Intellectual Property Rights Management Using Combination Encryption in MPEG-4

  • Goo-Rak Kwon
  • Kwan-Hee Lee
  • Sang-Jae Nam
  • Sung-Jea Ko
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)


In this paper, we propose a new encryption method for intellectual property rights management of MPEG-4 coder. DCT coefficients and motion vectors (MVs) are used for the combination encryption of the MPEG-4 video. Experimental results indicate that the proposed joint and partial encryption technique provides levels of security and achieves a simple and coding-efficient architecture with no adverse impact on error resilience.


Intellectual Property Encryption Scheme Encryption Method Digital Right Management Video Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Schneier, B.: Applied cryptography. Wiley and Sons, Chichester (1996)Google Scholar
  2. 2.
    Piva, A., Bartolini, F., Barni, M.: Managing copyright in open networks. IEEE Internet Computing 6, 18–26 (2002)CrossRefGoogle Scholar
  3. 3.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding: a survey. Proceedings of the IEEE 87, 1062–1078 (1999)CrossRefGoogle Scholar
  4. 4.
    Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proc. ACM Multimedia, vol. 96, pp. 219–230 (1996)Google Scholar
  5. 5.
    Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. on Multimedia 5, 118–129 (2003)CrossRefGoogle Scholar
  6. 6.
    Cox, I.J., Miller, M.L., Bloom, J.A.: Watermarking applications and their properties. In: Proc. IEEE International Conference on Information Technology. Coding and Computing, pp. 6–10 (2000)Google Scholar
  7. 7.
    Khan, J.Y., Das, P.: MPEG4 Video over Packet Switched Connection of the WCDMA Air Interface. In: Proc. of the 13th IEEE International Symposium on Personal Indoor and Mobile Radio Communications, vol. 5, pp. 2189–2193 (2002)Google Scholar
  8. 8.
    Gall, D.L.: MPEG: a video compression standard for multimedia applications. Communications of the ACM 34, 46–58 (1991)CrossRefGoogle Scholar
  9. 9.
    Spanos, G., Maples, T.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-time Video. In: Proceedings of 4th International Conference on Computer Communications and Networks (1995)Google Scholar
  10. 10.
    Agi, I., Gong, L.: An Empirical Study of Mpeg Video Transmissions. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 137–144 (1996)Google Scholar
  11. 11.
    Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proceedings of The First International Conference on Imaging Science, Systems, and Technology (CISST 1997), pp. 21–29 (1997)Google Scholar
  12. 12.
    Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. Computers and Graphics 22, 437–448 (1998)CrossRefGoogle Scholar
  13. 13.
    Kwon, G.-R., Lee, T.-Y., Kim, K.-H., Jin, J.-D., Ko, S.-J.: Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol. 3802, pp. 1098–1103. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    EPIC(Electronic Privacy Information Center) Digital Right Management and Privacy Page,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Goo-Rak Kwon
    • 1
  • Kwan-Hee Lee
    • 1
  • Sang-Jae Nam
    • 1
  • Sung-Jea Ko
    • 1
  1. 1.School of Electrical EngineeringKorea UniversitySeoulKorea

Personalised recommendations