secure transcoding schemes, and some open issues in this field. The chapter is expected to provide researchers or engineers valuable information on secure multimedia transcoding and communication.


Author(s):  
Shiguo Lian

Video watermarking technique embeds some information into videos by modifying video content slightly. The embedded information, named watermark, may be ownership information, customer information, integrity information, redundancy information, and so forth. Thus, this technique can be used for copyright protection, piracy tracing, content authentication, advertisement surveillance, error resilience, and so forth. In this chapter, we give an overview on video watermarking technology, including its architecture, performance requirement, typical algorithms, hot topics, and open issues.


Author(s):  
Shiguo Lian

Multimedia content distribution is a key technique for multimedia services, which transmits multimedia content from a sender to certain receiver(s). With the popularity of multimedia services, the trust issues in content distribution becomes urgent, including the authorized access, privacy protection, trusted payment, piracy surveillance, and so forth. This chapter introduces the trust issues in multimedia content distribution (e.g., authorization, authentication, privacy, payment, ownership, illegal distribution, forgery, etc.), reviews the latest research progress of the solutions, and presents some open issues and promising research topics. It is expected to provide valuable information to researchers or engineers in this field.


Author(s):  
B. Aparna ◽  
S. Madhavi ◽  
G. Mounika ◽  
P. Avinash ◽  
S. Chakravarthi

We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. The proposed system can be used to protect different multimedia content types, including videos, images, audio clips, songs, and music clips. The system can be deployed on private and/or public clouds. Our system has two novel components: (i) method to create signatures of videos, and (ii) distributed matching engine for multimedia objects. The signature method creates robust and representative signatures of videos that capture the depth signals in these videos and it is computationally efficient to compute and compare as well as it requires small storage. The distributed matching engine achieves high scalability and it is designed to support different multimedia objects. We implemented the proposed system and deployed it on two clouds: Amazon cloud and our private cloud. Our experiments with more than 11,000 videos and 1 million images show the high accuracy and scalability of the proposed system. In addition, we compared our system to the protection system used by YouTube and our results show that the YouTube protection system fails to detect most copies of videos, while our system detects more than 98% of them.


2020 ◽  
Vol 11 (1) ◽  
pp. 1
Author(s):  
Amna Qureshi ◽  
David Megías Jiménez

In this paper, we provide a holistic survey of multimedia content protection applications in which blockchain technology is being used. A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital watermarking and fingerprinting (or transaction tracking), and performance criteria. The study of the literature reveals that there is currently no complete and systematic taxonomy dedicated to blockchain-based copyright protection applications. Moreover, the number of successfully developed blockchain-based content protection systems is very low. This points towards a research gap. To fill this gap, we propose a taxonomy that integrates technical aspects and application knowledge and can guide the researchers towards the development of blockchain-based multimedia copyright protection systems. Furthermore, the paper discusses some technical challenges and outlines future research directions.


Author(s):  
Amin Khaksar Pour ◽  
Woo Chaw Seng ◽  
Shivakumara Palaiahnakote ◽  
Hamid Tahaei ◽  
Nor Badrul Anuar
Keyword(s):  

2021 ◽  
Vol 13 (1) ◽  
Author(s):  
Yingjie Yang ◽  
Yanhui Yu ◽  
Jing Li ◽  
Qingrong Chen ◽  
Yanlian Du ◽  
...  

AbstractThe investigation of highly effective, durable, and cost-effective electrocatalysts for the hydrogen evolution reaction (HER) is a prerequisite for the upcoming hydrogen energy society. To establish a new hydrogen energy system and gradually replace the traditional fossil-based energy, electrochemical water-splitting is considered the most promising, environmentally friendly, and efficient way to produce pure hydrogen. Compared with the commonly used platinum (Pt)-based catalysts, ruthenium (Ru) is expected to be a good alternative because of its similar hydrogen bonding energy, lower water decomposition barrier, and considerably lower price. Analyzing and revealing the HER mechanisms, as well as identifying a rational design of Ru-based HER catalysts with desirable activity and stability is indispensable. In this review, the research progress on HER electrocatalysts and the relevant describing parameters for HER performance are briefly introduced. Moreover, four major strategies to improve the performance of Ru-based electrocatalysts, including electronic effect modulation, support engineering, structure design, and maximum utilization (single atom) are discussed. Finally, the challenges, solutions and prospects are highlighted to prompt the practical applications of Ru-based electrocatalysts for HER.


Sign in / Sign up

Export Citation Format

Share Document