Results 1 -
5 of
5
Efficient In-Network Adaptation of Encrypted H.264/SVC Content
, 2009
"... This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC). RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and VoD scenario are considered. Two basic alternatives to implement encryption and adaptation of H.264/SVC conten ..."
Abstract
-
Cited by 10 (5 self)
- Add to MetaCart
(Show Context)
This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC). RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and VoD scenario are considered. Two basic alternatives to implement encryption and adaptation of H.264/SVC content are investigated: (i) full, format-independent encryption making use of Secure RTP (SRTP); (ii) SVC-specific encryption that leaves the metadata relevant for adaptation (NAL unit headers) unencrypted. The SRTP-based scheme (i) is straightforward to deploy, but requires the MANE to be in the security context of the delivery, i.e., to be a trusted node. For adaptation, the content needs to be decrypted, scaled, and re-encrypted. The SVC-specific approach (ii) enables both full and selective encryption, e.g., of the base layer only. SVC-specific encryption is based on own previous work, which is substantially extended and detailed in this paper. The adaptation MANE can now be an untrusted node; adaptation becomes a low-complexity process, avoiding full decryption and re-encryption of the content. This paper presents the first experimental comparison of these two approaches and evaluates whether multimedia-specific encryption can lead to performance and application benefits. Potential security threats and security properties of the two approaches in the IPTV and VoD scenario are elementarily analyzed. In terms of runtime performance on the MANE our SVC-specific encryption scheme significantly outperforms the SRTP-based approach. SVC-specific encryption is also superior in terms of induced end-to-end delays. The performance can even be improved by selective application of the SVC-specific encryption scheme. The results indicate that efficient adaptation of SVC-encrypted content on low-end, untrusted network devices is feasible.
Saddik, “A Framework for MPEG-21 DIA Based Adaptation and Perceptual Encryption of H.264 Video
- Proc. of SPIE/ACM MMCN
, 2007
"... A ubiquitous computing concept permits end users to have access to multimedia and digital content anywhere, anytime and in any way they want. As a consequence, the importance of resource customization according to user preferences and device requirements set the primary challenge towards seamless ac ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
(Show Context)
A ubiquitous computing concept permits end users to have access to multimedia and digital content anywhere, anytime and in any way they want. As a consequence, the importance of resource customization according to user preferences and device requirements set the primary challenge towards seamless access. Moreover, once a suitable customization approach has been decided (e.g. adaptation), deploying it in the existing network requires a generic and widely accepted standard applied to the process. With the advancement of time, performing encryption in the compressed domain should also be taken care of not only for serving sensitive digital contents but also for offering security as an embedded feature of the adaptation practice to ensure digital right management and confidentiality. In this paper, we present an architecture for temporal adaptation of ITU-T H.264 video conforming to ISO/IEC MPEG-21 DIA. In addition, we present a perceptual encryption scheme that is integrated in the system for video encryption. The framework enables video bitstreams to be adapted and encrypted in the compressed domain, eliminating cascaded adaptation (i.e. decoding-adaptation- encoding). The encryption framework is applied on the adapted video content, which reduces computational overhead compared to that on the original content. A prototype, based on the proposed architecture and experimental evaluations of the system as well as its performance supporting the architecture are also presented. Keywords: Video adaptation, Perceptual encryption, MPEG-21 DIA, H.264. 1.
Saddik, “Secured MPEG-21 Digital Item Adaptation for H.264 Video
- Proc. IEEE Intl. Conf. on Multimedia and Expo (ICME
, 2006
"... Seamless adaptation and transcoding techniques to adapt the digital content have achieved significant focus to serve the consumers with the desired content in a feasible way. With the succession of time we sense that secured adaptation should also be taken care of for not only serving sensitive digi ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Seamless adaptation and transcoding techniques to adapt the digital content have achieved significant focus to serve the consumers with the desired content in a feasible way. With the succession of time we sense that secured adaptation should also be taken care of for not only serving sensitive digital contents but also to offer security as an embedded feature of the adaptation practice to ensure digital right management and confidentiality. In this paper, we propose an encryption framework for a transcoder while adapting H.264 video conforming to MPEG-21 DIA. Encryption mechanism is applied on the adapted video content thus reducing computational overhead compared to that on the original content. 1.
Compressed-domain Encryption of Adapted H.264 Video
"... Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personalized security of the video contents in an intermediary node, it is necessary to have the content structure conforming to ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personalized security of the video contents in an intermediary node, it is necessary to have the content structure conforming to an international standard. Moreover, pressure to satisfy user preferences and device requirements seamlessly are raising the need for content to be customized providing the best possible experience. In this paper, we present perceptual encryption scheme for video encryption that is incorporated with a dynamic temporal adaptation technique of the H.264 video conforming ISO/IEC MPEG-21 Digital Item Adaptation. Encryption is performed on demand directly from the adapted bitstream and its generic Bitstream Syntax Description (gBSD). 1.
Format-Independent Authentication of Arbitrary Scalable Bit-Streams Using One-Way Accumulators
, 2006
"... one-way accumulator, authentication, scalable bit-stream, formatindependent We propose a mechanism for authentication of general scalable bitstreams, based on quasi-commutative one-way accumulator functions. Such functions allow flexible partitioning between an auxiliary hash computed for removed pa ..."
Abstract
- Add to MetaCart
(Show Context)
one-way accumulator, authentication, scalable bit-stream, formatindependent We propose a mechanism for authentication of general scalable bitstreams, based on quasi-commutative one-way accumulator functions. Such functions allow flexible partitioning between an auxiliary hash computed for removed parts of an original bitstream and the hash that a receiver can compute from the received bit-stream, and yet allow generation of a common root hash for the original bit-stream against which the authentication may be conducted. Unlike prior work using Merkle hash trees, the number of auxiliary hashes to be transmitted is always one, independent of the actual version of the bit-stream to be authenticated, and the mechanism is independent of the order of hash accumulation. Further, the method readily lends itself to formatindependent authentication and adaptation mechanism by use of appropriate standardized metadata.