Results 1 -
8 of
8
A survey of H.264 AVC/SVC encryption
- IEEE Trans. on Circuits and Systems for Video Technology
, 2012
"... Abstract—Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give ..."
Abstract
-
Cited by 11 (2 self)
- Add to MetaCart
(Show Context)
Abstract—Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give researchers and practitioners an analytic and critical overview of the state-of-the-art of video encryption narrowed down to its joint application with the H.264 standard suite and associated protocols (packag-ing / streaming) and processes (transcoding / watermarking). I.
Efficient In-Network Adaptation of Encrypted H.264/SVC Content
, 2009
"... This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC). RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and VoD scenario are considered. Two basic alternatives to implement encryption and adaptation of H.264/SVC conten ..."
Abstract
-
Cited by 10 (5 self)
- Add to MetaCart
(Show Context)
This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC). RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and VoD scenario are considered. Two basic alternatives to implement encryption and adaptation of H.264/SVC content are investigated: (i) full, format-independent encryption making use of Secure RTP (SRTP); (ii) SVC-specific encryption that leaves the metadata relevant for adaptation (NAL unit headers) unencrypted. The SRTP-based scheme (i) is straightforward to deploy, but requires the MANE to be in the security context of the delivery, i.e., to be a trusted node. For adaptation, the content needs to be decrypted, scaled, and re-encrypted. The SVC-specific approach (ii) enables both full and selective encryption, e.g., of the base layer only. SVC-specific encryption is based on own previous work, which is substantially extended and detailed in this paper. The adaptation MANE can now be an untrusted node; adaptation becomes a low-complexity process, avoiding full decryption and re-encryption of the content. This paper presents the first experimental comparison of these two approaches and evaluates whether multimedia-specific encryption can lead to performance and application benefits. Potential security threats and security properties of the two approaches in the IPTV and VoD scenario are elementarily analyzed. In terms of runtime performance on the MANE our SVC-specific encryption scheme significantly outperforms the SRTP-based approach. SVC-specific encryption is also superior in terms of induced end-to-end delays. The performance can even be improved by selective application of the SVC-specific encryption scheme. The results indicate that efficient adaptation of SVC-encrypted content on low-end, untrusted network devices is feasible.
Format-compliant Encryption of H.264/AVC and SVC
, 2008
"... An encryption approach for H.264/AVC and SVC is proposed. Although the bitstream (format stream) is encrypted with state-of-the-art symmetric ciphers, H.264/AVC and SVC compliance is preserved. Standard compliant encoder/decoder and conventional symmetric ciphers, e.g., in specialized hardware, can ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
An encryption approach for H.264/AVC and SVC is proposed. Although the bitstream (format stream) is encrypted with state-of-the-art symmetric ciphers, H.264/AVC and SVC compliance is preserved. Standard compliant encoder/decoder and conventional symmetric ciphers, e.g., in specialized hardware, can still be employed – a significant advantage compared to previous work. The approach is suitable for a wide range of application scenarios.
Authentication of Scalable Video Streams With Low Communication Overhead
"... Abstract—The large prevalence of multimedia systems in recent years makes the security of multimedia communications an important and critical issue. We study the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity of the video content. Our focus i ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract—The large prevalence of multimedia systems in recent years makes the security of multimedia communications an important and critical issue. We study the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity of the video content. Our focus is on recent scalable video coding (SVC) techniques, such as H.264/SVC, which can provide three scalability types at the same time: temporal, spatial, and visual quality. This three-dimensional scalability offers a great flexibility that enables customizing video streams for a wide range of heterogeneous receivers and network conditions. This flexibility, however, is not supported by current stream authentication schemes in the literature. We propose an efficient and secure authentication scheme that accounts for the full scalability of video streams, and enables verification of all possible substreams that can be extracted from the original stream. In addition, we propose an algorithm for minimizing the amount of authentication information that need to be attached to streams. The proposed authentication scheme supports end-to-end authentication, in which any third-party entity involved in the content delivery process, such as stream adaptation proxies and caches, does not have to understand the authentication mechanism. Our simulation study with real video traces shows that the proposed authentication scheme is robust against packet losses, incurs low computational cost for receivers, has short delay, and adds low communication overhead. Finally, we implement the proposed authentication scheme as an open source library called svcAuth, which can be used as a transparent add-on by any multimedia streaming application. Index Terms—Multimedia authentication, multimedia streaming, scalable video streams. I.
Quality-Optimized and Secure End-to-End Authentication for Media Delivery
"... Abstract—The need for security services, such as confidentiality and authentication, have become one of the major concerns in multimedia communication applications, such as video on demand and peer-to-peer content delivery. Conventional data authentication can not be directly applied for streaming m ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract—The need for security services, such as confidentiality and authentication, have become one of the major concerns in multimedia communication applications, such as video on demand and peer-to-peer content delivery. Conventional data authentication can not be directly applied for streaming media when an unreliable channel is used and packet loss may occur. This paper begins by reviewing existing end-toend media authentication schemes, which can be classified into stream-based and content-based techniques. We then motivate and describe how to design authentication schemes for multimedia delivery which exploit the unequal importance of different packets. By applying conventional cryptographic hashes and digital signatures to the media packets, the system security is similar to that achievable in conventional data security. However, instead of optimizing packet verification probability, we optimize the quality of the authenticated media, which is determined by the packets which are received, decodable, and authenticatable. The quality of the authenticated media is optimized by allocating the authentication resources unequally across streamed packets based on their relative importance, thereby providing unequal authenticity protection (UAP). The effectiveness of this approach is demonstrated through experimental results on different media types (image and video), different compression standards (JPEG, JPEG2000, and H.264) and different channels (wired with packet erasures and wireless with bit errors). Index Terms—media authentication, media security, streaming media authentication, stream authentication, video streaming M I.
INVITED PAPER Quality-Optimized and Secure End-to-End Authentication for Media Delivery
, 2006
"... For secure reception of quality video, techniques to guarantee that data comes from the authorized sender and has not been altered should be balanced by measures to minimize image distortion. ..."
Abstract
- Add to MetaCart
For secure reception of quality video, techniques to guarantee that data comes from the authorized sender and has not been altered should be balanced by measures to minimize image distortion.
APPROVAL
"... All rights reserved. However, in accordance with the Copyright Act ..."
(Show Context)