[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1542245.1542264acmconferencesArticle/Chapter ViewAbstractPublication PagesmmsysConference Proceedingsconference-collections
research-article

End-to-end secure delivery of scalable video streams

Published: 03 June 2009 Publication History

Abstract

We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is on recent scalable video coding techniques, e.g., H.264/SVC, that can provide three scalability types at the same time: temporal, spatial, and quality (or PSNR). This three-dimensional scalability offers a great flexibility that enables customizing video streams for a wide range of heterogeneous receivers and network conditions. This flexibility, however, is not supported by current stream authentication schemes in the literature. We propose an efficient authentication scheme that accounts for the full scalability of video streams: it enables verification of all possible substreams that can be extracted and decoded from the original stream. Our evaluation study shows that the proposed authentication scheme is robust against packet losses, adds low communication and computation overheads, and is suitable for live streaming systems as it has short delay.

References

[1]
Global IPTV market analysis (2006-2010). Technical report, RNCOS, August 2006.
[2]
I. Amonou, N. Cammas, S. Kervadec, and S. Pateux. Optimized rate-distortion extraction with quality layers in the scalable extension of H.264/AVC. IEEE Transactions on Circuits and Systems for Video Technology, 17:1186--1193, September 2007.
[3]
P. Atrey, W. Yan, and M. Kankanhalli. A scalable signature scheme for video authentication. Multimedia Tools and Applications, 34:107--135, July 2007.
[4]
M. Hefeeda and K. Mokhtarian. Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Transactions on Multimedia Computing, Communications and Applications, 2009. Accepted to appear.
[5]
R. Iqbal, S. Shirmohammadi, A. El-Saddik, and J. Zhao. Compressed-domain video processing for adaptation, encryption, and authentication. IEEE Multimedia, 15(2):38--50, April 2008.
[6]
R. Kaced and J. Moissinac. Multimedia content authentication for proxy-side adaptation. In Proc. of International Conference on Digital Telecommunications (ICDT'06), Cap Esterel, Cote d'Azur, France, August 2006.
[7]
C. Liang, A. Li, and X. Niu. Video authentication and tamper detection based on cloud model. In Proc. of Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'07), volume 1, pages 225--228, Splendor Kaohsiung, Taiwan, November 2007.
[8]
A. Pannetrat and R. Molva. Efficient multicast packet authentication. In Proc. of Network and Distributed System Security Symposium (NDSS'03), San Diego, CA, Feb. 2003.
[9]
J. Park, E. Chong, and H. Siegel. Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security, 6(2):258--285, May 2003.
[10]
S. Park and S. Shin. Combined scheme of encryption and watermarking in H.264/Scalable Video Coding (SVC). In New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, pages 351--361. Springer, September 2008.
[11]
H. Schwarz, D. Marpe, and T. Wiegand. Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Transactions on Circuits and Systems for Video Technology, 17(9):1103--1120, September 2007.
[12]
D. Skraparlis. Design of an efficient authentication method for modern image and video. IEEE Transactions on Consumer Electronics, 49(2):417--426, May 2003.
[13]
S. Wenger. H.264/AVC over IP. IEEE Transactions on Circuits and Systems for Video Technology, 13(7):645--656, July 2003.
[14]
M. Wien, H. Schwarz, and T. Oelbaum. Performance analysis of SVC. IEEE Transactions on Circuits and Systems for Video Technology, 17(9):1194--1203, September 2007.
[15]
Y. Wu and R. Deng. Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia, 8:152--161, February 2006.
[16]
M. Yajnik, S. Moon, J. Kurose, and D. Towsley. Measurement and modeling of the temporal dependence in packet loss. In Proc. of IEEE INFOCOM'99, volume 1, pages 345--352, New York, NY, March 1999.
[17]
H. Yu. Scalable streaming media authentication. In Proc. of IEEE International Conference on Communications(ICC'04), volume 4, pages 1912--1916, Paris, France, June 2004.

Cited By

View all
  • (2014)Efficient authentication and access control of scalable multimedia streams over packet-lossy networksSecurity and Communication Networks10.1002/sec.7627:3(611-625)Online publication date: 1-Mar-2014
  • (2013)Video security assurance framework based on efficient Joint Cryptography Compression approach2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS)10.1109/ICECS.2013.6815351(76-77)Online publication date: Dec-2013
  • (2012)An improved authentication scheme for H.264/SVC and its performance evaluation over non-stationary wireless mobile networksProceedings of the 6th international conference on Network and System Security10.1007/978-3-642-34601-9_15(192-205)Online publication date: 21-Nov-2012
  • Show More Cited By

Index Terms

  1. End-to-end secure delivery of scalable video streams

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      NOSSDAV '09: Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
      June 2009
      142 pages
      ISBN:9781605584331
      DOI:10.1145/1542245
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 June 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. multimedia authentication
      2. multimedia security
      3. scalable video
      4. secure streaming
      5. video authentication

      Qualifiers

      • Research-article

      Conference

      NOSSDAV '09

      Acceptance Rates

      Overall Acceptance Rate 118 of 363 submissions, 33%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 14 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2014)Efficient authentication and access control of scalable multimedia streams over packet-lossy networksSecurity and Communication Networks10.1002/sec.7627:3(611-625)Online publication date: 1-Mar-2014
      • (2013)Video security assurance framework based on efficient Joint Cryptography Compression approach2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS)10.1109/ICECS.2013.6815351(76-77)Online publication date: Dec-2013
      • (2012)An improved authentication scheme for H.264/SVC and its performance evaluation over non-stationary wireless mobile networksProceedings of the 6th international conference on Network and System Security10.1007/978-3-642-34601-9_15(192-205)Online publication date: 21-Nov-2012
      • (2011)A temporally scalable video codec and its applications to a video conferencing system with dynamic network adaption for mobilesIEEE Transactions on Consumer Electronics10.1109/TCE.2011.601890157:3(1408-1415)Online publication date: Aug-2011
      • (2010)Adaptive and composable multi-media transcoders2010 3rd IEEE International Conference on Ubi-Media Computing10.1109/UMEDIA.2010.5543914(113-117)Online publication date: Jul-2010
      • (2010)Authentication of Scalable Video Streams With Low Communication OverheadIEEE Transactions on Multimedia10.1109/TMM.2010.205141012:7(730-742)Online publication date: 1-Nov-2010
      • (2010)Adaptive Temporal Scalability of H.264-Compliant Video Conferencing in Heterogeneous Mobile Environments2010 IEEE Global Telecommunications Conference GLOBECOM 201010.1109/GLOCOM.2010.5683141(1-5)Online publication date: Dec-2010

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media