A scheme for conditional access-based systems using index locations of DCT coefficients

Most of the existing conditional access-based systems (CAS) follow a standard methodology. The service provider shares two copies for single information (specifically image for this work). One copy is a low-resolution version which is shared in the public domain for preview purpose. The other one is a high-resolution version to be provided to the customers through a secure channel on demand (after payment). We propose a novel scheme that can be efficiently adapted in such a scenario. We analyze the images in the discrete cosine transform (DCT) domain and note that polynomials of suitable degree, representing the sorted DCT coefficients together with original index locations, can uniquely represent an image. We show that the arrangement of DCT index locations, after the actual coefficients have been sorted by magnitude, is significantly different for various images and we exploit this to design an efficient CAS-based scheme. We also show that the amount of private data, which a service provider needs to transmit through a secure channel to the customers on demand, is reduced significantly. This reduction in transmitted data makes the system apt for real-time secure applications.

[1]  Hyoung-Kee Choi,et al.  Improvements on Sun 's Conditional Access System in Pay-TV Broadcasting Systems , 2010, IEEE Transactions on Multimedia.

[2]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[3]  Fei Peng,et al.  An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Douglas Sicker,et al.  Selective encryption for consumer applications , 2004, CCNC.

[5]  D. Diaz-Sanchez,et al.  Sharing conditional access modules through the home network for pay TV access , 2009, IEEE Transactions on Consumer Electronics.

[6]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[7]  Subhamoy Maitra,et al.  Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.

[8]  Chi-Sung Laih,et al.  Efficient Key Distribution for Access Control in Pay-TV Systems , 2008, IEEE Transactions on Multimedia.

[9]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Zafar Shahid,et al.  Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.

[11]  Bharat K. Bhargava,et al.  On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Hamid Sharif,et al.  Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks , 2010, IEEE Transactions on Multimedia.

[13]  Tony Thomas,et al.  Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption , 2012, IEEE Transactions on Multimedia.

[14]  Elisa Bertino,et al.  A selective encryption approach to fine-grained access control for P2P file sharing , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[15]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[16]  Xi Chen,et al.  On the design of partial encryption scheme for multimedia content , 2013, Math. Comput. Model..

[17]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[18]  Robert F. Easley,et al.  Optimal Digital Rights Management with Uncertain Piracy , 2012, 2012 45th Hawaii International Conference on System Sciences.

[19]  Jaime Delgado,et al.  Digital rights and privacy policies management as a service , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[20]  Hamid Sharif,et al.  On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks , 2010, IEEE Transactions on Multimedia.

[21]  Jianying Zhou,et al.  Cryptanalysis of Chu's DCT based watermarking scheme , 2006, IEEE Transactions on Multimedia.

[22]  Ed Dawson,et al.  Design and Cryptanalysis of Transform-Based Analog Speech Scamblers , 1993, IEEE J. Sel. Areas Commun..

[23]  Andrés Marín López,et al.  Sharing Conditional Access Modules through the home network , 2009, 2009 Digest of Technical Papers International Conference on Consumer Electronics.

[24]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  Prasant Mohapatra,et al.  Securing Multimedia Content Using Joint Compression and Encryption , 2013, IEEE MultiMedia.

[27]  Moni Naor,et al.  Protecting Cryptographic Keys: The Trace-and-Revoke Approach , 2003, Computer.