Encryption and authentication for scalable multimedia: current state of the art and challenges

Scalable coding is a technology that encodes a multimedia signal in a scalable manner where various representations can be extracted from a single codestream to fit a wide range of applications. Many new scalable coders such as JPEG 2000 and MPEG-4 FGS offer fine granularity scalability to provide near continuous optimal tradeoff between quality and rates in a large range. This fine granularity scalability poses great new challenges to the design of encryption and authentication systems for scalable media in Digital Rights Management (DRM) and other applications. It may be desirable or even mandatory to maintain a certain level of scalability in the encrypted or signed codestream so that no decryption or re-signing is needed when legitimate adaptations are applied. In other words, the encryption and authentication should be scalable, i.e., adaptation friendly. Otherwise secrets have to be shared with every intermediate stage along the content delivery system which performs adaptation manipulations. Sharing secrets with many parties would jeopardize the overall security of a system since the security depends on the weakest component of the system. In this paper, we first describe general requirements and desirable features for an encryption or authentication system for scalable media, esp. those not encountered with the non-scalable case. Then we present an overview of the current state of the art of technologies in scalable encryption and authentication. These technologies include full and selective encryption schemes that maintain the original or coarser granularity of scalability offered by an unencrypted scalable codestream, layered access control and block level authentication that reduce the fine granularity of scalability to a block level, among others. Finally, we summarize existing challenges and propose future research directions.

[1]  Shipeng Li,et al.  Scalable protection for MPEG-4 fine granularity scalability , 2005, IEEE Transactions on Multimedia.

[2]  Touradj Ebrahimi,et al.  Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.

[3]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[4]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[5]  Ahmet M. Eskicioglu,et al.  Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions , 2003 .

[6]  Weiping Li,et al.  Overview of fine granularity scalability in MPEG-4 video standard , 2001, IEEE Trans. Circuits Syst. Video Technol..

[7]  Yuzhuo Zhong,et al.  Layered access control for MPEG-4 FGS video , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[8]  Min Wu,et al.  Communication-friendly encryption of multimedia , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[9]  Robert H. Deng,et al.  A flexible and scalable authentication scheme for JPEG2000 image codestreams , 2003, MULTIMEDIA '03.

[10]  Edward J. Delp,et al.  Security of digital entertainment content from creation to consumption , 2003, Signal Process. Image Commun..

[11]  Wu-chi Feng,et al.  Efficient multi-layer coding and encryption of MPEG video streams , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[12]  Robert H. Deng,et al.  Content-aware authentication of motion JPEG2000 stream in lossy networks , 2003, IEEE Trans. Consumer Electron..

[13]  Hong Heather Yu,et al.  Progressive and scalable encryption for multimedia content access control , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[14]  Edward J. Delp,et al.  An integrated approach to encrypting scalable video , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[15]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of multimedia , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[16]  Hong Heather Yu Scalable encryption for multimedia content access control , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[17]  E M Van Buskirk,et al.  When seeing isn't believing. , 1997, Journal of glaucoma.

[18]  Hamid Gharavi,et al.  Multilevel video coding and distribution architectures for emerging broadband digital networks , 1996, IEEE Trans. Circuits Syst. Video Technol..

[19]  Uwe Horn,et al.  Video Encryption Based on Data Partitioning and Scalable Coding - A Comparison , 1998, IDMS.

[20]  Rolf Reinema,et al.  A scalable security architecture for multimedia communication standards , 1997, Proceedings of IEEE International Conference on Multimedia Computing and Systems.

[21]  Shipeng Li,et al.  An efficient key scheme for layered access control of MPEG-4 FGS video , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[22]  Wu-chi Feng,et al.  Lightweight security mechanisms for wireless video transmission , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[23]  Hong Heather Yu Scalable multimedia authentication , 2003, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

[24]  Majid Rabbani,et al.  An overview of the JPEG 2000 still image compression standard , 2002, Signal Process. Image Commun..

[25]  Hong Heather Yu Scalable streaming media authentication , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[26]  Mitchell D. Swanson,et al.  Multimedia Authentication and Watermarking , 2003 .

[27]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[28]  Hong Heather Yu An overview on scalable encryption for wireless multimedia access , 2003, SPIE ITCom.

[29]  John G. Apostolopoulos,et al.  Secure scalable streaming and secure transcoding with JPEG-2000 , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[30]  Yuzhuo Zhong,et al.  Efficient and fully scalable encryption for MPEG-4 FGS , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[31]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[32]  John G. Apostolopoulos,et al.  Secure scalable video streaming for wireless networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[33]  M. Reha Civanlar,et al.  Packet loss resilience of MPEG-2 scalable video coding algorithms , 1996, IEEE Trans. Circuits Syst. Video Technol..

[34]  John G. Apostolopoulos,et al.  Secure scalable streaming enabling transcoding without decryption , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[35]  Heather H. Yu On scalable encryption for mobile consumer multimedia applications , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[36]  Renato Iannella,et al.  Digital Rights Management (DRM) Architectures , 2001, D Lib Mag..

[37]  Ramarathnam Venkatesan,et al.  The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers , 1998, EUROCRYPT.

[38]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..