MIKEY for keys management of H.264 scalable video coded layers

The paper investigates the problem of managing multiple encryption keys generation overhead issues in scalable video coding (H.264/SVC) and proposes a hierarchical top down keys generation and distribution system by using a standard key management protocol MIKEY (Multimedia Internet Keying Protocol). The research goal is two-fold; (1) prevention of information leakage by the selective encryption of network abstraction layer (NAL) units with AES-CTR block cipher algorithm, and (2) reduction of multiple layer encryption keys overhead for scalable video distribution. We combine a MIKEY with the digital rights management (DRM) techniques to derive a mechanism in which every entitled user of each layer has only one encryption key to use, but this key will transparently open the doors of all layers below. The timing results are calculated for the encryption/decryption and the key generation processes relative to encoding/decoding time of test video files, which are noticeably negligible. The scheme is enormously suitable for video distribution to users who have subscribed to various video qualities regarding their desire or constraints on their devices and helps in preventing the loss of revenue of paid services.

[1]  Edward J. Delp,et al.  Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.

[2]  Wen Gao,et al.  H.264 video encryption scheme adaptive to DRM , 2006, IEEE Transactions on Consumer Electronics.

[3]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[4]  Dale Tesch,et al.  Security Threat Mitigation and Response, Understanding Cisco Security Mars , 2006 .

[5]  Andreas Uhl,et al.  Selective encryption of the MC EZBC bitstream for DRM scenarios , 2009, MM&Sec '09.

[6]  Sang-Uk Shin,et al.  An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding , 2009, IEICE Trans. Inf. Syst..

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Yuzhuo Zhong,et al.  Layered Encryption for Scalable Video Coding , 2009, 2009 2nd International Congress on Image and Signal Processing.

[9]  Abd Rahim Mat Sidek,et al.  Comparison Analysis Of Stream Cipher Algorithms For Digital Communication , 2007 .

[10]  Mohan S. Kankanhalli,et al.  Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture , 2009, IEEE Transactions on Information Forensics and Security.

[11]  Martin Euchner,et al.  Status of This Memo HMAC-Authenticated Diffie-Hellman for Multimedia Internet KEYing (MIKEY) , 2006 .

[12]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Nanning Zheng,et al.  Hash key-based video encryption scheme for H.264/AVC , 2010, Signal Process. Image Commun..

[14]  Russ Housley,et al.  Advanced Encryption Standard (AES) Key Wrap Algorithm , 2002, RFC.

[15]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[16]  Yong Man Ro,et al.  Scalable Protection and Access Control in Full Scalable Video Coding , 2006, IWDW.

[17]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[18]  Chun-I Fan,et al.  Buyer-seller watermarking protocols with off-line trusted third parties , 2009, Int. J. Ad Hoc Ubiquitous Comput..

[19]  David S Isenberg,et al.  Method, system and device for communication , 1995 .

[20]  Dirk Kroeselberg,et al.  A method of forming and distribute cryptographic keys in a mobile radio system and corresponding mobile radio system , 2004 .

[21]  Chun-I Fan,et al.  Buyer-Seller Watermarking Protocols with Off-line Trusted Parties , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[22]  Dong Hoon Lee,et al.  An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.

[23]  Thomas Schierl,et al.  RTP Payload Format for SVC Video , 2006 .

[24]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[25]  Jari Arkko,et al.  MIKEY: Multimedia Internet KEYing , 2004, RFC.

[26]  D. Marpe,et al.  Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.

[27]  Yong Man Ro,et al.  A selective video encryption for the region of interest in scalable video coding , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[28]  Udo W. Pooch,et al.  Computer system and network security , 1995 .