Efficient in-network adaptation of encrypted H.264/SVC content

This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC). RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and VoD scenario are considered. Two basic alternatives to implement encryption and adaptation of H.264/SVC content are investigated: (i) full, format-independent encryption making use of Secure RTP (SRTP); (ii) SVC-specific encryption that leaves the metadata relevant for adaptation (NAL unit headers) unencrypted. The SRTP-based scheme (i) is straightforward to deploy, but requires the MANE to be in the security context of the delivery, i.e., to be a trusted node. For adaptation, the content needs to be decrypted, scaled, and re-encrypted. The SVC-specific approach (ii) enables both full and selective encryption, e.g., of the base layer only. SVC-specific encryption is based on own previous work, which is substantially extended and detailed in this paper. The adaptation MANE can now be an untrusted node; adaptation becomes a low-complexity process, avoiding full decryption and re-encryption of the content. This paper presents the first experimental comparison of these two approaches and evaluates whether multimedia-specific encryption can lead to performance and application benefits. Potential security threats and security properties of the two approaches in the IPTV and VoD scenario are elementarily analyzed. In terms of runtime performance on the MANE our SVC-specific encryption scheme significantly outperforms the SRTP-based approach. SVC-specific encryption is also superior in terms of induced end-to-end delays. The performance can even be improved by selective application of the SVC-specific encryption scheme. The results indicate that the efficient adaptation of SVC-encrypted content on low-end, untrusted network devices is feasible.

[1]  Enrico Magli,et al.  Conditional Access to H.264/AVC Video with Drift Control , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[2]  David R. Bull,et al.  A Novel Secure H.264 Transcoder using Selective Encryption , 2007, 2007 IEEE International Conference on Image Processing.

[3]  Borko Furht,et al.  New approaches to encryption and steganography for digital videos , 2007, Multimedia Systems.

[4]  Yong Man Ro,et al.  Scalable Protection and Access Control in Full Scalable Video Coding , 2006, IWDW.

[5]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[6]  Hermann Hellwagner,et al.  An H.264/SVC-based adaptation proxy on a WiFi router , 2008, NOSSDAV.

[7]  Debargha Mukherjee,et al.  A framework for fully format-independent adaptation of scalable bit streams , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Mark Handley,et al.  SDP: Session Description Protocol , 1998, RFC.

[9]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[10]  John G. Apostolopoulos Architectural Principles for Secure Streaming & Secure Adaptation in the Developing Scalable Video Coding (SVC) Standard , 2006, 2006 International Conference on Image Processing.

[11]  Abdulmotaleb El-Saddik,et al.  Compressed-Domain Video Processing for Adaptation, Encryption, and Authentication , 2008, IEEE MultiMedia.

[12]  Ajay Luthra,et al.  Introduction to the Special Issue on Scalable Video Coding-Standardization and Beyond , 2007, IEEE Trans. Circuits Syst. Video Technol..

[13]  Thomas Stütz,et al.  Format-Compliant Encryption of H.264/AVC and SVC , 2008, 2008 Tenth IEEE International Symposium on Multimedia.

[14]  Andreas Uhl,et al.  Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.

[15]  Thomas Stütz,et al.  A survey on JPEG2000 encryption , 2009, Multimedia Systems.

[16]  Henning Schulzrinne,et al.  Real Time Streaming Protocol (RTSP) , 1998, RFC.

[17]  Itu-T and Iso Iec Jtc Advanced video coding for generic audiovisual services , 2010 .

[18]  Henning Schulzrinne,et al.  RTP Profile for Audio and Video Conferences with Minimal Control , 2003, RFC.

[19]  Borko Furht,et al.  Multimedia encryption and watermarking , 2005, Multimedia systems and applications.

[20]  Steven McCanne,et al.  Receiver-driven layered multicast , 1996, SIGCOMM '96.

[21]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[22]  Информатика Internet Streaming Media Alliance , 2010 .

[23]  Debargha Mukherjee,et al.  Format independent encryption of generalized scalable bit-streams enabling arbitrary secure adaptations [multimedia communication applications] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[24]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[25]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[26]  Thomas Schierl,et al.  RTP Payload Format for SVC Video , 2006 .

[27]  Amir Said Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.

[28]  Deborah Estrin,et al.  Conference proceedings on Applications, technologies, architectures, and protocols for computer communications , 1996, SIGCOMM 1996.

[29]  Yong Man Ro,et al.  A selective video encryption for the region of interest in scalable video coding , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[30]  John G. Apostolopoulos,et al.  Secure scalable streaming enabling transcoding without decryption , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[31]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[32]  Martín Abadi,et al.  Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.

[33]  Byeungwoo Jeon,et al.  Digital Video Scrambling Using Motion Vector and Slice Relocation , 2005, ICIAR.

[34]  John G. Apostolopoulos,et al.  Secure scalable video streaming for wireless networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[35]  John G. Apostolopoulos,et al.  Secure scalable streaming and secure transcoding with JPEG-2000 , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[36]  Yuzhuo Zhong,et al.  A Quality-Controllable Encryption for H.264/AVC Video Coding , 2006, PCM.

[37]  Pascal Frossard,et al.  Securing media for adaptive streaming , 2003, MULTIMEDIA '03.

[38]  Eric Rescorla,et al.  SSL and TLS: Designing and Building Secure Systems , 2000 .

[39]  Andreas Uhl,et al.  Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .

[40]  Thomas Stütz,et al.  Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters , 2007, EURASIP J. Inf. Secur..

[41]  Touradj Ebrahimi,et al.  The emerging JPEG-2000 security (JPSEC) standard , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[42]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[43]  Hermann Hellwagner,et al.  Design options and comparison of in-network H.264/SVC adaptation , 2008, J. Vis. Commun. Image Represent..