DMCA
Efficient In-Network Adaptation of Encrypted H.264/SVC Content (2009)
Citations: | 10 - 5 self |
Citations
2419 | RTP: A Transport Protocol for Real-Time Applications
- Schulzrinne, Casner, et al.
(Show Context)
Citation Context ... Content Adaptation H.264/SVC enables easy adaptation: parts of the bitstream can simply be dropped. We showed in previous work [32,20] how in-network SVC adaptation can be implemented using RTSP/RTP =-=[37,36]-=-. The main component is an RTSP signaling-aware RTP mixer [36], in line with the MANE concept defined in [45]. Our SVC adaptation MANE (Figure 3) acts as an RTP mixer, which receives and delivers the ... |
1755 | Security architecture for the internet protocol - Kent, Seo - 2005 |
737 | Receiver-driven Layered Multicast
- McCanne, Jacobson
- 1996
(Show Context)
Citation Context ...ncur increased server load and increased reaction time to changes in the access network. There are further practical considerations. Compared to the well-known Receiver-driven Layered Multicast (RLM) =-=[26]-=- technique that delivers multiple streams, the MANE approach minimizes the number of firewall pinholes (to only one). In RLM, the base layer and the enhancement layers of a scalable bitstream are mult... |
378 | Reconciling two views of cryptography (the computational soundness of formal encryption
- Abadi, Rogaway
- 2000
(Show Context)
Citation Context ...ntiality in a strong cryptographic notion (highest level security). Modern security notions are equivalent to the property of ciphertext indistinguishability under a chosen plaintext attack (IND-CPA) =-=[1]-=-. Given two plaintexts and a ciphertext (randomly chosen from the two plaintexts), an adversary can not identify the plaintext with a probability better than 1/2. If one can link a plaintext and a cip... |
185 |
Information technology – coding of audio-visual objects
- ISOIEC
- 1999
(Show Context)
Citation Context ...andard [2] for secure streaming of multimedia data has been published by the Internet Streaming Media Alliance (ISMA). It offers secure streaming solutions on the basis of both the MPEG-4 file format =-=[14]-=- and RTP. ISMA Encryption and Authentication (ISMACryp) [2] handles content encryption and message authentication/integrity services. Content delivery is based on the RTP protocol, signaling and contr... |
132 |
SSL and TLS: Designing and building secure systems.
- Rescorla
- 2000
(Show Context)
Citation Context ...ay be implemented at different levels: • Transport level: Encryption is applied regardless of the content; packets or stream segments of the transport layer are encrypted (e.g., using IPsec [18], TLS =-=[33]-=-, SRTP [5]). • Meta format level: Encryption is applied within the scope of a meta for4mat, such as the ISO base media file format [15]. Approaches which employ bitstream descriptions (e.g., MPEG-21 ... |
121 |
RTP Profile for Audio and Video
- Schulzrinne
(Show Context)
Citation Context ...and IDR frame encryption) implemented with the SVC-specific encryption scheme is evaluated in Section 7. 153.2 Secure Real-Time Transport Protocol (SRTP) SRTP [5] extends the RTP audio/video profile =-=[35]-=- by adding security features such as encryption, authentication, and replay protection. It is located between the RTP application and the transport layer. The sent RTP packets are intercepted by SRTP ... |
76 |
Information technology – JPEG2000 image coding system, Part 1: Core coding system,
- ISOIEC
- 2000
(Show Context)
Citation Context ... the transport layer are encrypted (e.g., using IPsec [18], TLS [33], SRTP [5]). • Meta format level: Encryption is applied within the scope of a meta for4mat, such as the ISO base media file format =-=[15]-=-. Approaches which employ bitstream descriptions (e.g., MPEG-21 gBSD) and encryption fall into that category [27,13]. • Codec format level: Codec-specific encryption is commonly applied to preserve co... |
72 |
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication, ser.
- Uhl, Pommer
- 2005
(Show Context)
Citation Context ...tual format-compliant encryption routines have been specified in detail and the construction of IVs is discussed. For extensive overviews on multimedia encryption the interested reader is referred to =-=[40]-=- and [10]. 9 Conclusions In previous work [32], we showed how to enable RTP-compliant in-network H.264/SVC adaptation with a signaling-aware and stateful MANE. When using SRTP – the standard way of en... |
35 | Secure scalable streaming enabling transcoding without decryption. In:
- Wee, Apostolopoulos
- 2001
(Show Context)
Citation Context ...s is not dealt with in either ISMACryp or ARMS. The latter topic, i.e., enabling adaptation on untrusted nodes within the network, has been subject of considerable research carried out at the HP Labs =-=[43,42,44,4,28,27,3]-=-. The term “Secure Scalable Streaming” (SSS) has been introduced in [43], where SSS has been investigated for wireless networks. The approach has been extended in [42]. The basic idea is to add contro... |
30 | Secure Scalable Streaming and Secure Transcoding with JPEG-2000.
- Wee, G
- 2003
(Show Context)
Citation Context ...s is not dealt with in either ISMACryp or ARMS. The latter topic, i.e., enabling adaptation on untrusted nodes within the network, has been subject of considerable research carried out at the HP Labs =-=[43,42,44,4,28,27,3]-=-. The term “Secure Scalable Streaming” (SSS) has been introduced in [43], where SSS has been investigated for wireless networks. The approach has been extended in [42]. The basic idea is to add contro... |
26 |
Multimedia Security Handbook,
- Furht, Kirovski
- 2005
(Show Context)
Citation Context ...Thus the scalability information has to be accessible in the encrypted domain. 1.1.4 Format Compliance The preservation of format compliance is an important property of a multimedia encryption scheme =-=[8,38,40,9]-=-. In the case of H.264/SVC, format compliance means that the encrypted bitstream obeys all the syntactic and semantic requirements specified in [17]. Format-compliant encryption enables easy deploymen... |
26 |
Measuring the Strength of Partial Encryption Scheme,”
- Said
- 2005
(Show Context)
Citation Context ...umed that these schemes can not provide content security. Although currently no attacks against these two partial/selective encryption schemes are known, specific attacks similar to those outlined in =-=[34,8]-=- are probable. However, sufficient encryption may be in the scope of the partial/selective encryption schemes. Transparent encryption can only be implemented with the SVC-specific approach. Its implem... |
26 | Secure scalable video streaming for wireless networks. In:
- Wee, Apostolopoulos
- 2001
(Show Context)
Citation Context ...s is not dealt with in either ISMACryp or ARMS. The latter topic, i.e., enabling adaptation on untrusted nodes within the network, has been subject of considerable research carried out at the HP Labs =-=[43,42,44,4,28,27,3]-=-. The term “Secure Scalable Streaming” (SSS) has been introduced in [43], where SSS has been investigated for wireless networks. The approach has been extended in [42]. The basic idea is to add contro... |
26 |
RTP payload format for H.264 video
- Wenger, Stockhammer, et al.
- 2003
(Show Context)
Citation Context ...ate adaptations can be conducted efficiently. In order to enable the efficient transmission of non-scalable H.264 video content, a Real-time Transport Protocol (RTP) payload format has been developed =-=[45]-=-. An analogous specification is currently being developed for SVC [46]. This payload format enables the efficient adaptation of the SVC bitstream [32]. For many applications, not only efficient transm... |
17 | An H.264/ SVC-Based Adaptation Proxy on a WiFi Router,”
- Kofler, Prangl, et al.
- 2008
(Show Context)
Citation Context ... • Bitrate adaptations can be conducted rapidly (and judiciously, exploiting the layered encoding) by the MANE to cope with fluctuating access network conditions, especially in a wireless network. In =-=[20]-=-, we describe H.264/SVC adaptation on an off-the-shelf wireless router, demonstrating the feasibility of such a MANE. An alternative to the MANE approach would clearly be server-side adaptation. In th... |
8 |
Architectural principles for secure streaming & secure adaptation in the developing scalable video coding (SVC) standard
- Apostolopoulos
- 2006
(Show Context)
Citation Context ...s is not dealt with in either ISMACryp or ARMS. The latter topic, i.e., enabling adaptation on untrusted nodes within the network, has been subject of considerable research carried out at the HP Labs =-=[43,42,44,4,28,27,3]-=-. The term “Secure Scalable Streaming” (SSS) has been introduced in [43], where SSS has been investigated for wireless networks. The approach has been extended in [42]. The basic idea is to add contro... |
8 |
Macq and Jean-Jacques Quisquater. Cryptology for digital TV broadcasting
- Benoit
- 1995
(Show Context)
Citation Context ...me decoder implementations. This is highly inconvenient for an end-user at the client when, e.g., its set-top box freezes. Format-compliance is therefore fundamental transparent/perceptual encryption =-=[23]-=-. Transparent encryption (also called perceptual encryption, predominantly in the area of audio encryption) has been introduced mainly in the context of digital TV broadcasting: a pay TV broadcaster d... |
7 | A.: Format-compliant JPEG2000 encryption in JPSEC: Security, applicability and the impact of compression parameters
- Engel, Stütz, et al.
(Show Context)
Citation Context ...nt on the basis of header data is impossible for H.264/SVC. This not the case for all standards, e.g., coarse reconstructions of the image content are possible on the basis of JPEG2000 packet headers =-=[7,8]-=-). Naturally the weaker requirements of sufficient encryption can be met too. If the SVC-specific encryption is applied in a partial/selective fashion, namely the encryption of the base layer or the I... |
7 |
Advanced video coding for generic audivisual services
- 264
- 2007
(Show Context)
Citation Context ... issue of scalable content encryption and adaptation is discussed on the basis of two encryption schemes for H.264/SVC (Scalable Video Coding), the most recently standardized video compression format =-=[17]-=-. SVC is the scalable extension of H.264/AVC and has been designed to enable efficient adaptation to the preferred usage context of each individual consumer, i.e., to satisfy the requirements of moder... |
6 | Securing media for adaptive streaming
- Venkatramani, Westerink, et al.
- 2003
(Show Context)
Citation Context ... and the Real Time Streaming Protocol (RTSP) [37]. ISMACryp provides cryptographic metadata for each access unit and features, amongst others, selective encryption, key rotation and random-access. In =-=[41]-=-, ARMS streaming (Adaptive Rich Media Secure) is introduced, which enables secure transmission of media data encoded in multiple independent streams. ARMS utilizes only stream switching, so no in-netw... |
6 |
Scalable protection and access control in full scalable video coding
- Won, Bae, et al.
(Show Context)
Citation Context ... motion vector data [21], the encryption of coefficient data and the perturbation of motion vectors [24], and the encryption of coefficient signs [30]. Most of the previous work on SVC encryption [19]=-=[48]-=-[3] is based on a draft standard that has significantly changed (e.g., in the meantime FGS has been removed). A compression integrated approach for SVC encryption is presented in [48]: sign encryption... |
5 | Conditional access to H.264/AVC video with drift control
- Magli, Grangetto, et al.
- 2006
(Show Context)
Citation Context ...plement encryption during compression, e.g., the scrambling of the intra prediction modes [12] or of motion vector data [21], the encryption of coefficient data and the perturbation of motion vectors =-=[24]-=-, and the encryption of coefficient signs [30]. Most of the previous work on SVC encryption [19][48][3] is based on a draft standard that has significantly changed (e.g., in the meantime FGS has been ... |
5 |
A framework for fully format-independent adaptation of scalable bit-streams
- Mukherjee, Said, et al.
- 2005
(Show Context)
Citation Context ...is applied within the scope of a meta for4mat, such as the ISO base media file format [15]. Approaches which employ bitstream descriptions (e.g., MPEG-21 gBSD) and encryption fall into that category =-=[27,13]-=-. • Codec format level: Codec-specific encryption is commonly applied to preserve codec specific features, most importantly scalability. For IPTV and VoD, encryption of multimedia data with a cryptogr... |
5 |
Format independent encryption of generalized scalable bit-streams enabling arbitrary secure adaptations
- Mukherjee, Wang, et al.
- 2005
(Show Context)
Citation Context ...s is not dealt with in either ISMACryp or ARMS. The latter topic, i.e., enabling adaptation on untrusted nodes within the network, has been subject of considerable research carried out at the HP Labs =-=[43,42,44,4,28,27,3]-=-. The term “Secure Scalable Streaming” (SSS) has been introduced in [43], where SSS has been investigated for wireless networks. The approach has been extended in [42]. The basic idea is to add contro... |
5 |
A Novel Secure H.264 Transcoder using Selective Encryption.
- Nithin, Damien, et al.
- 2007
(Show Context)
Citation Context ...he scrambling of the intra prediction modes [12] or of motion vector data [21], the encryption of coefficient data and the perturbation of motion vectors [24], and the encryption of coefficient signs =-=[30]-=-. Most of the previous work on SVC encryption [19][48][3] is based on a draft standard that has significantly changed (e.g., in the meantime FGS has been removed). A compression integrated approach fo... |
5 | Format-compliant Encryption of H.264/AVC and SVC
- Stutz, Uhl
- 2008
(Show Context)
Citation Context ...chemes have been postulated, at least for SVC this has not yet been shown experimentally in a real-world-based set-up). (2) The SVC-specific encryption approach enhances and details own previous work =-=[39]-=- by substantial improvements regarding the encryption processes. A more secure encryption mode is applied and the formatcompliant encryption routines are discussed in detail. (3) Selective encryption ... |
4 | The emerging JPEG2000 security (JPSEC) standard - Apostolopoulos, Dufaux, et al. - 2006 |
4 |
Y.-Z.: A Quality-Controllable Encryption for H.264/AVC Video Coding
- Hong, Yuan, et al.
- 2006
(Show Context)
Citation Context ... specific encryption proposals, including several for H.264/AVC: many of the previously proposed approaches implement encryption during compression, e.g., the scrambling of the intra prediction modes =-=[12]-=- or of motion vector data [21], the encryption of coefficient data and the perturbation of motion vectors [24], and the encryption of coefficient signs [30]. Most of the previous work on SVC encryptio... |
3 |
A survey on jpeg2000 encryption. Multimedia systems
- Engel, Stütz, et al.
(Show Context)
Citation Context ...Thus the scalability information has to be accessible in the encrypted domain. 1.1.4 Format Compliance The preservation of format compliance is an important property of a multimedia encryption scheme =-=[8,38,40,9]-=-. In the case of H.264/SVC, format compliance means that the encrypted bitstream obeys all the syntactic and semantic requirements specified in [17]. Format-compliant encryption enables easy deploymen... |
3 |
D.: Multimedia Encryption and Watermarking. Volume 28 of Multimedia Systems and Applications
- Furht, Muharemagic, et al.
- 2005
(Show Context)
Citation Context ...at-compliant encryption routines have been specified in detail and the construction of IVs is discussed. For extensive overviews on multimedia encryption the interested reader is referred to [40] and =-=[10]-=-. 9 Conclusions In previous work [32], we showed how to enable RTP-compliant in-network H.264/SVC adaptation with a signaling-aware and stateful MANE. When using SRTP – the standard way of encrypting ... |
3 |
Digital video scrambling using motion vector and slice relocation
- Kwon, Choi, et al.
- 2005
(Show Context)
Citation Context ..., including several for H.264/AVC: many of the previously proposed approaches implement encryption during compression, e.g., the scrambling of the intra prediction modes [12] or of motion vector data =-=[21]-=-, the encryption of coefficient data and the perturbation of motion vectors [24], and the encryption of coefficient signs [30]. Most of the previous work on SVC encryption [19][48][3] is based on a dr... |
2 |
Shervin Shirmohammadi, Abdulmotaleb El Saddik, and Jiying Zhao. Compressed-domain video processing for adaptation, encryption, and authentication
- Iqbal
- 2008
(Show Context)
Citation Context ...is applied within the scope of a meta for4mat, such as the ISO base media file format [15]. Approaches which employ bitstream descriptions (e.g., MPEG-21 gBSD) and encryption fall into that category =-=[27,13]-=-. • Codec format level: Codec-specific encryption is commonly applied to preserve codec specific features, most importantly scalability. For IPTV and VoD, encryption of multimedia data with a cryptogr... |
2 | Special Issue on Scalable Video Coding – Standardization and Beyond - Wiegand, Ohm, et al. - 2007 |
1 | libSRTP: a library for secure rtp. http://srtp.sourceforge.net/srtp.html - Systems, Inc |
1 |
Securing Internet Telephony Media with SRTP and SDP. Cisco White Paper. http://www.cisco.com/web/about/security/intelligence/securing-voip.html
- Baugher, McGrew, et al.
(Show Context)
Citation Context ...ase in the SVC-specific encryption scheme presented in Section 3.1, where the NAL unit header and the SVC extension header are available in plaintext. • The MANE has to be within the security context =-=[25]-=- (in case of full encryption like in SRTP), such that encrypted video data can be decrypted before adaptation. 16Figure 5. SVC-specific adaptation system In Sections 4.1 and 4.2, we describe two in-n... |
1 |
Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG. Joint Scalable Video Model. Doc
- Kuschnig, Kofler, et al.
- 2007
(Show Context)
Citation Context ...frames. This results in 582 distinct sequences, of which some are very similar, e.g., the subsequences of the Akiyo sequence. The bitstreams were generated using the Joint Scalable Video Model (JSVM) =-=[31]-=- 9.14 software. The encoder configuration has been chosen to meet requirements of a VoD system; the scalable bitstream contains a QCIF substream (compliant to the H.264 baseline profile) and two CIF M... |
1 |
Hari Kalva, Spyros Magliveras, Oge Marques, Dubravko Ćulibrk, and Borko Furht. New approaches to encryption and steganography for digital videos
- Socek
(Show Context)
Citation Context ...Thus the scalability information has to be accessible in the encrypted domain. 1.1.4 Format Compliance The preservation of format compliance is an important property of a multimedia encryption scheme =-=[8,38,40,9]-=-. In the case of H.264/SVC, format compliance means that the encrypted bitstream obeys all the syntactic and semantic requirements specified in [17]. Format-compliant encryption enables easy deploymen... |