[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A scheme for conditional access-based systems using index locations of DCT coefficients

Published: 01 June 2017 Publication History

Abstract

Most of the existing conditional access-based systems (CAS) follow a standard methodology. The service provider shares two copies for single information (specifically image for this work). One copy is a low-resolution version which is shared in the public domain for preview purpose. The other one is a high-resolution version to be provided to the customers through a secure channel on demand (after payment). We propose a novel scheme that can be efficiently adapted in such a scenario. We analyze the images in the discrete cosine transform (DCT) domain and note that polynomials of suitable degree, representing the sorted DCT coefficients together with original index locations, can uniquely represent an image. We show that the arrangement of DCT index locations, after the actual coefficients have been sorted by magnitude, is significantly different for various images and we exploit this to design an efficient CAS-based scheme. We also show that the amount of private data, which a service provider needs to transmit through a secure channel to the customers on demand, is reduced significantly. This reduction in transmitted data makes the system apt for real-time secure applications.

References

[1]
American National Standard X9.17: Financial Institution Key Management (Wholesale), American National Standard Institute (1985)
[2]
Bigstockphoto.com. http://www.bigstockphoto.com/. Accessed 20 Feb 2014
[3]
Das, T.K., Maitra, S.: Cryptanalysis of correlation-based watermarking schemes using single watermarked copy. IEEE Signal Process. Lett. 11(4), 446---449 (2004)
[4]
Das, T.K., Maitra, S., Zhou, J.: Cryptanalysis of Chu's DCT based watermarking scheme. IEEE Trans. Multimed. 8(3), 629---632 (2006)
[5]
Delgado, J., Llorente, S., and Rodriguez, E.: Digital rights and privacy policies management as a service. Consumer Commun. Netw. Conf. (CCNC), 14---17 January, 2012 IEEE, vol., no., pp.527---531, (2012)
[6]
Data Encryption Standard, FIPS PUBS 46-2. http://www.itl.nist.gov/fipspubs/fip46-2.htm (1993). Accessed 20 Feb 2014
[7]
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22, 644---654 (1976)
[8]
Dufaux, F., Ebrahimi, T.: Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circuits Syst. Video Tech. 18(8), 1168---1174 (2008)
[9]
Easley, R., Byung Cho., Kim and Daewon Sun.: Optimal digital rights management with uncertain piracy. In: System Science (HICSS), 2012 45th Hawaii International Conference on, 4---7 January, vol., no., pp 4525---4534 (2012)
[10]
Fotomoto.com. http://www.fotomoto.com/. Accessed 20 Feb 2014
[11]
Goldburg, B., Sridharan, S., Dawson, E.: Design and cryptanalysis of transform-based analog speech scramblers. IEEE J. Sel. Areas Commun. 11(5), 735---744 (1993)
[12]
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Pearson Education, Upper Saddle River, NJ (2003)
[13]
Gupta, A., Sultana, S., Kirkpatrick, M., Bertino, E.: A selective encryption approach to fine-grained access control for P2P file sharing. In: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on, 9---12 October,pp.1---10 (2010)
[14]
Databases. http://www.imageprocessingplace.com/root_files_V3/image_databases.htm. Accessed 20 Feb 2014
[15]
Kim, J., Choi, H.: Improvements on Sun's conditional access system in Pay-TV broadcasting systems. IEEE Trans. Multimed. 12(4), 337---340 (2010)
[16]
Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proc. IEEE 92(6), 918---932 (2004)
[17]
Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.: On the design of perceptual MPEG-video encryption algorithms. IEEE Trans. Circuits Syst. Video Tech. 17(2), 214---223 (2007)
[18]
Lian, S., Chen, X.: On the design of partial encryption scheme for multimedia content. Math. Comput. Modell. 57(11---12), 2613---2624 (2013)
[19]
Lookabaough, T., Sicker, D.C.: Selective encryption for consumer applications. IEEE Commun. Mag. 42(5), 124---129 (2004)
[20]
Naor, D., Naor, M.: Protecting cryptographic keys: the trace-andrevoke approach. Computer, 47---53 (2003)
[21]
Pande, A., Mohapatra, P., Zambreno, J.: Securing multimedia content using joint compression and encryption. Multimed. IEEE 20(4), 50---61 (2013)
[22]
Peng, F., Zhu, X.-W., Long, M.: An ROI privacy protection scheme for H.264 video based on FMO and Chaos. IEEE Trans. Inf. Forensics Sec. 8(10), 1688---1699 (2013)
[23]
PlanetObserever.com. http://www.planetobserver.com/. Accessed 20 Feb 2014
[24]
Sanchez, D.D., Marin, A., Almenarez, F., Cortes, A.: Sharing conditional access modules through the home network for pay TV access. IEEE Trans. Consum. Electron. 55(1), 88---96 (2009)
[25]
Shahid, Z., Puech, W.: Visual protection of HEVC video by selective encryption of CABAC binstrings. Multimed. IEEE Trans. 16(1), 24---36 (2014)
[26]
Wallace, G. K.: The JPEG still picture compression standard. IEEE Trans. Consum. Electron. 38(1), pp. xviii---xxxiv (1992)
[27]
Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., Chen, H.: Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Trans. Multimed. 12(3), 215---223 (2010)
[28]
Wang, S., Laih, C.: Efficient key distribution for access control in Pay-TV systems. IEEE Trans. Multimed. 10(3), 480---492 (2008)
[29]
Wang, W., Hempel, M., Peng, D., Wang, H., Sharif, H., Chen, H.: On energy efficient encryption for video streaming in wireless sensor networks. IEEE Trans. Multimed. 12(5), 417---426 (2010)
[30]
Win, L.L., Thomas, T., Emmanuel, S.: Privacy enabled digital rights management without trusted third party assumption. IEEE Trans. Multimed. 14(3), 546---554 (2012)
[31]
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimed. 5(1), 118---129 (2003)
  1. A scheme for conditional access-based systems using index locations of DCT coefficients

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Journal of Real-Time Image Processing
    Journal of Real-Time Image Processing  Volume 13, Issue 2
    June 2017
    163 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 June 2017

    Author Tags

    1. Conditional access
    2. Discrete cosine transform (DCT)
    3. Image on demand
    4. Polynomial curve fitting
    5. Selective encryption

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media