Selective encryption of the MC EZBC bitstream for DRM scenarios

Universal Multimedia Access (UMA) calls for solutions where content is created once and subsequently adapted to given requirements. With regard to UMA and scalability, which is required often due to a wide variety of end clients, the best suited codecs are wavelet based (like the MC-EZBC) due to their inherent high number of scaling options. However, we do not only want to adapt the content to given requirements but we want to do so in a secure way. Through DRM we can ensure that the actual content is safe and copyright is observed. However, traditional encryption removes the option of scalability in the encrypted domain which is opposed to what we want to achieve for UMA. The solution is selective encryption where only a part of the content is encrypted, enough to ensure safety but at the same time little enough to keep scalability intact. Towards this goal we discuss various methods of applying encryption to the bitstream produced by the MC-EZBC in order to keep scalability intact in the encrypted domain while also keeping security intact with regard to various DRM scenarios.

[1]  Jon M. Peha,et al.  Streaming video over the Internet: approaches and directions , 2001, IEEE Trans. Circuits Syst. Video Technol..

[2]  Alberto Signoroni,et al.  State-of-the-Art and Trends in Scalable Video Compression With Wavelet-Based Approaches , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Thomas Stütz,et al.  Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters , 2007, EURASIP J. Inf. Secur..

[4]  Yuan Li,et al.  A New Video Encryption Algorithm for H.264 , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[5]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[6]  Enrico Magli,et al.  Conditional Access to H.264/AVC Video with Drift Control , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[7]  Tuo Shi,et al.  Selective encryption for H.264/AVC video coding , 2006, Electronic Imaging.

[8]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[9]  Ahmet M. Eskicioglu,et al.  Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions , 2003 .

[10]  John W. Woods,et al.  Bidirectional MC-EZBC with lifting implementation , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Douglas Sicker,et al.  Selective encryption for consumer applications , 2004, CCNC.

[12]  Jeho Nam,et al.  Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain , 2006, MM '06.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  Hermann Hellwagner,et al.  Design options and comparison of in-network H.264/SVC adaptation , 2008, J. Vis. Commun. Image Represent..

[15]  Thomas Stütz,et al.  A survey on JPEG2000 encryption , 2009, Multimedia Systems.

[16]  Alberto Signoroni,et al.  Wavelet-Based Encoding for HD Applications , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[17]  John W. Woods,et al.  Improvements to the MC-EZBC scalable video coder , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[18]  John W. Woods,et al.  Embedded video coding using invertible motion compensated 3-D subband/wavelet filter bank , 2001, Signal Process. Image Commun..

[19]  Gabriella Olmo,et al.  Conditional access techniques for H . 264 / AVC and H . 264 / SVC compressed video , 2007 .

[20]  Cyril Bergeron,et al.  Complaint Selective encryption for H.264/AVC video streams , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[21]  Touradj Ebrahimi,et al.  From the guest editors - Universal multimedia access , 2003 .

[22]  Abdulmotaleb El-Saddik,et al.  Compressed-Domain Encryption of Adapted H.264 Video , 2006, Eighth IEEE International Symposium on Multimedia (ISM'06).

[23]  Amir Said Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.

[24]  Indrani Vedula,et al.  Security analysis of selectively encrypted MPEG-2 streams , 2003, SPIE ITCom.

[25]  Thomas Stütz,et al.  On efficient transparent jpeg2000 encryption , 2007, MM&Sec.

[26]  Peter Lambert,et al.  Scalable, Wavelet-Based Video: From Server to Hardware-Accelerated Client , 2007, IEEE Transactions on Multimedia.