An Efficient Security System for CABAC Bin-Strings of H.264/SVC

被引:27
作者
Asghar, Mamoona Naveed [1 ]
Ghanbari, Mohammad [1 ]
机构
[1] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
关键词
AES-CFB algorithm; context adaptive binary arithmetic coding (CABAC); H.264/scalable video coding (SVC); key management; multimedia Internet keying protocol (MIKEY); security system; ENCRYPTION SCHEME; ACCESS-CONTROL; VIDEO; MULTIMEDIA;
D O I
10.1109/TCSVT.2012.2204941
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we propose a complete security system for H.264/scalable video coding (SVC) video codec and present a solution for the bit-rate and format compliance problems by careful selection of entropy coder syntax elements (bin-strings) for selective encryption (SE), and the problem of managing multiple layer encryption keys for scalable video distribution. A standard key management protocol, multimedia Internet keying protocol, is implemented for the hierarchical key generation mechanism, in which a subscriber has only one encryption key to unlock all scalable layers that have been subscribed to. The evaluation demonstrates the resulting video quality degradation arising from SE for many CIF and 4CIF test video sequences, without there being any impact upon the bit-rate or format compliancy, and with small computational delay. The security and statistical analysis performed further verify the effectiveness of the proposed security system for H.264/SVC. The proposed system is highly suitable for video distribution to users who have subscribed to a varying degree of video quality on devices with medium to high computational resources.
引用
收藏
页码:425 / 437
页数:13
相关论文
共 52 条
[1]   Scalable video encryption of H.264 SVC Codec [J].
Algin, Gul Boztok ;
Tunali, E. Turban .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2011, 22 (04) :353-364
[2]  
[Anonymous], 1996, ONE WAY TRANSMISSION
[3]  
[Anonymous], 1997, HMAC KEYED HASHING M
[4]  
[Anonymous], 1992, 1321 IETF RFC
[5]  
[Anonymous], 2010, INT J COMPUT ELECT E, DOI DOI 10.7763/IJCEE.2010.V2.141
[6]  
[Anonymous], 2004, INTERNET REQUESTS CO
[7]  
[Anonymous], P ACM MULT SEC WORKS
[8]  
[Anonymous], 2009, 2009 2 INT C IMAGE S
[9]  
[Anonymous], FED INF PROC STAND P
[10]  
Apostolopoulos J. G., 2006, NETW AW MULT PROC CO