Skip to main content
Log in

A weakly secure multiple description coding scheme in lossy multipath channels for fine-grained SVC streaming

  • Regular Paper
  • Published:
CCF Transactions on Networking

Abstract

Video streaming service is growing rapidly these years. The quality of video streaming may suffer from issues like packet loss and solutions like multiple description coding (MDC) has been shown to provide flexible and distortion-rate optimal video streaming transmission over packet-loss links. On the other hand, the contents of stream are prone to attacks like eavesdropping while MDC is not specifically designed for security purpose. In this paper, fine grain scalably coded video data is channel-coded through multiple description-forward error correction (MD-FEC) coding. The resulting descriptions (packets) are then sent to a variety of channels, which may be peeked by an eavesdropper with certain probability. We adopt the weakly secure design here to reduce the quality of video obtained by the eavesdropper. Two weak security criteria for this problem are proposed, namely the deterministic overhearing peak-signal-to-noise-ratio (PSNR) constraint and the average overhearing PSNR constraint. The corresponding optimization algorithms are provided. Numerical results show that by applying weakly secure design, the PSNR value on the eavesdropper’s side will be reduced to the level at which useful details of the clip can hardly be exposed at the cost of reducing around 1–2 dB at the authorized receiver’s side.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. In this work we use “description” and “packet” interchangeably.

References

  • Adedoyin, S., Fernando, W.A.C., Karim, H.A., et al.: Scalable multiple description coding with side information using motion interpolation. IEEE Trans. Consum. Electron. 54(4), 2045–2052 (2008)

    Article  Google Scholar 

  • Albanese, A., Blomer, J., Edmonds, J., et al.: Priority encoding transmission. IEEE Trans. Inf. Theory 42(6), 1737–1744 (1996)

    Article  MathSciNet  Google Scholar 

  • Apostolopoulos, J.G.: Secure media streaming & secure adaptation for non-scalable video. In: 2004 International Conference on Image Processing, ICIP’04. IEEE, 2004, 3: 1763–1766 (2004)

  • Bagci, K.T., Gurler, C.G., Tekalp, A.M.: Scalable vs. multiple-description video coding for adaptive streaming over peer-to-peer networks, Image Processing (ICIP), 2013 20th IEEE International Conference on. In: IEEE, pp 1840-1844 (2013)

  • Bai, H., Zhao, Y., Zhang, M.: Standard-compliant multiple description video coding over packet loss network. EURASIP J. Adv. Signal Process. 2010, 71 (2010)

    Article  Google Scholar 

  • Blakley, G.R.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313 (1979)

    Google Scholar 

  • Cai, N., Yeung, R.W.: Secure network coding. In: Proceedings IEEE International Symposium on Information Theory,. IEEE, 323 (2002)

  • Chen, J., Liao, J., Zeng, H., et al.: Multiple description coding for multi-view video with adaptive redundancy allocation. In: Springer International Publishing, International Symposium on Intelligent Signal Processing & Communication Systems (2017)

  • Chen, L., Shashidhar, N., Liu, Q.: Scalable secure MJPEG video streaming. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops. IEEE, pp 111–115 (2012)

  • Cisco, I.: Cisco visual networking index: Forecast and methodology, CISCO White paper, (2017)

  • Dubin, R., Dvir, A., Pele, O., et al.: I know what you saw last minute-encrypted HTTP adaptive video streaming title classification. IEEE Trans. Inf. For. Secur. 12(12), 3039–3049 (2017)

    Article  Google Scholar 

  • Elshamy, A.M., Abdelghany, M.A., Alhamad, A.Q., Hamed, H.F.A., Kelash, H.M., Hussein, A.I.: Secure implementation for video streams based on fully and permutation encryption techniques. In: 2017 International Conference on Computer and Applications (ICCA), Doha, pp. 50–55 (2017) https://doi.org/10.1109/COMAPP.2017.8079738

  • Geem, Z.W., Kim, J.H., Loganathan, G.V.: A new heuristic optimization algorithm: harmony search. Simulation 76(2), 60–68 (2001)

    Article  Google Scholar 

  • Ghahremani, S., Ghanbari, M.: Error resilient video transmission in ad hoc networks using layered and multiple description coding. Multimed. Tools Appl. 76, 9033–9049 (2016)

    Article  Google Scholar 

  • Gong, Q., Woods, J.W., Kar, K.: Adaptive MD-FEC over multilink video distribution network, Image Processing (ICIP), 2016 IEEE International Conference on. In: IEEE, pp 2112–2116 (2016)

  • Huo, Y., Hellge, C., Wiegand, T., et al.: A tutorial and review on inter-layer FEC coded layered video streaming. IEEE Commun. Surv. Tutor. 17(2), 1166–1207 (2015)

    Article  Google Scholar 

  • Lima, L., Gheorghiu, S., Barros, J., et al.: Secure network coding for multi-resolution wireless video streaming. IEEE J. Sel. Areas Commun. 28(3), 377–388 (2010)

    Article  Google Scholar 

  • Liu, Y., New, Woods J.W., efficient interframe extensions of EZBC and JPEG,: multimedia signal processing (MMSP), 2017 IEEE 19th International Workshop on. In: Luton 2017, pp 1–6 (2000)

  • Mahdavi, M., Fesanghary, M., Damangir, E.: An improved harmony search algorithm for solving optimization problems. Appl. Math. Comput. 188(2), 1567–1579 (2007)

    MathSciNet  MATH  Google Scholar 

  • Majid, M., Owais, M., Anwar, S.M.: Visual saliency based redundancy allocation in HEVC compatible multiple description video coding. Multimed. Tools Appl. 77, 20955–20977 (2017)

    Article  Google Scholar 

  • Mohr, A.E., Ladner, R.E., Riskin, E.A.: Approximately optimal assignment for unequal loss protection, image processing, 2000. In: Proceedings. 2000 International Conference on. IEEE, 1: 367-370 (2000)

  • Puri, R., Ramchandran, K.: Multiple description source coding using forward error correction codes. Signals, systems, and computers, 1999. In: Conference Record of the Thirty-Third Asilomar Conference on. IEEE 1, 342–346 (1999)

  • Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  Google Scholar 

  • Silva, D., Kschischang, F.R.: Universal weakly secure network coding. In: IEEE Information Theory Workshop on Networking & Information Theory (2009)

  • Wang, Y., Reibman, A.R., Lin, S.: Multiple description coding for video delivery. Proc. IEEE 93(1), 57–70 (2005)

    Article  Google Scholar 

  • Xiang, L., Ng, D.W.K., Schober, R., et al.: Secure video streaming in heterogeneous small cell networks with untrusted cache helpers. IEEE Trans. Wirel. Commun. 17(4), 2645–2661 (2018)

    Article  Google Scholar 

  • Zhang, H., Ramasubramonian, A.K., Kar, K., et al.: Distortion-optimal receiver grouping for MD-FEC coded video streaming, Visual Communications and Image Processing (VCIP), 2012 IEEE. In: IEEE, pp 1-6 (2012)

  • Zhao, H.V., Liu, K.J.R.: Fingerprint multicast in secure video streaming. IEEE Trans. Image Process. 15(1), 12–29 (2005)

    Article  Google Scholar 

  • Zhu, X., Chen, C.W.: A joint source-channel adaptive scheme for wireless H. 264/AVC video authentication. IEEE Trans. Inf. For. Secur. 11(1), 141–153 (2015)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Southeast University research founding No. 4009019102. And is also supported by the National Key R&D Project No. 2018YFB1800202.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiushi Gong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gong, Q. A weakly secure multiple description coding scheme in lossy multipath channels for fine-grained SVC streaming. CCF Trans. Netw. 3, 66–80 (2020). https://doi.org/10.1007/s42045-020-00036-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42045-020-00036-9

Keywords

Navigation