Multimedia Tools and Applications

, Volume 76, Issue 11, pp 13139–13152 | Cite as

Interoperable conditional access with video selective encryption for portable devices

  • Mamoona Naveed Asghar
  • Martin Fleury
  • Sohail Makki
Article

Abstract

The pay-TV industry seeks to extend its reach to portable display devices. At the same time, it seeks to ensure a horizontal market by making interoperable the Conditional Access Systems (CASs) employed to protect content. To achieve interoperability for such devices, this paper proposes a form of selective encryption for video that allows simultaneous distribution of a small percentage of video data on a per-CAS basis, allowing sharing of the unencrypted video between the CASs. The bitrate overhead for each additional CAS enabled is found to be on average 7.41 %, whereas the computational overhead amounts to no more than 40 ms for the benchmark sequences tested. Adaptation of CAS to transparent encryption of scalable video is also demonstrated in this paper.

Keywords

Conditional access Pay-TV Selective encryption Video streaming 

References

  1. 1.
    ARRIS (2015) Joint Statement on DSTAC Report. Available at http://apps.fcc.gov/ecfs/comment/view?id=60001099145, retrieved 04/25/16
  2. 2.
    Asghar MN, Ghanbari M (2012) MIKEY for keys management of H.264 scalable video coded layers. J King Saud Univ – Comput Inform Sci 24(2):107–116Google Scholar
  3. 3.
    Asghar MN, Fleury M, Ghanbari M (2012) Key management protocols for secure wireless multimedia services: a review. Recent Patents on Telecommunications 1(1):41–53CrossRefGoogle Scholar
  4. 4.
    Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014a) Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multimedia Tools and Applications, http://link.springer.com/article/10.1007%2Fs11042-014-2160-6 Accessed 30th Sept. 2015
  5. 5.
    Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014b) Confidentiality of a selectively encrypted H.264 coded video bit-stream. J Vis Commun Image Represent 25(2):487–498CrossRefGoogle Scholar
  6. 6.
    Bing B (2010) 3D and HD broadband video networking. Artech House, NorwoodGoogle Scholar
  7. 7.
    Boyadjis, B, Perrin, M-E, Bergeron, C, Lecomte, S, (2014) A real-time ciphering transcoder for H.264 and HEVC streams. In: IEEE Int. Conf. Image Process., pp 3432–3434Google Scholar
  8. 8.
    Brown R (2015) Downloadable security and the future of CableCards. Article available at http://www.cablelabs.com/downloadable-security-and-the-future-of-cablecards/, retrieved 04/25/16
  9. 9.
    Chen, T, Lanchi, X, Xingjun W (2013) Combination of DRM and mobile code: a practice to protect TV contents and applications on android smartphone. In: IEEE Int. Conf. on Networking and Distrib. Comput., pp 89–93Google Scholar
  10. 10.
    Chow S, Eisen P, Johnson H, van Oorschot PC (2002) White-box cryptography and an AES implementation. In: 9th Annu. Workshop on Sel. Areas in Cryptography, pp 250–270Google Scholar
  11. 11.
    Clayson PL, Dallard NS (1997) System issues in the implementation of DVB Simulcrypt conditional access. In: Proc. Int. Broadcast. Conv., pp 470–475Google Scholar
  12. 12.
    Coutrot F, Michon V (1989) A single conditional access system for satellite-cable and terrestrial TV. IEEE Trans Consum Electron 35(3):464–468CrossRefGoogle Scholar
  13. 13.
    Deng RH, Ding X, Wu Y, Wei Z (2014) Efficient block-based transparent encryption of H.264/SVC bitstreams. Multimedia Systems 20(2):165–178CrossRefGoogle Scholar
  14. 14.
    Downloadable Security Technology Advisory Committee (2015) DSTAC Summary Report. 344 pages. Available from https://transition.fcc.gov/dstac/dstac-report, retrieved 04/25/16
  15. 15.
    Hong D, Wonkap J, Boyce J, Abbas A (2012) Scalability support in HEVC. In: IEEE Int. Symp. on Circuits Syst., pp 890–893Google Scholar
  16. 16.
    Huynh-Thu Q, Ghanbari M (2012) The accuracy of PSNR in predicting video quality for different scenes and frame rates. Telecommun Syst 49(1):35–48CrossRefGoogle Scholar
  17. 17.
    ITU Radiocommunication Assembly (1992) Conditional-Access Broadcasting System, ITU-R Rec. BT.810Google Scholar
  18. 18.
    Jakobsson M, Reiter MK (2002) Discouraging software piracy using software aging. In: Security and Privacy in Digital Rights Management, pp 1–12Google Scholar
  19. 19.
    Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: Proc. Ninth Int. Conf. Networks, pp 140–145Google Scholar
  20. 20.
    Kaufman C, Perlman R, Speciner M (2002) Network security: private communications in a public world. Prentice Hall, Upper Saddle RiverGoogle Scholar
  21. 21.
    Koo H-S (2015) Downloadable multi-CA/DRM service model and architecture for mobile broadcasting. In: IEEE Int. Conf. on Inform. and Commun. Technol. Convergence, pp 722–724Google Scholar
  22. 22.
    Li S, Chen G, Cheung A, Bhargava B, Lo K-T (2007) On the design of perceptual MPEG-video encryption algorithms. IEEE Trans Circuits Syst Video Technol 17(2):1–10CrossRefGoogle Scholar
  23. 23.
    Lookabaugh T, Sicke DC (2004) Selective encryption for consumer applications. IEEE Commun Mag 42(5):124–129CrossRefGoogle Scholar
  24. 24.
    Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264 video compression standard. IEEE Trans Circuits Syst Video Technol 13(4):620–636CrossRefGoogle Scholar
  25. 25.
    Massoudi, A, Lefebvre, F, De Vleeschouwer, C, Macq, B, Quisquater, JJ (2008) Overview on selective encryption of image and video: Challenges and perspective. EURASIP J Inf Security, vol. 2008, article no. 5, 1–18.Google Scholar
  26. 26.
    Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca RatonCrossRefMATHGoogle Scholar
  27. 27.
    Mikityuk A, Zachey B, Friedrich O (2014) Digital rights management and its evolution in the context of IPTV platforms in the web domain. In: IEEE/CIC Symp. on Privacy and Security in Commun., pp 193–198Google Scholar
  28. 28.
    Moon J, Kim J, Park J, Paik E (2008) Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software. In: 3rd Int. Conf. on Convergence and Hybrid Inform. Technol. for the IPTV Syst., pp 380–385Google Scholar
  29. 29.
    Pedlow Jr. LM, Agnihotri D (2007) Batch-mode session-based encryption of Video on Demand content. US patent no. 7,263,187 B2Google Scholar
  30. 30.
    Pinson MN, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50(3):312–322CrossRefGoogle Scholar
  31. 31.
    Rosenblatt B (2011) The new technologies for pay TV content security. White Paper, GiantSteps Media Technology StrategiesGoogle Scholar
  32. 32.
    Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans Circuits Syst Video Technol 17(9):1103–1120CrossRefGoogle Scholar
  33. 33.
    Shahid Z, Puech W (2014) Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans Multimedia 16(1):24–36CrossRefGoogle Scholar
  34. 34.
    Shirazi H, Cosmas J, Cutts D (2010) A cooperative cellular and broadcast system conditional access system for pay-TV systems. IEEE Trans Broadcast 56(1):44–57CrossRefGoogle Scholar
  35. 35.
    Sodagar I (2011) The MPEG-DASH standard for multimedia streaming over the internet. IEEE Multimedia 18(4):62–67CrossRefGoogle Scholar
  36. 36.
    Sullivan GJ, Ohm J-R, Han W-J, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circuits Syst Video Technol 22(12):1649–1668CrossRefGoogle Scholar
  37. 37.
    Sun H-M, Leu M-C (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959CrossRefGoogle Scholar
  38. 38.
    Tews E, Wälde J, Weiner M (2011) Breaking DVB-CAS. In: Proc. West European Workshop on Research in Cryptography, pp 96–99Google Scholar
  39. 39.
    van Rijnsoever BJ, Lenoir P, Linnartz JP (2003) Interoperable protection for digital multimedia content. J VLSI Signal Process 34(1):167–179CrossRefMATHGoogle Scholar
  40. 40.
    van Someren N, Shamir A (1999) Playing hide and seek with keys. Financial Cryptography 99:118–124MATHGoogle Scholar
  41. 41.
    Van Wallendael G, Boho A, De Cock J, Munteanu A, Van de Walle R (2013) Encryption for high efficiency video coding with video adaptation capabilities. IEEE Trans Consum Electron 59(3):634–642CrossRefGoogle Scholar
  42. 42.
    Wan J, Liu J, Zhang R, Deng RH (2013) A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Trans Multimedia 15(6):1353–1364CrossRefGoogle Scholar
  43. 43.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  44. 44.
    Weinmann, Wirt, K (2004) Analysis of the DVB Common Scrambling Algorithm. In: Proc. Eighth IFIP TC-6 TC-11 Conf. on Commun. and Multimedia Security, pp 195–207Google Scholar
  45. 45.
    Wiegand T, Sullivan JG, Bjøntegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560–576CrossRefGoogle Scholar
  46. 46.
    Zimmermann, P, Johnston, A, Avvaya, E, Callas, J (2011) ZRTP: media path key agreement for unicast secure RTP. IETF, RFC 6189Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Science & ITThe Islamia University of BahawalpurBahawalpurPakistan
  2. 2.School of Computer Science and Electronic EngineeringColchesterUK

Personalised recommendations