Multimedia Tools and Applications

, Volume 73, Issue 2, pp 737–761 | Cite as

Rate-sensitive leverage of QoS and QoP for ubiquitous video streaming via buffer-aware feedback control

  • Chia-Hui Wang
  • Hsing-Shao Liu
  • Ching-Chia Hsieh


Providing real-time Internet video streaming anytime, anywhere and using any devices from different access networks preserves more challenges to equilibrate the quality of service (QoS) and security protection (QoP). Because encryption/decryption for video packets are time-consuming processes to protect real-time video streaming services from eavesdropping, our observation is that the playback buffer occupancy (PBO) can simply indicate time availability to adjust security level to affect the packet sending rate. In this paper, we present an end-to-end buffer-aware feedback control from client PBO for effectively securing media streaming for heterogeneous clients over ubiquitous Internet. That is, security-level adjustments can be applied further to keep PBO running away from overflow and underflow to pursue an effective leverage between QoS and QoP. To further boost the protection, we also apply the Diffie-Hellman key negotiation method to provide the dynamic key changes. Moreover, since the running PBO will vary on the dynamics of Internet from access time, client devices and access networks, the different applied security levels and key changes during the video streaming session will make eavesdropper more difficult to recover all the encrypted videos delivered in public networks. We demonstrate the leverage performance in preserving both QoS and QoP for ubiquitous video streaming in our proposed schemes by comprehensive experiments on a true VoD system. The experimental results show our secure VoD scheme can achieve cost-effective leverage of QoS and QoP from different inserted network dynamics, even if client buffer size is limited to 256 KB only.


Secure VoD Quality of service Quality of protection Playback buffer occupancy Feedback control 


  1. 1.
    Agi I, Gong L (1996) An empirical study of secure MPEG video transmissions, Proceedings of the Internet Society Symposium on Network and Distributed System Security, San Diego, CA, pp. 137–144, FebGoogle Scholar
  2. 2.
    Alattar A, Al-Regib G, Al-Semari S (1999) Improved selective encryption techniques for secure transmission of MPEG video bit-streams, Proceedings of the IEEE International Conference on Image Processing, Japan, Nov. 1999.Google Scholar
  3. 3.
    Aly SA, Al-Shaer E (2003) A light-weight encrypting for real time video transmission, CTI Symposium Conference, DePaul University, Chicago, USA, NovemberGoogle Scholar
  4. 4.
    Bhargava B, Shi C, Wang SY (2004) MPEG Video Encryption Algorithms. Multimedia Tools and Applications 24(No. 1):57–79CrossRefGoogle Scholar
  5. 5.
    Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, New YorkCrossRefMATHGoogle Scholar
  6. 6.
    Chia-Hui Wang, Yu-Shun Liu (2011) A dependable privacy protection for end-to-end voip via elliptic-curve diffie-hellman and dynamic key changes, Journal of Network and Computer Applications special issue on Dependable Multimedia Communications: Systems, Services, and Applications, Volume 34, Issue 5, Pages 1545-1556, September 2011.Google Scholar
  7. 7.
    Courtois NT, Bard GV (2007) Algebraic cryptanalysis of the data encryption standard. LNCS 4887:152–169MathSciNetGoogle Scholar
  8. 8.
    Daemen J, Rijmen V (2002) The design of Rijndael: AES - the advanced encryption standard, Springer-VerlagGoogle Scholar
  9. 9.
    Data Encryption Algorithm (DEA), ANSI X3.92-1981, American National Standards Institute, New York.Google Scholar
  10. 10.
    Diffie W, Hellman M (1976) New directions in cryptography, IEEE Transactions on Information Theory, NovGoogle Scholar
  11. 11.
    Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam (2007) SRMT: a lightweight encryption scheme for secure real-time multimedia transmission, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE’07), pp.60–65Google Scholar
  12. 12.
    Furht B, Socek D (2004) A survey of multimedia security, Comprehensive Report on Information Security, IECGoogle Scholar
  13. 13.
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Huang Y, Mao S, Midkiff SF (2009) A control-theoretic approach to rate control for streaming videos. IEEE Transactions On Multimedia 11(6):1072–1081CrossRefGoogle Scholar
  18. 18.
    Hui Zhang, Domenico Ferrari (1994) Rate-contol service disciplines, J High Speed Network, Vol. 3, No. 4Google Scholar
  19. 19.
    Jen-Chieh Lai, Chia-Hui Wang (2006) Buffer occupancy feedback security control and changing encryption keys to protect MOD services, IEEE Pacific-Rim Symposium on Image and Video Technology (PSIVT’06), Taiwan, December 11-13Google Scholar
  20. 20.
    Kankanhalli M, Guan T (2002) Compressed-domain scrambler/descrambler for digital video. IEEE Trans Consum Electron 48(2):356–365CrossRefGoogle Scholar
  21. 21.
    Kimball PM (1999) Has technology introduced new ethical problems. Journal of Business Ethics 19:81–90CrossRefGoogle Scholar
  22. 22.
    Liu F, Koenig H (2005) Puzzle - a novel video encryption algorithm, In: Proceedings IFIP TC-6 Conference Communications & Security, Salzburg, Austria, September, LNCS 3677, Springer, pp. 88 - 97Google Scholar
  23. 23.
    Liu Z, Peng D, Zheng Y, Liu Jeffery (2005) Communication protection in IP-based video surveillance systems, Proceeding of the Seventh IEEE International Symposium on Multimedia (ISM 2005), pp. 69-78Google Scholar
  24. 24.
    Liu J, Zou LL, Xie C, Huang H (2006) A two-way selective encryption algorithm for MPEG Video, IWNAS, pp. 183-187Google Scholar
  25. 25.
    Matsui M (1993) Linear cryptanalysis method for DES cipher, Proceedings, EUROCRYPT’93. Springer, New YorkGoogle Scholar
  26. 26.
    Meyer J, Gadegast F (1995) Security mechanisms for multimedia-data with the example MPEG-1-video, Project Description of SECMPEG. Tech. Univ. of Berlin, GermanyGoogle Scholar
  27. 27.
    Ong CS, Nahrstedt K, Wanghong (2003) Quality of protection for mobile multimedia applications, IEEE International Conference on Multimedia and Expo, 2003. ICME 2003. II137-II140Google Scholar
  28. 28.
    Pfeffer P (2006) IPTV: Technology and Development Predictions. Fiber & Integrated Optics 25(5):325–346CrossRefGoogle Scholar
  29. 29.
    Qiao L, Nahrstedt K (1997) A new algorithm for MPEG video encryption, Proceedings of the 1st International Conference on Imaging Science, Systems, and Technology, pp. 21-29, 1997.Google Scholar
  30. 30.
    Qiao L, Nahrstedt K (1998) Comparison of MPEG encryption algorithms. Comput Graph 22(4):437–448CrossRefGoogle Scholar
  31. 31.
    Shi C, Bhargava B (1998) An efficient MPEG video encryption algorithm, Proc Symp Reliable Distributed Systems, pp. 381–386, OctGoogle Scholar
  32. 32.
    Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm, Proceedings of ACM Multimedia Conference, pp. 81-88Google Scholar
  33. 33.
    Shi C, Wang S, Bhargava B (1999) MPEG video encryption in real-time using secret key cryptography, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA’99), Las Vegas, Nevada, USAGoogle Scholar
  34. 34.
    Spanos GA, Maples TB (1995) Performance study of a selective encryption scheme for the security of networked, real-time video, Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), pp. 2-10Google Scholar
  35. 35.
    Sun YS, Tsou FM, Chen MC (1998) A buffer occupancy-based adaptive flow control and recovery scheme for real-time stored MPEG video transport over Internet, IEICE Trans. Commun., Vol. E81-B, No. 11Google Scholar
  36. 36.
    Tang L (1996) Methods for encrypting and decrypting MPEG video data efficiently, Proceedings of the 4th ACM international conference on Multimedia, pp. 219-230, NovGoogle Scholar
  37. 37.
    Tosun AS, Feng WC (2000) Efficient multi-layer coding and encryption of MPEG video streams, IEEE Int. Conf. Multimedia and Expo, Vol. 1, pp. 119-122, July 30 – AugGoogle Scholar
  38. 38.
    Tosun AS, Feng WC (2001) Lightweight security mechanisms for wireless video transmission, IEEE Int. Conf. on Info. Technol.: Coding and Computing, pp. 157-161,AprilGoogle Scholar
  39. 39.
    Video filtering and compression by MSU Video Group (CS MSU Graphics & Media Lab),
  40. 40.
    Wang CH, Chang RI, Ho JM, Hsu SC (2003) Rate-sensitive ARQ for real-time video streaming, IEEE Global Telecommunications ConferenceGoogle Scholar
  41. 41.
    Wang CH, Ho JM, Chang RI, Hsu SC (2001) A control-theoretic rate-based control of buffer-occupancy feedback for real-time multimedia communications, Multimedia, Internet, Video Technologies 2001 (MIV 2001) of WSES/IEEE International Multi-conference, SeptGoogle Scholar
  42. 42.
    Wiener MJ (1990) Cryptanalysis of short RSA secret exponents. Information Theory, IEEE Transactions on 36(3):553–558MathSciNetCrossRefMATHGoogle Scholar
  43. 43.
    Wiener M (1994) Efficient DES key search, Advances in Cryptology — Proc. Crypto '93, LNCS, Vol. 773Google Scholar
  44. 44.
    Wu CP, Kuo CJ (2000) Fast encryption methods for audiovisual data confidentiality. Proceedings of SPIE International Symposia on Information Technologies 4209:284–295Google Scholar
  45. 45.
    Xiao Y, Du X, Zhang J, Hu F, Guizani S (2007) Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet. Communications Magazine, IEEE 45(11):126–134CrossRefGoogle Scholar
  46. 46.
    Yang CH (2001) Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs, Proc. 2001 Symposium on Cryptography and Information Security (SCIS2001), Oiso, Japan, pp. 727-730, JanuaryGoogle Scholar
  47. 47.
    Yang M, Bourbakis N, Li S (2004) Data-Image-Video Encryption. IEEE Potentials 23(No. 3):28–34CrossRefGoogle Scholar
  48. 48.
    Zeng W, Lei S (1999) Efficient frequency domain video scrambling for content access control, Proceedings of ACM Multimedia, Orlando, FL, pp. 285-294, OctGoogle Scholar
  49. 49.
    Zeng W, Lei S (2002) Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia 5(1):118–129CrossRefGoogle Scholar
  50. 50.
    Zhu BB, Yuan C, Wang Y, Li S (2005) Scalable Protection for MPEG-4 Fine Granularity Scalability. IEEE Trans on Multimedia 7(2):222–233CrossRefGoogle Scholar
  51. 51.
    Zhu BB, Zeng W, Yu H, Lin CY (2006) Multimedia Encryption. In: Multimedia Security Technologies for Digital Rights Management. Academic, AmsterdamGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Chia-Hui Wang
    • 1
  • Hsing-Shao Liu
    • 2
  • Ching-Chia Hsieh
    • 3
  1. 1.Department of Computer Science & Information EngineeringMing Chuan UniversityGuei Shan DistrictTaiwan
  2. 2.Multimedia Communication Business DivisionYES Information IncorporatedTaipei CityTaiwan
  3. 3.Department of Information ManagementNational Taiwan UniversityTaipei CityTaiwan

Personalised recommendations