University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Adaptation-aware encryption of scalable H.264/AVC video for content security

Kodikara Arachchi, H, Perramon, X, Dogan, S and Kondoz, AM (2009) Adaptation-aware encryption of scalable H.264/AVC video for content security SIGNAL PROCESSING-IMAGE COMMUNICATION, 24 (6). pp. 468-483.

[img]
Preview
PDF
paper.pdf
Available under License : See the attached licence file.

Download (473kB)
[img]
Preview
PDF (licence)
SRI_deposit_agreement.pdf

Download (33kB)

Abstract

Data encryption is one of the key information security technologies used for safeguarding multimedia content from unauthorised access and manipulation in end-to-end delivery and access chains. This technology, combined with the appropriate cryptographic methods, effectively prevents the content against malicious attacks, so as to protect its authenticity as well as integrity. While encryption-based security is ensuring the authorised consumption of the multimedia content, content adaptation technologies have the primary goal of providing means for wider dissemination of the content across diverse networks, devices and users, and thus enriching user satisfaction and experience of the delivered content within a given set of usage environment constraints. Traditionally, protected contents can only be adapted at trusted adaptation engines residing between the source and end-users, since they have to be fully decrypted before performing the necessary adaptation operations. The drawback of such a process is that it significantly limits the availability and flexibility of adaptation engines applicable for adapting protected contents on the fly. Thus, this paper proposes a novel scalable H.264/advanced video coding (AVC)-compatible video encryption technique, which is also transparent to adaptation engines in an end-to-end video delivery scenario. The proposed technology relies on keeping syntax elements required for performing the adaptation operations clear (i.e., not encrypted). The effectiveness of the proposed technique has been successfully verified in scenarios, where both conventional joint scalable video model (JSVM) bit stream extracting and random packet dropping mechanisms are used. (C) 2009 Elsevier B.V. All rights reserved.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Electronic Engineering
Authors :
AuthorsEmailORCID
Kodikara Arachchi, HUNSPECIFIEDUNSPECIFIED
Perramon, XUNSPECIFIEDUNSPECIFIED
Dogan, SUNSPECIFIEDUNSPECIFIED
Kondoz, AMUNSPECIFIEDUNSPECIFIED
Date : July 2009
Identification Number : 10.1016/j.image.2009.02.004
Uncontrolled Keywords : End-to-end secure content adaptation, Content-aware encryption, Video adaptation, H.264/SVC, Initialisation vector
Additional Information : NOTICE: this is the author’s version of a work that was accepted for publication in Signal Processing: Image Communication. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Signal Processing: Image Communication, 24(6), July 2009, DOI 10.1016/j.image.2009.02.004.
Depositing User : Symplectic Elements
Date Deposited : 10 May 2013 15:17
Last Modified : 23 Sep 2013 20:07
URI: http://epubs.surrey.ac.uk/id/eprint/771810

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800