Skip to main content
Log in

Secure service convergence based on scalable media coding

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In multimedia services, security and privacy issues are urgent to be solved, such as the content security and service protection. To solve these issues, some means have been proposed, such as conditional access and digital rights management. However, for the latest application scenarios in convergent networks, there is still no solution. This paper focuses on the convergent multimedia broadcasting applications: the multimedia content, e.g., TV program, is encoded and packaged by the content provider, and is then transmitted to users through different communication networks, e.g., 3G network, DVB-H, ADSL, etc. Thus, the same multimedia content will be used for various services, i.e., mobile TV, Internet TV and home TV. Since different network channel support different bandwidths, the multimedia content should be transcoded before being transmitted through the networks. To protect the content and service in this application, we propose the content and service protection methods. In content protection, the content provider encrypts the scalable multimedia content with the manner denoted by Encryption Flag. The content distributor has no decryption keys, but can transcode the scalable content with the manner denoted by Layer Flag, and transmit the transcoded content to users. In service protection, the content provider combines the encryption key, Encryption Flag and the user right information, and transmits them, independent from the encrypted content, to certified users. At user side, the content is decrypted with the received key according to the Encryption Flag and Layer Flag. Thus, the content provider needs only to encrypt the content once, which can be transcoded by the content distributor in a secure manner and used for various networks. Additionally, the user rights need not to be changed when the service network is changed. Totally, the proposed scheme is secure and efficient for service convergence.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mobile, T. V. (2009). http://en.wikipedia.org/wiki/Mobile_TV.

  2. Internet Television (2009). http://en.wikipedia.org/wiki/Internet_television.

  3. Digital Television (2009). http://en.wikipedia.org/wiki/Digital_television.

  4. 3G (2009). http://en.wikipedia.org/wiki/3G.

  5. Digital Video Broadcasting (DVB) (2004). Transmission System for Handheld Terminals (DVB-H). ETSI, November 2004.

  6. Sun, H., Vetro, A., & Xin, J. (2007). An over view of scalable video streaming: research articles. Wireless Communications and Mobile Computing, 7(2), 159–172.

    Article  Google Scholar 

  7. Digital Rights Management (2009). http://en.wikipedia.org/wiki/Digital_rights_management.

  8. ISMACryp 1.1 (2009). (ISMA Encryption & Authentication Specification 1.1). http://www.isma.tv/.

  9. Open Mobile Alliance (2006). Digital Rights Management 2.0 (OMA DRM 2.0), 03 Mar.

  10. Digital Video Broadcasting Content Protection & Copy Management (2009). (DVB-CPCM), DVB Document A094 Rev. 1, July.

  11. HDCP (2009). (High-bandwidth Digital Content Protection System). http://en.wikipedia.org/wiki/HDCP.

  12. COPP (2009). (Certified Output Protection Protocol). http://msdn2.microsoft.com/en-us/library/Aa468617.aspx.

  13. DTCP (2009). (Digital Transmission Content Protection). http://en.wikipedia.org/wiki/DTCP.

  14. Li, W. (2001). Overview of fine granularity scalability in MPEG-4 video standard. IEEE Transactions on Circuits and Systems for Video Technology, 11(3), 301–317.

    Article  Google Scholar 

  15. Reichel, J., Wien, M., & Schwarz, H. (2004). Scalable Video Model 3. ISO/IEC JTC1/SC29/WG11, N6716.

  16. MPEG2 (1994). ISO/IEC IS 13818.

  17. Shapiro, J. M. (1993). Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 41(12), 657–660.

    Article  Google Scholar 

  18. Said, A. (1996). A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology, 6(3), 243–250.

    Article  Google Scholar 

  19. ISO/IECFCD15444-1 (2000). Information technology— JPEG2000 image coding system—Part 1: Core coding system.

  20. MPEG4 Part 10 (ISO/IEC 14496-10) (2000). Advanced Video Coding (AVC): a codec for video signals which is technically identical to the ITU-T H.264 standard.

  21. Ridge, J., Bao, Y., Karczewicz, M., & Wang, X. (2005). Cyclical block coding for FGS. ISO/IEC JTC1/SC29/WG11, M11509.

  22. Chang, Y., Han, R., Li, C., & Smith, J. R. (2004). Secure transcoding of Internet content. In Proc. int. workshop intelligent multimedia computing and networking (IMMCN) (pp. 940–943) 2004.

  23. Tosun, A. S., & Feng, W. C. (2000). Efficient multi-layer coding and encryption of MPEG video streams. In Proceedings of IEEE international conference on multimedia and expo. (Vol. 1, pp. 119–122) 2000.

  24. Yu, H. H., & Yu, X. L. (2003). Progressive and scalable encryption for multimedia content access control. In Proceedings of IEEE international conference on communications (Vol. 1, pp. 547–551) 2003.

  25. Kunkelmann, T., & Horn, U. (2000). Video encryption based on data partitioning and scalable coding—a comparison. In LNCS : Vol. 1483. 5th international workshop on interactive distributed multimedia systems and telecommunication services (IDMS’98), Oslo, Norway, September 1998 (pp. 95–106). Berlin: Springer.

    Chapter  Google Scholar 

  26. Yuan, C., Zhu, B., Wang, Y., Li, S., & Zhong, Y. (2003). Efficient and Fully Scalable Encryption for MPEG-4 FGS. In Proceedings of 2003 IEEE international symposium on circuits and systems, May 2003 (Vol. 2, pp. 620–623).

  27. Wee, S. J., & Apostolopoulos, J. G. (2001). Secure scalable video streaming for wireless networks. In Proceedings of the IEEE international conference on acoustics, speech, and signal processing, Salt Lake City UT, May (Vol. 4, pp. 2049–2052) 2001.

  28. Lian, S., Sun, J., & Wang, Z. (2004). Perceptual cryptography on SPIHT compressed images or videos. In Proceedings of the IEEE international conference on multimedia and expro (I) (ICME2004) Taiwan (Vol. 3, pp. 2195–2198) 2004.

  29. Grosbois, R., Gerbelot, P., & Ebrahimi, T. (2000). Authentication and access control in the JPEG 2000 compressed domain. Proceedings of SPIE, 4472, 95–104 (46th Annual Meeting, Applications of Digital Image Processing XXIV, San Diego).

    Article  Google Scholar 

  30. Lian, S., Sun, J., Zhang, D., & Wang, Z. (2004). A selective image encryption scheme based on JPEG2000 codec. In: LNCS : Vol. 3332. Proceedings of 2004 Pacific-Rim conference on multimedia (PCM2004 (pp. 65–72). Berlin: Springer.

    Google Scholar 

  31. Lian, S. (2008). Secure multimedia transcoding for scalable video streams. In A. M. A. Ahmad & I. K. Ibrahim (Eds.), Multimedia transcoding in mobile and wireless networks (pp. 256–278). Hershey: IGI Publisher.

    Google Scholar 

  32. Lian, S. (2008). Multimedia Content Encryption: Techniques and applications. Boca Raton: Auerbach Publication, CRC Press.

    Google Scholar 

  33. Mollin, R. A. (2006). An Introduction to Cryptography (2nd edn.). Boca Raton: CRC Press.

    Google Scholar 

  34. Shannon, C. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28, 656–715.

    Google Scholar 

  35. Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Circuits and Systems for Video Technology, 17(6), 774–778.

    Article  Google Scholar 

  36. Lian, S., Liu, Z., Ren, Z., & Wang, H. (2006). Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics, 52(2), 621–629.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiguo Lian.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lian, S. Secure service convergence based on scalable media coding. Telecommun Syst 45, 21–35 (2010). https://doi.org/10.1007/s11235-009-9233-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-009-9233-2

Navigation