Content distribution applications such as digital broadcasting, video-on-demand services, video conferencing, surveillance, and telesurgery are confronted with difficultiesbesides the inevitable compression and quality challengeswith respect to intellectual property management, authenticity, privacy regulations, and access control. Meeting such security requirements in an end-to-end video distribution scenario poses significant challenges. If the entire content is encrypted at the content creation side, the space for signal processing operations is very limited. Decryption, followed by video processing and re-encryption is also to be avoided as it is far from efficient, complicates key management and could expose the video to possible attacks. Additionally, when the content is delivered and decrypted, the protection is gone. Watermarking can complement encryption in these scenarios by embedding a message within the content itself containing, for example, ownership information, unique buyer codes, or content descriptions. Ideally, securing the video distribution should therefore be possible throughout the distribution chain in a flexible way allowing the encryption, watermarking, and encoding/transcoding operations to commute.
Boho, A, Van Wallendael, G, Dooms, A, De Cock, J, Braeckman, G, Schelkens, P, Preneel, B & Van De Walle, R 2013, 'End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation', IEEE Signal Processing Magazine, vol. 30, no. 2, 6461625, pp. 97-107. https://doi.org/10.1109/MSP.2012.2230220
Boho, A., Van Wallendael, G., Dooms, A., De Cock, J., Braeckman, G., Schelkens, P., Preneel, B., & Van De Walle, R. (2013). End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation. IEEE Signal Processing Magazine, 30(2), 97-107. Article 6461625. https://doi.org/10.1109/MSP.2012.2230220
@article{c4825063dcbc4de5bbd804519aa34f24,
title = "End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation",
abstract = "Content distribution applications such as digital broadcasting, video-on-demand services, video conferencing, surveillance, and telesurgery are confronted with difficultiesbesides the inevitable compression and quality challengeswith respect to intellectual property management, authenticity, privacy regulations, and access control. Meeting such security requirements in an end-to-end video distribution scenario poses significant challenges. If the entire content is encrypted at the content creation side, the space for signal processing operations is very limited. Decryption, followed by video processing and re-encryption is also to be avoided as it is far from efficient, complicates key management and could expose the video to possible attacks. Additionally, when the content is delivered and decrypted, the protection is gone. Watermarking can complement encryption in these scenarios by embedding a message within the content itself containing, for example, ownership information, unique buyer codes, or content descriptions. Ideally, securing the video distribution should therefore be possible throughout the distribution chain in a flexible way allowing the encryption, watermarking, and encoding/transcoding operations to commute.",
author = "Andras Boho and {Van Wallendael}, Glenn and Ann Dooms and {De Cock}, Jan and Geert Braeckman and Peter Schelkens and Bart Preneel and {Van De Walle}, Rik",
year = "2013",
month = jan,
day = "1",
doi = "10.1109/MSP.2012.2230220",
language = "English",
volume = "30",
pages = "97--107",
journal = "IEEE Signal Processing Magazine",
issn = "1053-5888",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",
}