%0 Conference Paper %B Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on %D 2011 %T Secure video processing: Problems and challenges %A Lu,Wenjun %A Varna,A. %A M. Wu %K data;video %K fashion;secure %K management;secure %K of %K online %K privacy-preserving %K processing; %K processing;security %K signal %K video %X Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attention due to the increasing demand to enable rich functionalities for private data stored online. Desirable functionalities may include search, analysis, clustering, etc. In this paper, we discuss the research issues and challenges in secure video processing with focus on the application of secure online video management. Video is different from text due to its large data volume and rich content diversity. To be practical, secure video processing requires efficient solutions that may involve a trade-off between security and complexity. We look at three representative video processing tasks and review existing techniques that can be applied. Many of the tasks do not have efficient solutions yet, and we discuss the challenges and research questions that need to be addressed. %B Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on %P 5856 - 5859 %8 2011/05// %G eng %R 10.1109/ICASSP.2011.5947693 %0 Conference Paper %B Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on %D 2007 %T Colluding Fingerprinted Video using the Gradient Attack %A He,Shan %A Kirovski,D. %A M. Wu %K attack;multimedia %K attacks;digital %K content %K data;video %K distribution;fingerprint %K effort;gradient %K fingerprinted %K fingerprinting;disproportional %K fingerprints;colluding %K fingerprints;Laplace %K Gaussian %K identification;multimedia %K of %K processing; %K protection;unauthorized %K signal %K spectrum %K spread %K systems;security %K video;collusion %X Digital fingerprinting is an emerging tool to protect multimedia content from unauthorized distribution by embedding a unique fingerprint into each user's copy. Although several fingerprinting schemes have been proposed in related work, disproportional effort has been targeted towards identifying effective collusion attacks on fingerprinting schemes. Recent introduction of the gradient attack has refined the definition of an optimal attack and demonstrated strong effect on direct-sequence, uniformly distributed, and Gaussian spread spectrum fingerprints when applied to synthetic signals. In this paper, we apply the gradient attack on an existing well-engineered video fingerprinting scheme, refine the attack procedure, and demonstrate that the gradient attack is effective on Laplace fingerprints. Finally, we explore an improvement on fingerprint design to thwart the gradient attack. Results suggest that Laplace fingerprint should be avoided. However, we show that a signal mixed of Laplace and Gaussian fingerprints may serve as a design strategy to disable the gradient attack and force pirates into averaging as a form of adversary collusion. %B Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on %V 2 %P II-161 -II-164 - II-161 -II-164 %8 2007/04// %G eng %R 10.1109/ICASSP.2007.366197 %0 Conference Paper %B Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on %D 2000 %T Video access control via multi-level data hiding %A M. Wu %A Yu,Hong Heather %K access %K adaptive %K algorithms;hidden %K bits;high %K conditions;robustness;robustness-capacity %K control;adaptive %K data %K data;video %K design;user %K digital %K embedding;noise %K encapsulation;multimedia %K hiding %K hiding;multi-level %K information;data %K processing; %K QUALITY %K signal %K systems;authorisation;data %K systems;video %K technique;control %K tradeoff;system %K user %K video;multi-level %X The paper proposes novel data hiding algorithms and system design for high quality digital video. Instead of targeting on a single degree of robustness, which results in overestimation and/or underestimation of the noise conditions, we apply multi-level embedding to digital video to achieve more than one level of robustness-capacity tradeoff. In addition, an adaptive technique is proposed to determine how many bits are embedded in each part of the video. Besides user data, control information such as synchronization and the number of hidden user bits are embedded as well. The algorithm can be used for applications such as access control %B Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on %V 1 %P 381 -384 vol.1 - 381 -384 vol.1 %8 2000/// %G eng %R 10.1109/ICME.2000.869620