The Improvement of Video Streaming Security in Communication with Multiple Modes Ciphering for Handheld Devices

  • Yi-Nan Lin
  • Kuo-Tsang Huang
Part of the Studies in Computational Intelligence book series (SCI, volume 551)

Abstract

Based on the popularity of handheld computing devices such as Smartphones and notepads, people take photos or videos for a main purpose from personal memories transforming to social communication. In digital communications, the confidentiality of personal information is protected by ciphering. The most straightforward video encryption method is to encrypt the entire stream using standard encryption methods such as DES or AES. However, in block ciphering, there exists an attack with the weakness of plaintext-ciphertext pairs (a plaintext-ciphertext pair problem). Therefore several modes of operation are proposed to solve such above problem. Most of these techniques can be only executed one selected operational mode during a communication session. We propose and implement the multiple modes ciphering to improve video streaming security in communication. Our android implementation shows that an overhead of multiple modes ciphering is just two percent decreased throughput competing with straightforward mode ciphering.

Keywords

Ciphering Confidentiality Multiple Modes 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Simmons, G.J.: Contemporary cryptology: The science of information integrity. Wiley (1999)Google Scholar
  2. Stallings, W.: Cryptography and network security: Principles and practices, 3rd edn. Pearson Education (2003)Google Scholar
  3. Daemen, J., Rijmen, V.: The design of Rijndael: AES - the advanced encryption standard. Springer, Heidelberg (2002)Google Scholar
  4. National Institute of Standards and Technology (NIST), NIST. Gov - Computer Security Division - Computer Security Resource Center, Recommendation of block cipher security methods and Techniques, NIST SP800-38 (2001)Google Scholar
  5. Qiao, L., Nahrstedt, K.: Comparsion of MPEG encryption algorithms. Computers and Graphics 22(4) (1998)Google Scholar
  6. Agi, I., Gong, L.: An empirical study of MPEG video transmissions. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 137–144 (1996)Google Scholar
  7. Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of Fourth ACM Multimedia, vol. 96, pp. 219–230 (1996)Google Scholar
  8. Wu, L., Weaver, C., Austin, T.: CryptoManiac: a fast flexible architecture for secure communication. In: Proceedings of ISCA 2001 (2001); SIGARCH Comput. Archit. News 29(2), 110–119 (2001)Google Scholar
  9. International Organization for Standardization (ISO), Information Technology-Security Techniques-Modes of Operation for an n-bit Block Cipher, ISO/IEC 10116 (2006)Google Scholar
  10. Huang, K.-T., Lin, Y.-N., Chiu, J.-H.: Real-time mode hopping of block cipher algorithms for mobile streaming. International Journal of Wireless & Mobile Networks 5(2), 127–142 (2013)CrossRefGoogle Scholar
  11. Android Developers, http://developer.android.com/

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Yi-Nan Lin
    • 1
    • 2
  • Kuo-Tsang Huang
    • 1
    • 2
  1. 1.Department of Electronic EngineeringMing Chi University of TechnologyNew TaipeiTaiwan
  2. 2.Department of Electrical EngineeringChang Gung UniversityNew TaipeiTaiwan

Personalised recommendations