A secure media streaming mechanism combining encryption, authentication, and transcoding

Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media distribution as well as security in protecting the confidentiality of media content and ensuring its authenticity. However, achieving flexibility and achieving security are conventionally conflicting with each other. This is mainly because that security is traditionally implemented in a media-unaware manner that naturally prevents flexible handling of the media content during its distribution. This paper shows that the two goals can be simultaneously accomplished by making an overall plan and taking into consideration all the factors: coding, encryption, packetization, authentication, and transcoding. It emphasizes sender authentication, which is a big security issue for media streaming, but somehow left unresolved. We propose a secure media streaming mechanism which supports media-aware encryption, sender authentication and secure transcoding. Multimedia Application Routing Server (MARS) is especially used as an intelligent mid-network proxy with the ability to perform tasks of sender authentication and secure transcoding. A prototype system for securely streaming AVS media using MARS demonstrates the performance, thus proves the practicality of the proposed secure media streaming mechanism.

[1]  Yao Wang,et al.  Video Processing and Communications , 2001 .

[2]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[3]  Pascal Frossard,et al.  Securing media for adaptive streaming , 2003, MULTIMEDIA '03.

[4]  Qiang Fu,et al.  Network Adapted Selective Frame-Dropping Algorithm for Streaming Media , 2007, IEEE Transactions on Consumer Electronics.

[5]  Weiping Li,et al.  Overview of fine granularity scalability in MPEG-4 video standard , 2001, IEEE Trans. Circuits Syst. Video Technol..

[6]  Ton Kalker,et al.  Visual hashing of digital video: applications and techniques , 2001, Optics + Photonics.

[7]  Alfred Menezes,et al.  Elliptic Curves and Cryptography , 1999 .

[8]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[9]  Borko Furht,et al.  Multimedia Broadcasting over the Internet: Part I , 1998, IEEE Multim..

[10]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[11]  Rosa Lancini,et al.  A novel hashing algorithm for video sequences , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[12]  John G. Apostolopoulos,et al.  Secure scalable video streaming for wireless networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[13]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[14]  Tiejun Huang,et al.  Streaming of Governed Content - Time for a Standard , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[15]  Alan Lippman Video coding for multiple target audiences , 1998, Electronic Imaging.

[16]  Michael T. Orchard,et al.  Multiple-description video coding using motion-compensated temporal prediction , 2002, IEEE Trans. Circuits Syst. Video Technol..

[17]  Borko Furht,et al.  Multimedia Broadcasting over the Internet: Part II-Video Compression , 1999, IEEE Multim..

[18]  Chen-Hsiu Huang Video Transcoding Architectures and Techniques : An Overview , 2003 .