Advertisement

Scalable Protection and Access Control in Full Scalable Video Coding

  • Yong Geun Won
  • Tae Meon Bae
  • Yong Man Ro
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)

Abstract

In this paper, we propose an encryption algorithm to protect scalable video coding (SVC) bitstream and a method for conditional access control to consume the encrypted SVC bitstream. To design an encryption algorithm, we analyzed the encryption requirements to support scalability function in the scalable video and proposed an effective encryption method developed in the network abstraction layer (NAL). In addition, conditional access control scheme and key management scheme are proposed to consume the SVC bitstream protected with proposed method. Experiments were performed to verify the proposed method and results showed that proposed algorithms could provide an effective access control of scalable video as well as support a video encryption with scalability function.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Information Technology – JPEG2000 Image Coding System Part1 : Core Coding system, ISO/IEC 15444-1:2000 ISO/IEC JTC/SC 29/WG 1 N1646R (March 2000) Google Scholar
  2. 2.
    van der Schaar, M., Radha, H.: A Hybrid Temporal-SNR Fine-Granular Scalability for Internet Video. IEEE Transaction on circuits and systems for video Technology 11(3) (March 2001)Google Scholar
  3. 3.
    Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmissions. In: Proc. Internet society symposium. Network & Distributed system security, pp. 137–144 (February 1996)Google Scholar
  4. 4.
    Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Contents in Distribution Network: Challenges and New Directions. In: IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, November 17-19 (2003)Google Scholar
  5. 5.
    Zhu, B.B., Swanson, M.D., Li, S.: Encryption and Authentication for Scalable Multimedia: Current State of the Art and Challenges. In: Proc. SPIE Internet Multimedia Management Systems V, vol. 5601, pp. 157–170 (October 2004)Google Scholar
  6. 6.
    ISO/IEC JTC 1/SC 29/WG 11N 7084 : Joint Scalable Video Model (JSVM) 2.0 Reference Encoding Algorithm Description, Buzan, Korea (April 2005)Google Scholar
  7. 7.
    Stockhammer, T., Hannuksela, M.M., Wenger, S.: H.26L/JVT coding network abstraction layer and ip-based transport. IEEE ICIP 2, 485–488 (2002)Google Scholar
  8. 8.
    Wiegand, T., Sullivan, G.J., Luthra, A., Gill, A.: Text of ISO/IEC FDIS 14496-10: Information Technology – Coding of audio-visual objects – Part 10: Advanced Video Coding. ISO/IEC FDIS 14496-10 (2003)Google Scholar
  9. 9.
    Shi, C., Bhargava, B.: A fast MPEG video encryption algorithm. In: Proc. ACM multimeida 1998, pp. 81–88 (September 1998)Google Scholar
  10. 10.
    Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG 2000 compressed domain. In: Proc. of the SPIE, vol. 4472, pp. 95–104 (July 2001)Google Scholar
  11. 11.
    Zhu, B.B., Li, S., Feng, M.: A Framework of Scalable Layered Access Control for Multimedia. In: IEEE International Symposium on Circuits and Systems, 2005. ISCAS 2005, May 23–26, vol. 3, pp. 2703–2706 (2005)Google Scholar
  12. 12.
    Zhu, B.B., Feng, M., Li, S.: An Efficient Key Scheme for Layered Access Control of MPEG-4 FGS Video. In: IEEE Int. Conf. on Multimedia and Expo., pp. 443–446 (June 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yong Geun Won
    • 1
  • Tae Meon Bae
    • 1
  • Yong Man Ro
    • 1
  1. 1.IVY Lab., Information and Communication University (ICU)DeajeonKorea

Personalised recommendations