Evaluation of different video encryption methods for a secure multimedia conferencing gateway

  • Thomas Kunkelmann
  • Rolf Reinema
  • Ralf Steinmetz
  • Thomas Blecher
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1356)


In multimedia conferencing systems the need for confidentiality and privacy gains more and more in importance, particularly in open networks like the Internet. In this paper we give an overview of the security requirements of multimedia conferencing systems and of applicable security functions. For real-time video transmissions there is a special need for selective encryption of the transmitted data. Existing methods are investigated and their strengths and weaknesses will be shown.

To combine different security functionalities we present the implementation of a scalable security gateway, adaptive to the requirements of specific applications and the properties of special forms of multimedia data.


Multimedia communication Security Encryption Partial encryption 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AgGo96]
    I. Agi, L. Gong: An Empirical Study of Secure MPEG Video Transmissions. ISOC Symposium on Network and Distributed System Security, San Diego, CA, 1996Google Scholar
  2. [AMZ95]
    E. Amir, S. McCanne, H. Zhang: An Application Level Video Gateway. Proc. 3rd ACM Multimedia, San Francisco, CA, 1995Google Scholar
  3. [BGU95]
    P. Bahl, P.S. Gauthier, R.A. Ulichney: Software-only Compression, Rendering, and Playback of Digital Video. Digital Technical Journal Vol. 7(4), 1995Google Scholar
  4. [BHS94]
    K. Bahr, E. Hinsch, G. Schulze: Incorporating Security Functions in Multimedia Conferencing Applications in the Context of the MICE Project. Proc. 2nd Int'l Workshop IWACA'94, Heidelberg, Germany, 1994Google Scholar
  5. [DVB96]
    The Digital Video Broadcasting Project., 1996Google Scholar
  6. [Eri94]
    H. Eriksson: The Multicast Backbone. Comm. of the ACM, 37(8), pp. 54–60, 1994Google Scholar
  7. [GMD97]
    W. Schneider (Ed.): SecuDE Documentation., Darmstadt, Germany, 1997Google Scholar
  8. [HJRW96]
    E. Hinsch, A. Jaegemann, I. Roper, L. Wang: The Secure Conferencing User Agent — A Tool to Provide Secure Conferencing with MBONE Multimedia Conferencing Applications. Proc. IDMS '96, Berlin, Germany, 1996Google Scholar
  9. [ITU96]
    ITU-T Recommendation H.263: Video coding for low bit rate communication. 1996Google Scholar
  10. [JPEG93]
    ISO/ IEC International Standard 10918: Digital Compression and Coding of Continuous-Tone Still Images. 1993Google Scholar
  11. [KuRe97]
    T. Kunkelmann, R. Reinema: A Scalable Security Architecture for Multimedia Communication Standards. Proc. 4th IEEE Int'l Conference on Multimedia Computing and Systems, Ottawa, Canada, 1997Google Scholar
  12. [Lai92]
    X. Lai: On the Design and Security of Block Ciphers. ETH Series in Information Processing, 1, H. Gorre Verlag, Konstanz, 1992Google Scholar
  13. [MaSp95]
    T.B. Maples, G.A. Spanos: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. Proc. 4th Int'l Conference on Computer and Communications, Las Vegas, NV, 1995Google Scholar
  14. [MeGa95]
    J. Meyer, F. Gadegast: Security Mechanisms for Multimedia Data with the Example MPEG-1 Video., 1995Google Scholar
  15. [MPEG93]
    ISO/ IEC International Standard 11172: Coding of Moving Pictures and Associated Audio for Digital Storage Media up to about 1.5 Mbit/s. 1993Google Scholar
  16. [OMG96]
    Object Management Group: Security Service: v1.0. 1996Google Scholar
  17. [PSR93]
    K. Patel, B.C. Smith, L.A. Rowe: Performance of a Software MPEG Video Decoder. Proc. ACM Multimedia, Anaheim, CA, 1993Google Scholar
  18. [QiNa97]
    L. Qiao, K. Nahrstedt: A New Algorithm for MPEG Video Encryption. Proc. 1st Int'l Conf. on Imaging Science, Systems and Technology, Las Vegas, NV, 1997Google Scholar
  19. [SCFV96]
    H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson: RTP: A Transport Protocol for Real-Time Applications. RFC 1889, 1996Google Scholar
  20. [Sch96]
    B. Schneier: Applied Cryptography. 2nd Edition, ISBN 0-471-11709-9, John Wiley, New York, 1996Google Scholar
  21. [SHB95]
    D. Stevenson, N. Hillery, G. Byrd: Secure Communications in ATM Networks. Comm. of the ACM, 38(2), pp. 45–52,1995Google Scholar
  22. [Ste94]
    R. Steinmetz: Data Compression in Multimedia computing — standards and systems. Multimedia Systems, 1(4), pp. 187–204, Springer Verlag, Berlin 1994Google Scholar
  23. [StNa95]
    R. Steinmetz, K. Nahrstedt: Multimedia: Computing, Communications and Applications. Prentice Hall, München 1995Google Scholar
  24. [Tan96]
    L. Tang: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. Proc. 4th ACM Int'l Multimedia Conference, Boston, MA, 1996Google Scholar
  25. [Ylo95]
    T. Ylbnen: The SSH (Secure Shell) Remote Login Protocol., 1995Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Thomas Kunkelmann
    • 1
  • Rolf Reinema
    • 2
  • Ralf Steinmetz
    • 1
    • 2
  • Thomas Blecher
    • 1
  1. 1.Darmstadt University of TechnologyDarmstadtGermany
  2. 2.German National Research Center for Information TechnologyDarmstadtGermany

Personalised recommendations