When selective encryption is used for security in DRM schemessome informationofthe originalbitstream is intentionallyleft in plaintext. Thiscanhave variousreasons, e.g. generatingpreviewversionsfortryandbuyscenarios. Inthe case of the MC-EZBC there is also the goal of retaining the scaling capability in the encrypted domain. However, since parts of the bitstream remain in plaintext this information is available to a potential attacker at all times. In this paper we will assess which attacks can be done with this residual information. Consequently we will extend a prior version of selective encryptionfor the MC-EZBC to include motion vectors
To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.