Trust in the Value-Creation Chain of Multimedia Goods

Trust in the Value-Creation Chain of Multimedia Goods

Andreas U. Schmidt (CREATE-NET Research Centre, Italy) and Nicolai Kuntze (Fraunhofer Institute for Secure Information Technology, Germany)
Copyright: © 2009 |Pages: 22
DOI: 10.4018/978-1-60566-262-6.ch021
OnDemand PDF Download:


Security in the value creation chain hinges on many single components and their interrelations. Trusted Platforms open ways to fulfil the pertinent requirements. This chapter gives a systematic approach to the utilisation of trusted computing platforms over the whole lifecycle of multimedia products. This spans production, aggregation, (re)distribution, consumption, and charging. Trusted Computing technology as specified by the Trusted Computing Group provides modular building blocks which can be utilized at many points in the multimedia lifecycle. We propose an according research roadmap beyond the conventional Digital Rights Management use case. Selected technical concepts illustrate the principles of Trusted Computing applications in the multimedia context.
Chapter Preview


Major scientific efforts have gone into security issues of the value creation chain and lifecycle of digital multimedia products, see the Proceedings of the IFIP TC-6 TC-11 Conferences on Communications and Multimedia Security (1999-2007), and (Zeng, et al., 2006). Thus far these developments have been a rather traditional application of information security to the life-cycle of multimedia data. In particular, authorisation policies and metadata for Digital Rights Management have reached a high degree of maturity (Kosch, et al., 2005). All proposed architectures for multi-media production and distribution have the common characteristic of a few-to-many association between media sources and consumers. This asymmetry is currently gradually changing. The distinction between media consumers and producers becomes less sharp in Web 2.0 communities like Flickr, YouTube and Facebook. Citizen journalism is a new buzzword. And although the mainstream of media production and distribution will still for a long time be largely resting on centralised business models, information and communication technology exhibit a trend toward convergence which treats user devices on the same technical footing as media servers, for instance.

Likewise the traditional security architectures supporting the life cycle of multimedia content are centralistic and focused on the enforcement of Digital Rights Management (DRM) policies throughout the processes. This approach has its own technical, as well as economical and societal problems (Becker, et al., 2003; Drahos, & Maher, 2004; Mulligan, et al., 2003). On the other hand, the trend toward decentralised distribution structures calls for radically new security foundations. Merabti, & Llewellyn-Jones (2006) suggest approaches to DRM which are rooted in cellular automata to establish trust between consuming and distributing nodes. The authors also mention Trusted Computing as a potential underlying technology.

The purport of this chapter is to show that Trusted Computing is a viable technology option for the security fundaments of old and new multimedia production and distribution models alike. The standardisation efforts of the Trusted Computing Group have produced what has the potential to become a universal security fundament for the information society. The distinct feature of the new technology is its inherently decentralised organisation. The consequences of this change of paradigms must not be underestimated. Though classical security systems, e.g. for access control and Public-Key Infrastructures (PKI), can easily be modelled using TC, the underlying trust models leave ample space for alternatives – already known or yet to be envisaged.

The chapter is organised as follows. Section 1.1 presents fundamental notions of Trusted Platforms which are essential for the understanding of the concepts outlined in Section 2, which structures the life-cycle of multimedia according to security requirements. Key usages of TC are highlighted in Section 2.2. Section 3 introduces TC on a more technical level, providing prerequisites for the architectural ideas sketched in Section 4. The latter presents two key concepts for TC application in multimedia content distribution, the first centred on mobile devices, the second on traditional Digital Video Broadcast (DVB) architectures. Section 5 contains a concluding discussion focused on security assessments and practical implications of this novel combination of technologies.

Key Terms in this Chapter

Privacy CA: One of the first protocols developed by the TCG the privacy certification authority (Privacy CA) offers as third party service pseudonyms which are used within all authentication protocols later on. Only the Privacy CA can later on bring together the identity of a certain user with the identity issued by the Privacy CA.

Secure Boot: In contrast to the trusted boot where all components are only measured and reported secure boot requires an internal verifier which decides on every step of boot if the boot will continue or not. At the end of the boot process the system is in a fully checked status.

DVB: Digital Video Broadcasting (DVB) is the standard for the broadcast of multimedia content. Substandards are defined for satellite (-S), terrestrial (-T), and mobile (-H) broadcasting which define the physical characteristics of the signal. DVB is based on the MPEG-2 coding of content and published by a Joint Technical Committee (JTC) of European Telecommunications Standards Institute (ETSI), European Committee for Electrotechnical Standardization (CENELEC) and European Broadcasting Union (EBU).

Trusted Boot: During boot each component is verified and the measurements are stored in a special log. Using the log together with the TPM produced reference an external verifier is able to judge if a certain platform is in a trustworthy state according to the verifier’s policies.

Trusted Platform Module (TPM): (From the TCG’s FAQ) The TPM is a microcontroller that stores keys, passwords and digital certificates. It typically is affixed to the motherboard of a PC. It potentially can be used in any computing device that requires these functions. The nature of this silicon ensures that the information stored there is made more secure from external software attack and physical theft. Security processes, such as digital signature and key exchange, are protected through the secure TCG subsystem. Access to data and secrets in a platform could be denied if the boot sequence is not as expected. Critical applications and capabilities such as secure email, secure web access and local protection of data are thereby made much more secure. TPM capabilities also can be integrated into other components in a system.

Mobile Trusted Module (MTM): The Mobile Phone Working Group (MPWG) derived from the specification of the TPM a mobile version which is adapted to the special technical and organisational requirements in this environment. The MTM defines isolated compartments providing secured and trustworthy environments for different stakeholders in the mobile economic chain.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Borko Furht
Shiguo Lian, Yan Zhang
Shiguo Lian, Yan Zhang
Chapter 1
Pramod A. Jamkhedkar, Gregory L. Heileman
Rights expression languages (RELs) form a central component of digital rights management (DRM) systems. The process of development of RELs... Sample PDF
Rights Expression Languages
Chapter 2
Deepali Brahmbhatt, Mark Stamp
This chapter presents a digital rights management (DRM) system designed for streaming media. A brief, general introduction to DRM is also provided... Sample PDF
Digital Rights Management for Streaming Media
Chapter 3
Jean-Henry Morin
This chapter introduces and discusses much needed alternatives to the traditional either/or debate on total security of secure multimedia... Sample PDF
Rethinking DRM Using Exception Management
Chapter 4
Mercè Serra Joan, Bert Greevenbosch, Anja Becker, Harald Fuchs
This chapter gives an overview of the Open Mobile AllianceTM Digital Rights Management (OMA DRM) standard, which allows for the secure distribution... Sample PDF
Overview of OMA Digital Rights Management
Chapter 5
Hugo Jonker, Sjouke Mauw
The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider, and the user... Sample PDF
Discovering the Core Security Requirements of DRM Systems by Means of Objective Trees
Chapter 6
Pallavi Priyadarshini, Mark Stamp
Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and... Sample PDF
Digital Rights Management for Untrusted Peer-to-Peer Networks
Chapter 7
L. Badia, A. Erta, U. Malesci
Traditional analog video surveillance systems technology has recently become inadequate to face the massive demand of security systems consisting of... Sample PDF
Pervasive Video Surveillance Systems Over TCP/IP Networks
Chapter 8
Ramya Venkataramu, Mark Stamp
Digital Rights Management (DRM) technology is used to control access to copyrighted digital content. Apple employs a DRM system known as Fairplay in... Sample PDF
P2PTunes: A Peer-to-Peer Digital Rights Management System
Chapter 9
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
This chapter advocates the convergence between Access Control (AC) models, focusing on the granularity of sharing, and Digital Right Management... Sample PDF
A Hardware Approach for Trusted Access and Usage Control
Chapter 10
Ionut Florescu
Regarding fundamental protocols in cryptography, the Diffie-Hellman (Diffie and Hellman, 1976) public key exchange protocol is one of the oldest and... Sample PDF
A Summary of Recent and Old Results on the Security of the Diffie-Hellman Key Exchange Protocol in Finite Groups
Chapter 11
Guojun Wang, Yirong Wu, Geyong Min, Ronghua Shi
Secret sharing aims at distributing and sharing a secret among a group of participants efficiently. In this chapter, we propose a plane-based access... Sample PDF
Secret Sharing with k-Dimensional Access Structure
Chapter 12
Supavadee Aramvith, Rhandley D. Cajote
Presently, both wireless communications and multimedia communications have experienced unequaled rapid growth and commercial success. Building on... Sample PDF
Wireless Video Transmission
Chapter 13
M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza
Establishing hidden communication is an important subject of discussion that has gained increasing importance recently, particularly with the... Sample PDF
A Survey of Information Hiding
Chapter 14
Fan Zhang
The digital multimedia, including text, image, graphics, audio, video, and so forth, has become a main way for information communication along with... Sample PDF
Digital Watermarking Capacity and Detection Error Rate
Chapter 15
Digital Watermarking  (pages 277-297)
Aidan Mooney
As Internet usage continues to grow, people are becoming more aware of the need to protect the display and presentation of digital documents.... Sample PDF
Digital Watermarking
Chapter 16
Pradeep K. Atrey, Abdulmotaleb El Saddik, Mohan Kankanhalli
Digital video authentication has been a topic of immense interest to researchers in the past few years. Authentication of a digital video refers to... Sample PDF
Digital Video Authentication
Chapter 17
Tieyan Li
The multimedia community is moving from monolithic applications to more flexible and scalable proliferate solutions. Security issues such as access... Sample PDF
Flexible Multimedia Stream Authentication
Chapter 18
K-G Stenborg
Media that is distributed digitally can be copied and redistributed illegally. Embedding an individual watermark in the media object for each... Sample PDF
Scalable Distribution of Watermarked Media
Chapter 19
Hafiz Malik
This chapter provides critical analysis of current state-of-the-art in steganography. First part of the this chapter provides the classification of... Sample PDF
Critical Analysis of Digital Steganography
Chapter 20
Esther Palomar, Juan M.E. Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Perhaps the most popular feature offered by Peer-to-Peer (P2P) networks is the possibility of having several replicas of the same content... Sample PDF
Secure Content Distribution in Pure P2P
Chapter 21
Andreas U. Schmidt, Nicolai Kuntze
Security in the value creation chain hinges on many single components and their interrelations. Trusted Platforms open ways to fulfil the pertinent... Sample PDF
Trust in the Value-Creation Chain of Multimedia Goods
Chapter 22
Goo-Rak Kwon, Sung-Jea Ko
The objective of this chapter introduces an advanced encryption of MP3 and MPEG-4 coder with a quality degradation-based security model. For the MP3... Sample PDF
Copyright Protection of A/V Codec for Mobile Multimedia Devices
Chapter 23
Frank Y. Shih, Yi-Ta Wu
Steganography is the art of hiding secret data inside other innocent media file. Steganalysis is the process of detecting hidden data which are... Sample PDF
Digital Steganography Based on Genetic Algorithm
Chapter 24
Guangjie Liu, Shiguo Lian, Yuewei Dai, Zhiquan Wang
Image steganography is a common form of information hiding which embeds as many message bits into images and keep the introduced distortion... Sample PDF
Adaptive Image Steganography Based on Structural Similarity Metric
Chapter 25
Shiguo Lian
Video watermarking technique embeds some information into videos by modifying video content slightly. The embedded information, named watermark, may... Sample PDF
A Survey on Video Watermarking
Chapter 26
Minglei Liu, Ce Zhu
Digital watermarking is a useful and powerful tool for multimedia security such as copyright protection, tamper proofing and assessment, broadcast... Sample PDF
Multiple Description Coding with Application in Multimedia Watermarking
Chapter 27
Hsuan T. Chang, Chih-Chung Hsu
This chapter introduces a pioneer concept in which multiple images are simultaneously considered in the compression and secured distribution... Sample PDF
Fractal-Based Secured Multiple-Image Compression and Distribution
About the Contributors