End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation

This article introduces the reader to the relevant techniques that are needed to implement such an end-to-end commutative security system for video distribution and presents a practical solution for encryption and watermarking compliant with H.264/Advanced Video Coding (AVC) and the upcoming High Efficiency Video Coding (HEVC) video coding standards. To minimize the overhead and visual impact, a practical tradeoff between the security of the encryption routine, robust watermarking, and transcoding possibilities is investigated. We demonstrate that our combined commutative protection system effectively scrambles video streams, achieving structural similarity index (SSIM) values below 0.2 across a range of practical bit rates, while allowing robust watermarking and transcoding.

[1]  Douglas C. Sicker,et al.  Selective encryption for consumer applications , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[2]  Thomas C. Hales Sphere packings, I , 1997, Discret. Comput. Geom..

[3]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[4]  Hassina Aliane,et al.  Watermarking Techniques Applied to H264/AVC Video Standard , 2010, 2010 International Conference on Information Science and Applications.

[5]  Ann Dooms,et al.  Reduced reference quality assessment based on watermarking and perceptual hashing , 2012 .

[6]  Alexandros Eleftheriadis,et al.  Dynamic rate shaping of compressed digital video , 2006, IEEE Transactions on Multimedia.

[7]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[8]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[9]  Chen-Hsiu Huang Video Transcoding Architectures and Techniques : An Overview , 2003 .

[10]  Peter Schelkens,et al.  The JPEG 2000 Suite , 2009 .

[11]  Ann Dooms,et al.  Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks , 2009, IWDW.

[12]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[13]  Shiguo Lian,et al.  Quasi-commutative watermarking and encryption for secure media content distribution , 2009, Multimedia Tools and Applications.

[14]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[15]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[16]  Nasir D. Memon,et al.  Protocols for Watermark Verification , 2001, IEEE Multim..

[17]  Peter Lambert,et al.  Requantization transcoding for H.264/AVC video coding , 2010, Signal Process. Image Commun..

[18]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[20]  Xinpeng Zhang,et al.  A New Approach to Commutative Watermarking-Encryption , 2012, Communications and Multimedia Security.

[21]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[22]  W. Fischer,et al.  Sphere Packings, Lattices and Groups , 1990 .

[23]  Juan Carlos De Martin,et al.  Perception-based partial encryption of compressed speech , 2002, IEEE Trans. Speech Audio Process..

[24]  David R. Bull,et al.  A novel H.264 SVC encryption scheme for secure bit-rate transcoding , 2009, 2009 Picture Coding Symposium.

[25]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[26]  Stefan Katzenbeisser,et al.  ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten , 2005, Sicherheit.

[27]  Gary J. Sullivan,et al.  Compression performance of high efficiency video coding (HEVC) working draft 4 , 2012, 2012 IEEE International Symposium on Circuits and Systems.

[28]  F. Bossen,et al.  Common test conditions and software reference configurations , 2010 .

[29]  Craig Gentry,et al.  Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.

[30]  Thomas Stütz,et al.  A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.