Central Concerns and Questions
Multimedia content is everywhere and is playing an increasingly important role in sensitive application fields such as government, finance, health care and the law. In application fields such as these, it is critical and often a requirement to secure multimedia content in transient and in storage. Authentication is the ability to check the integrity as well as the origin of the multimedia content. Access control allows use of multimedia content according to users' privileges.
Emerging Ideas and Initiatives
Modern multimedia coding standards, such as JPEG2000 and MPEG-4, are scalable, i. e., they are designed for “encoding once and decoding many times”. They support extraction of subcode streams with different resolutions, qualities, frame rates and regions-of-interest, all from the same compressed code stream. This functionality allows applications to manipulate or disclose only the required subcode streams for any target users based their privileges, device capabilities or network bandwidth.
We study authentication and access control systems for scalable multimedia coding standards. Our access control technique for JPEG2000 is secure against collusion attacks and is highly flexible, allowing access control to code streams according to any combination of resolution, quality and region-of-interest. Our authentication techniques for JPEG2000 and MPEG-4 are fully compatible with the core parts of the standards. They allow users to verify the authenticity and integrity of any subcode streams extracted from a single code stream protected with a single digital signature. In addition, by integrating seamlessly cryptographic techniques and erasure correction coding, our authentication system for MPEG-4 achieves high probability of successful authentication for code streams transmitted over lossy networks.
Selected Publications
[1] Robert H. Deng and Y. Yang. A study of data authentication in proxy-enabled multimedia delivery systems: model, schemes and application. Accepted by ACM Transactions on Multimedia Computing , Communications and Applications ”, 2009.
[2] Jian Weng, Robert H. Deng, Cheng-Kang Chu , Xuhua Ding and Junzuo Lai. Conditional proxy re-encryption secure against chosen-ciphertext attack. Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security (AsiaCCS2009), pp. 10-12 March 2009, Sydney , Australia .
[3] Yongdong Wu, Di Ma and Robert H. Deng. Flexible access control to JPEG2000 image code-streams. IEEE Transactions on Multimedia, Vol. 9, No. 6, pp. 1314-1324, October 2007.
[4] Yongdong Wu and Robert H. Deng. Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia, Vol. 8, No. 1, pp. 152-161, Feb. 2006.
[5] Robert H. Deng, Yongdong Wu and Di Ma. Securing JPEG2000 code-streams. D. T. Lee, S. Shieh and D. J. Tygar (Eds.), pp. 229-253, Computer Security in the 21st Century, 268 pages, Springer 2005.
[6] Robert H. Deng, Di Ma, Weizhong Shao and Yongdong Wu. Scalable trusted online dissemination of JPEG2000 images. ACM Multimedia Systems Journal, Vol. 11, pp. 60-67, November 2005.
Projects, Presentations and Posters
- Robert H. Deng, Authentication of Scalable Multimedia Content (poster)
- Robert H. Deng, Application of Cryptographic and Error-Correction Coding Techniques in Multimedia Content Authentication (presentation)
Collaborations and Industry Linkages
- Institute for Infocomm Research