Multimedia Tools and Applications

, Volume 35, Issue 3, pp 335–355 | Cite as

An efficient implementation of a low-complexity MP3 algorithm with a stream cipher



For portable devices with MP3 codec, the demands of digital right management arise recently. To provide a secure scheme to the most portable devices with MP3 codec, this work efficiently implements a secure MP3 algorithm on a dual-core system with one DSP and one RISC. The secure MP3 algorithm is a combination of a proposed low-complexity MP3 algorithm and a stream cipher. The low-complexity MP3 algorithm is executed on DSP and the stream cipher is on RISC. This separated design can dynamically update the type of stream ciphers in various applications. However, some of the main data, rather than an entire MP3 file, is encrypted in the MP3 frame. The partially encrypted data have variable size, determined by the specified security level. The security scheme offers two advantages. The first is that the encrypting and decrypting structures are identical. The second is that the scheme easily determines the quality of the encrypted MP3. For saving the computational power to obtain long playing time for a portable device, a low-complexity MP3 encoder and decoder are implemented using ADSP-2181 with 16-bit fixed-point data precision. MP3 encoding requires only 27.2 KB/16.8 KB (data RAM/program RAM), and decoding requires 23.6 KB/20.7 KB for decoder. The peak MIPS of the encoder and decoder are 21.05 and 17.67, respectively. This work can be applied to a Digital Rights Management (DRM) system for limiting the access of the music.


MP3 Multimedia security DRM DSP Low complexity 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Bang KH, Jeong NH, Lim JS, Park YC, Youn DH (2002) Design and VLSI implementation of a digital audio-specific DSP core for MP3/AAC. In: International Conference on Consumer Electronics, Digest of Technical Papers, pp 220–221 (June)Google Scholar
  3. 3.
  4. 4.
    European Broadcasting Union, EBU SQAM.
  5. 5.
    Hauser T, Wenz C (2003) DRM under attack. In: Lecture note in Compute Science, vol 2770. Springer, Berlin Heidelberg New York, pp. 206–223.Google Scholar
  6. 6.
    ISO/IEC JTC1/SC29/WG11 MPEG, International Standard IS 11172–3 (1993) Coding of moving pictures and associated audio for digital storage media at up to about 1.5M bit/s, part 3: audioGoogle Scholar
  7. 7.
    ITU-R Recommendation BS.1116 (1994) Methods for the subjective assessment of small impairment in audio systems including multichannel sound systems. In: International Telecommunication Union, Geneva, SwitzerlandGoogle Scholar
  8. 8.
    ITU-R Recommendation BS.1387-1 (1998) Method for objective measurements of perceived audio quality (Dec)Google Scholar
  9. 9.
    Jeong MS, Kim S, Sohn J, Kang JY (1996) Finite wordlength effects evaluation of the MPEG-2 audio decoder. In: International Conference on Signal Processing Applications & Technology, pp 351–355 (Jan)Google Scholar
  10. 10.
    Lame Aint an MP3 Encoder (LAME).
  11. 11.
    Lee BG (1984) A new algorithm to compute the discrete cosine transform. IEEE Trans Acoust Speech Signal Process ASSP-32(6):1243–1245MATHCrossRefGoogle Scholar
  12. 12.
    Lee KH, Lee KS, Hwang TH, Park YC, Youn DH (2001) An architecture and implementation of MPEG Audio Layer III decoder using dual-core DSP. IEEE Trans Consum Electron 47(4): 928–933 (Nov)CrossRefGoogle Scholar
  13. 13.
    Lee KS, Oh HO, Park YC, Youn DH (2001) High quality MPEG-audio Layer III algorithm for a 16-bit DSP. In: Proceedings of IEEE International Symposiumon Circuit and Systems, vol II. Sydney, Australia, 6–9 May, pp. 205–208Google Scholar
  14. 14.
  15. 15.
    Oh HO, Kim JS, Song CJ, Park YC, Youn DH (2001) Low power MPEG/Audio encoders using simplified psychoacoustics model and fast bit allocation. IEEE Trans Consum Electron 47(3):613–621 (Aug)CrossRefGoogle Scholar
  16. 16.
    Rogaway P, Coppersmith D (1994) A software-optimized encryption algorithm. In: Fast Software Encryption, Cambridge Security Workshop Proceedings, vol 809. Springer, Berlin Heidelberg New York, pp. 56–63Google Scholar
  17. 17.
  18. 18.
  19. 19.
  20. 20.
    Thorwirth NJ, Horvatic P, Weis R, Zha J (2000) Security methods for MP3 music delivery. In: Proceedings of the 23th Asilomar Conference on IEEE Signals, Systems and Computers, vol 2, pp 1831–1835Google Scholar
  21. 21.
    Torrubia A, Mora F (2002) Perceptual cryptography on MPEG-1 Layer III bit-streams. In: Proceedings of International Conference on IEEE Consumer Electronics, pp 324–325Google Scholar
  22. 22.
    Wang X, DOU W, HOU Z (2002) An improved audio encoding architecture based on 16-bit fixed-point DSP. In: IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions, vol 2, pp 918–921 (July)Google Scholar
  23. 23.
    Yu-Shiang Lin (2004) MPEG-1 Layer III audio codec optimization and implementation on a DSP chip. Master thesis, National Chiao-Tung University, Hsinchu, TaiwanGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  1. 1.Department of Electrical and Control EngineeringNational Chiao Tung UniversityHsinchuRepublic of China

Personalised recommendations