Protecting VoD the easier way
read more
Citations
Digital Watermarking
Method and device for obtaining playlist content over a network
A guide tour of video watermarking
Network-enabled audio device
Method and system for providing an audio element cache in a customized personal radio broadcast
References
Methods for encrypting and decrypting MPEG video data efficiently
Dynamic batching policies for an on-demand video server
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video
Long-term movie popularity models in video-on-demand systems: or the life of an on-demand movie
Robust MPEG video watermarking technologies
Related Papers (5)
Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video
Frequently Asked Questions (13)
Q2. How much unicast data is needed to stream a video?
Assuming that the unicast portion makes up 1% of an MPEG-1 video, the necessary point-to-point throughput is approximately 2 kilobyte/s, which is streamable in large parts of the Internet nowadays.
Q3. What are the main considerations in the slowstarting video server business?
Typical design considerations in the slowstarting video server business are concerned with the production of machines with high internal I/O throughput, disk throughput and network throughput because these are supposed to limit the performance of current video server applications.
Q4. What is the focus of their tests?
The approaches to encryption that the authors have found in the literature are specifically implemented for MPEG-1, which was also in the focus of their tests.
Q5. How do the authors ensure the last requirement of an overlaying pattern over the whole frame?
To ensure the last requirement instead of one overlaying pattern over the whole frame the authors add an 8x8 pattern over every 8x8 Block of the frame.
Q6. What is the general assumption that reconstruction of headers for MPEG-1 is relatively simple?
It is generally assumed that reconstruction of headers for MPEG-1 is relatively simple because current encoders produce CBR streams and use always the same header data anyway.
Q7. What is the watermarking algorithm for MPEG video?
Their watermarking algorithm is implemented for MPEG video and is based on overlaying a pattern with its power concentrated mostly in low frequencies.
Q8. What is the maximum amount of processing power required for the envisioned scenarios?
The supported number of transactions and the computing power, on the other hand, are considered sufficient for the envisioned scenarios.
Q9. What is the probability of a bit error being eliminated?
If the attacker chooses a 3-copy voting to eliminate the bit errors, errors remain with some probability that can be used to identification the original customer.
Q10. Why is the scheme not applicable to talk-shows?
The scheme could probably not by applied to talk-shows because the low variation between consecutive I-frames allows reconstruction of the sequence.
Q11. What is the reason for the corruption of single bits?
The corruption of single bits may be as efficient as the corruption of bytes, but it is not feasible in their case because the bit changes increase rather than decrease the number of CPU operations.
Q12. What is the conflict between copyright protection and scalability?
This conflict between copyright protection and scalability inhibits effectively the deployment of caching and prefetching in the area of commercially sold multimedia content, although the profit that could be gained from reducing the network constraints would be considerable (as demonstrated by the sex business, which is protected from redistribution on a large scale by the privacy needs of its customers).
Q13. How can the authors identify the bit errors after the execution of voting steps?
Bit errors that remain after the execution of voting steps to eliminate bit errors can be identified by the content provider using a brute forceapproach of computing these values based on the seed values on file.