Adaptation-aware encryption of scalable H.264/AVC video for content security

نویسندگان

  • Hemantha Kodikara Arachchi
  • Xavier Perramon
  • Safak Dogan
  • Ahmet M. Kondoz
چکیده

Data encryption is one of the key information security technologies used for safeguarding multimedia content from unauthorised access and manipulation in end-to-end delivery and access chains. This technology, combined with the appropriate cryptographic methods, effectively prevents the content against malicious attacks, so as to protect its authenticity as well as integrity. While encryption based security is ensuring the authorised consumption of the multimedia content, content adaptation technologies have the primary goal of providing means for wider dissemination of the content across diverse networks, devices and users, and thus enriching user satisfaction and experience of the delivered content within a given set of usage environment constraints. Traditionally, protected contents can only be adapted at trusted adaptation engines residing between the source and end-users since they have to be fully decrypted before performing the necessary adaptation operations. The drawback of such a process is that it significantly limits the availability and flexibility of adaptation engines applicable for adapting protected contents on the fly. Thus, this paper proposes a novel scalable H.264/Advance Video Coding (AVC)-compatible video encryption technique, which is also transparent to adaptation engines in an end-to-end video delivery scenario. The proposed technology relies on keeping syntax elements required for performing the adaptation operations clear (i.e., not encrypted). The effectiveness of the proposed technique has been successfully verified in scenarios, where both conventional Joint Scalable Video Model (JSVM) bit stream extracting and random packet dropping mechanisms are used. * Corresponding author. Tel: +441483684742, Fax: +441483686011

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Data Security Transmission of H.264/AVC Video Stream

For the purpose of highly secure data transmission and privacy, sometime there is need of storage and encryption of digital video.During the encryption of video, the data hiding can be performed. In this paper proposed scheme is the secure data transmission with directly hiding data in the encrypted version of H.264/AVC videos is presented, which includes three parts are H.264/AVC video encrypt...

متن کامل

Selective Encryption using ISMA Cryp in Real Time Video Streaming of H.264/AVC for DVB-H Application

Multimedia information availability has increased dramatically with the advent of video broadcasting on handheld devices. But with this availability comes problems of maintaining the security of information that is displayed in public. ISMA Encryption and Authentication (ISMACryp) is one of the chosen technologies for service protection in DVB-H (Digital Video BroadcastingHandheld), the TV syst...

متن کامل

Conditional access techniques for H.264/AVC and H.264/SVC compressed video

Protection of video content calls for encryption of all or part of the compressed files. For the “conditional access” application, this requires to provide a video preview that is left in the clear, while the video enhancement information is encrypted. In this paper we propose four algorithms that provide the conditional access functionality. The first three algorithms are based on the idea of ...

متن کامل

Enhanced Data Hiding in Encrypted Video Streams

To maintain security and privacy, digital video needs to be processed in encrypted format. The data should be concealed in the encrypted videos for the purpose of content notation and also for the tampering detection. By following this data hiding in encrypted domain preserves the confidentiality of the content without decryption. The three major parts of a novels scheme of concealing the data ...

متن کامل

A Framework for MPEG-21 DIA Based Adaptation and Perceptual Encryption of H.264 Video

A ubiquitous computing concept permits end users to have access to multimedia and digital content anywhere, anytime and in any way they want. As a consequence, the importance of resource customization according to user preferences and device requirements set the primary challenge towards seamless access. Moreover, once a suitable customization approach has been decided (e.g. adaptation), deploy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Sig. Proc.: Image Comm.

دوره 24  شماره 

صفحات  -

تاریخ انتشار 2009