The efficiency improved scheme for secure access control of digital video distribution

The application of digital video distribution is reaching a wider spectrum of customers, in which secure access control of video content during rendering and transmission has become more and more necessary and urgent. Considering the limited computing power and the real-time requirement of set-top boxes, the efficiency of the decryption process is particularly significant. In this paper, we try to search for a scheme to improve the efficiency of the exist schemes for access control of digital video in set-top boxes mainly from three approaches. Firstly, with the specific comparison between AES and RC6, we conclude that RC6 provides sufficient security for set-top boxes, and the decryption process of RC6 is more efficient. Secondly, we improve the efficiency of the codecs process by adopting a latest more efficient video codec VP9, which is an open and royalty free video codec and is proved to be more efficient than H.264. Finally, we could only selective encrypt and decrypt some essential parts of the entire video stream during the codecs process to further improve the efficiency. In a conclusion, we propose a more efficient idea to provide access control of digital video in set-top boxes. This scheme is proved to be more efficient and more practical.

[1]  Ronald L. Rivest,et al.  RC6 as the AES , 2000, AES Candidate Conference.

[2]  Liang-Gee Chen,et al.  Architecture Design of Context-Based Adaptive Variable-Length Coding for H.264/AVC , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[3]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Lian Shi Quality Analysis of Several Typical MPEG Video Encryption Algorithms , 2004 .

[5]  Heiko Schwarz,et al.  Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[6]  G. Bjontegaard,et al.  Calculation of Average PSNR Differences between RD-curves , 2001 .

[7]  Osama S. Faragallah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007, 2007 International Conference on Electrical Engineering.

[8]  Ying Zhang,et al.  Points of Interest Detection from Multiple Sensor-Rich Videos in Geo-Space , 2014, ACM Multimedia.

[9]  Debargha Mukherjee,et al.  The latest open-source video codec VP9 - An overview and preliminary results , 2013, 2013 Picture Coding Symposium (PCS).

[10]  Debargha Mukherjee,et al.  Towards a next generation open-source video codec , 2013, Electronic Imaging.

[11]  Luming Zhang,et al.  Active key frame selection for 3D model reconstruction from crowdsourced geo-tagged videos , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[12]  Osama S. Farag Allah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .

[13]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[14]  Borko Furht,et al.  Fundamentals of Multimedia Encryption Techniques , 2006 .

[15]  D. Marpe,et al.  Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.

[16]  Zi Huang,et al.  Tag localization with spatial correlations and joint group sparsity , 2011, CVPR 2011.

[17]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[18]  Xiao Liu,et al.  Probabilistic Graphlet Transfer for Photo Cropping , 2013, IEEE Transactions on Image Processing.

[19]  Yue Gao,et al.  Probabilistic Skimlets Fusion for Summarizing Multiple Consumer Landmark Videos , 2015, IEEE Transactions on Multimedia.

[20]  Zi Huang,et al.  Local image tagging via graph regularized joint group sparsity , 2013, Pattern Recognit..

[21]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[22]  Gary J. Sullivan,et al.  Rate-constrained coder control and comparison of video coding standards , 2003, IEEE Trans. Circuits Syst. Video Technol..

[23]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[24]  Liu Wan-fang Research on Encryption Technology for the Streaming Media , 2006 .

[25]  Harsh K. Verma,et al.  Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms , 2012 .

[26]  H. Schwarz,et al.  The emerging H.264/AVC standard , 1998 .

[27]  Joseph Zambreno,et al.  Advances in Multimedia Encryption , 2013 .

[28]  汪涛,et al.  Gene expression profile analysis of the rat macrophages infected with Toxoplasma gondii , 2016 .

[29]  Yue Gao,et al.  Exploiting Web Images for Semantic Video Indexing Via Robust Sample-Specific Loss , 2014, IEEE Transactions on Multimedia.

[30]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[31]  Zi Huang,et al.  Mining multi-tag association for image tagging , 2011, World Wide Web.

[32]  Yi Yang,et al.  Discovering Discriminative Graphlets for Aerial Image Categories Recognition , 2013, IEEE Transactions on Image Processing.

[33]  Yi Yang,et al.  Discriminative Nonnegative Spectral Clustering with Out-of-Sample Extension , 2013, IEEE Transactions on Knowledge and Data Engineering.

[34]  Borko Furht Handbook of Internet and multimedia: systems and applications , 1999 .

[35]  Yi Yang,et al.  Effective transfer tagging from image to video , 2013, TOMCCAP.

[36]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[37]  Luming Zhang,et al.  An Effective Video Summarization Framework Toward Handheld Devices , 2015, IEEE Transactions on Industrial Electronics.