Compressive sensing (CS) has recently attracted much attention due to its unique feature of directly and simultaneously acquiring compressed and encrypted data based on their sparse or compressible properties. To secu...
详细信息
ISBN:
(纸本)9781457713033
Compressive sensing (CS) has recently attracted much attention due to its unique feature of directly and simultaneously acquiring compressed and encrypted data based on their sparse or compressible properties. To securely transmit compressively sensed multimedia data over networks, it is required to support transcoder to securely convert compressed multimedia into several different types for diverse receivers. In this paper, a secure transcoding scheme for compressive multimedia sensing is proposed. We focus on securely converting compressively sensed multimedia data (not data compressed via standard codec) with a certain number of measurements into other different numbers of measurements without resorting to reconstruct the original data. We show that the security can be achieved via transforming multimedia re-sensing process into another secure domain at the transcoder. We also show that the computational security can be achieved while transmitting compressively sensed data between the sender (or each receiver) and the transcoder over networks.
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media distribution as well as se...
详细信息
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media distribution as well as security in protecting the confidentiality of media content and ensuring its authenticity. However, achieving flexibility and achieving security are conventionally conflicting with each other. This is mainly because that security is traditionally implemented in a media-unaware manner that naturally prevents flexible handling of the media content during its distribution. This paper shows that the two goals can be simultaneously accomplished by making an overall plan and taking into consideration all the factors: coding, encryption, packetization, authentication, and transcoding. it emphasizes sender authentication, which is a big security issue for media streaming, but somehow left unresolved. We propose a secure media streaming mechanism which supports media-aware encryption, sender authentication and secure transcoding. Multimedia Application Routing Server (MARS) is especially used as an intelligent mid-network proxy with the ability to perform tasks of sender authentication and secure transcoding. A prototype system for securely streaming AVS media using MARS demonstrates the performance, thus proves the practicality of the proposed secure media streaming mechanism. (C) 2009 Published by Elsevier B.V.
In this paper we focus on improving the optimized content-aware authentication scheme over lossy network [1] and incorporating this scheme into secure scalable streaming (SSS) and secure transcoding with JPEG-2000 Ima...
详细信息
ISBN:
(纸本)9781424442904
In this paper we focus on improving the optimized content-aware authentication scheme over lossy network [1] and incorporating this scheme into secure scalable streaming (SSS) and secure transcoding with JPEG-2000 Images [2]. SSS encodes, encrypts and packetizes image into secure scalable packets in a manner that allows downstream transcoders to perform transcoding operations by simply truncating or discarding packets without decrypting the data. However SSS does not consider the issues of packet loss and stream authentication while the stream is transmitted over today's public and lossy networks. This paper proposes an improved optimized content-aware authentication scheme and implements a system to integrate it with SSS seamlessly. Experimental results demonstrate that the proposed scheme achieved our design goal in that the R-D curve of the authenticated image is very close to its original one where no authentication is applied.
In multimedia services, security and privacy issues are urgent to be solved, such as the content security and service protection. To solve these issues, some means have been proposed, such as conditional access and di...
详细信息
In multimedia services, security and privacy issues are urgent to be solved, such as the content security and service protection. To solve these issues, some means have been proposed, such as conditional access and digital rights management. However, for the latest application scenarios in convergent networks, there is still no solution. This paper focuses on the convergent multimedia broadcasting applications: the multimedia content, e.g., TV program, is encoded and packaged by the content provider, and is then transmitted to users through different communication networks, e.g., 3G network, DVB-H, ADSL, etc. Thus, the same multimedia content will be used for various services, i.e., mobile TV, Internet TV and home TV. Since different network channel support different bandwidths, the multimedia content should be transcoded before being transmitted through the networks. To protect the content and service in this application, we propose the content and service protection methods. In content protection, the content provider encrypts the scalable multimedia content with the manner denoted by Encryption Flag. The content distributor has no decryption keys, but can transcode the scalable content with the manner denoted by Layer Flag, and transmit the transcoded content to users. In service protection, the content provider combines the encryption key, Encryption Flag and the user right information, and transmits them, independent from the encrypted content, to certified users. At user side, the content is decrypted with the received key according to the Encryption Flag and Layer Flag. Thus, the content provider needs only to encrypt the content once, which can be transcoded by the content distributor in a secure manner and used for various networks. Additionally, the user rights need not to be changed when the service network is changed. Totally, the proposed scheme is secure and efficient for service convergence.
In this paper, we first review the on-going JPSEC standardization activity. Its goal is to extend the baseline JPEG 2000 specification to provide a standardized framework for secure imaging, in order to support tools ...
详细信息
ISBN:
(纸本)0819454966
In this paper, we first review the on-going JPSEC standardization activity. Its goal is to extend the baseline JPEG 2000 specification to provide a standardized framework for secure imaging, in order to support tools needed to secure digital images, such as content protection, data integrity check, authentication, and conditional access control. We then present two examples of JPSEC tools. The first one is a technique for secure scalable streaming and secure transcoding. It allows the protected JPSEC codestream to be transcoded while preserving the protection, i.e. without requiring unprotecting (e.g. decrypting) the codestream. The second one is a technique for conditional access control. It can be used for access control by resolution or quality, but also by regions of interest
With the increasing demands on image transcoding in heterogeneous networks, a ciphertext-based transcoding hierarchical encryption algorithm (CT-HEA) is proposed for JPEG2000 streams. By utilizing the rate-distortion ...
详细信息
ISBN:
(纸本)9781479967315
With the increasing demands on image transcoding in heterogeneous networks, a ciphertext-based transcoding hierarchical encryption algorithm (CT-HEA) is proposed for JPEG2000 streams. By utilizing the rate-distortion optimized truncation, CT-HEA rearranges the compressed bitstream according to the quality layer and the resolution of the image, and then applies a hierarchical encryption scheme to the reorganized codestream via using cryptographic functions. This supports transparent transcoding operations directly on the compressed and encrypted bitstream. Simulation results demonstrate that the proposed CT-HEA has high transcoding flexibility with a low transcoding costs.
Scalable video coding has long been known to provide important functionalities such as low-complexity adaptation for diverse clients with different resources and for delivery over heterogeneous networks with time-vary...
详细信息
ISBN:
(纸本)9781424404810
Scalable video coding has long been known to provide important functionalities such as low-complexity adaptation for diverse clients with different resources and for delivery over heterogeneous networks with time-varying available bandwidths. Recent advancements in scalable video coding have significantly improved the achievable compression performance, and the Scalable Video Coding (SVC) standard is currently under intense development. An additional capability of scalable coding, which we believe has received less attention than it deserves, is the possibility with careful cross-layer design to support secure adaptive streaming at an untrustworthy sender and secure adaptation at an untrustworthy mid-network node. Building on the secure Scalable Streaming framework for video, and its realization within the JPEG-2000 Security (JPSEC) standard, we describe the architectural principles and design details necessary so that SVC can also enable secure adaptive streaming at a sender and secure R-D optimized adaptation at an untrustworthy mid-network node.
暂无评论