Secure Transmission of Video on an End System Multicast Using Public Key Cryptography

  • Istemi Ekin Akkus
  • Oznur Ozkasap
  • M. Reha Civanlar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4105)


An approach for securing video transmission on an end system multicast session is described. Existing solutions use encryption techniques that require the use of a shared key. Although they can achieve efficient encryption/decryption and meet the demands of real-time video, a publicly available service needing only the integrity and non-repudiation of the message is not considered. In this study, we offer such a method using public key cryptography. This method can be used in an end system multicast infrastructure where video originates from one source, but spreads with the help of receiving peers. Two different methods are described and compared: 1) Encryption of the entire packet. 2) Encryption of the unique digest value of the transmitted packet (i.e. digitally signing). The receivers then check the integrity of the received packets using the public key provided by the sender. Also, this way the non-repudiation of the transmitted video is provided.


Encryption Time Chunk Size Secure Transmission Decryption Time Source Authentication 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chu, Y., Rao, S., Zhang, H.: A case for end system multicast. In: Proceedings of ACM Sigmetrics (2000)Google Scholar
  2. 2.
    Civanlar, M.R., Ozkasap, O., Celebi, T.: Peer-to-peer multipoint video conferencing on the Internet. Signal Processing: Image Communication 20, 743–754 (2005)CrossRefGoogle Scholar
  3. 3.
    Akkus, I.E., Civanlar, M.R., Ozkasap, O.: Peer-to-peer Multipoint Video Conferencing Using Layered Video. In: International Conference on Image Processing ICIP 2006 (to appear, 2006)Google Scholar
  4. 4.
    Spanos, G.A., Maples, T.B.: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. In: Forth International Conference on Computer Communications and Networks, pp. 2–10 (1995)Google Scholar
  5. 5.
    Li, Y., Chen, Z., Tan, S.M., Campbell, R.H.: Security Enhanced MPEG Player. In: IEEE 1st International Workshop on Multimedia Software (1996)Google Scholar
  6. 6.
    Agi, I., Gong, L.: An Empirical Study of MPEG Video Transmission. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 137–144 (1996)Google Scholar
  7. 7.
    Venkatramani, C., Westerink, P., Verscheure, O., Frossard, P.: Securing Media For Adaptive Streaming. In: Proceedings of the Eleventh ACM International Conference on Multimedia. ACM Press, New York (2003)Google Scholar
  8. 8.
    Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: RFC3711 The Secure Real-time Transport Protocol (SRTP) (2004)Google Scholar
  9. 9.
    Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications (2003)Google Scholar
  10. 10.
    Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia. ACM Press, New York (1997)Google Scholar
  11. 11.
    Changgui, S., Bhargava, B.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the Sixth ACM International Conference on Multimedia. ACM Press, New York (1998)Google Scholar
  12. 12.
    Liu, F., Koenig, H.: A Novel Encryption Algorithm for High Resolution Video. In: Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video NOSSDAV 2005 (2005)Google Scholar
  13. 13.
    Perrig, A., Song, D., Canetti, R., Tygar, J.D., Briscoe, B.: RFC4082 Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction (2005)Google Scholar
  14. 14.
    Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. EEE/ACM Transactions on Networking (TON) 7(4) (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Istemi Ekin Akkus
    • 1
  • Oznur Ozkasap
    • 1
  • M. Reha Civanlar
    • 1
  1. 1.Department of Computer EngineeringKoc UniversityIstanbulTurkey

Personalised recommendations