Key management and distribution for secure multimedia multicast

被引:47
作者
Trappe, W [1 ]
Song, J
Poovendran, R
Liu, KJR
机构
[1] Rutgers State Univ, Wireless Informat Network Lab, Piscataway, NJ 08854 USA
[2] Rutgers State Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[3] Agere Syst, Holmdel, NJ 07733 USA
[4] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[5] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[6] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
关键词
data embedding; key management; multimedia; secure multicast;
D O I
10.1109/TMM.2003.813279
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of controlling access to multimedia multicasts; requires the distribution and maintenance of keying information. Typically, the problem of key management is considered separately from the problem of distributing the rekeying messages. Multimedia sources provide two approaches to distributing the rekeying messages associated with securing group communication. The first, and more conventional, approach employs the use of a media-independent channel to convey rekeying messages. We propose, however, a second approach that involves the use of a media-dependent channel, and is achieved for multimedia by using data embedding techniques. Compared to a media-independent channel, the use of data embedding to convey rekeying messages provides enhanced security by masking the presence of rekeying operations. This covert communication makes it difficult for an adversary to gather information regarding the group membership and its dynamics. In addition to proposing a new mode of conveyance for the rekeying messages, we introduce a new message format that is suitable for multicast key management schemes. This new message format uses one-way functions to securely distribute new key material to subgroups of users. An advantage of this approach over the traditional message format is that no additional messages must be sent to flag the users which portion of the message is intended for them, thereby reducing communication overhead. We then show how to map the message to a tree structure in order to achieve desirable scalability in communication and computational overhead. Next, as an example of the interplay between the key management scheme and the mode of conveyance, we study the feasibility of embedding rekeying messages using a data embedding method that has been recently proposed for fractional-pel video coding standards such as H.263 and MPEG-2. Finally, since multimedia services will involve multiple layers or objects, we extend the tree-based key management schemes to include new operations needed to handle multilayer multimedia applications where group members may subscribe or cancel membership to some layers while maintaining membership to other layers.
引用
收藏
页码:544 / 557
页数:14
相关论文
共 29 条
[1]  
[Anonymous], 1997, MPEG VIDEO COMPRESSI
[2]  
[Anonymous], 1998, VIDEO CODING LOW BIT
[3]  
Balenson D., KEY MANAGEMENT LARGE
[4]  
Blundo C., 1994, Journal of Computer Security, V3, P309
[5]   Multicast security: A taxonomy and some efficient constructions [J].
Canetti, R ;
Garay, J ;
Itkis, G ;
Micciancio, D ;
Naor, M ;
Pinkas, B .
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, :708-716
[6]  
CANETTI R, 1999, EUROCRYPT, P456
[7]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[8]  
Hartung F, 1997, INT CONF ACOUST SPEE, P2621, DOI 10.1109/ICASSP.1997.595326
[9]  
HERPEL C, 2000, SIGN PROC COMMUN SER, V2, P367
[10]   Robust Internet video transmission based on scalable coding and unequal error protection [J].
Horn, U ;
Stuhlmüller, K ;
Link, M ;
Girod, B .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 1999, 15 (1-2) :77-94