Skip to main content
Log in

The efficiency improved scheme for secure access control of digital video distribution

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The application of digital video distribution is reaching a wider spectrum of customers, in which secure access control of video content during rendering and transmission has become more and more necessary and urgent. Considering the limited computing power and the real-time requirement of set-top boxes, the efficiency of the decryption process is particularly significant. In this paper, we try to search for a scheme to improve the efficiency of the exist schemes for access control of digital video in set-top boxes mainly from three approaches. Firstly, with the specific comparison between AES and RC6, we conclude that RC6 provides sufficient security for set-top boxes, and the decryption process of RC6 is more efficient. Secondly, we improve the efficiency of the codecs process by adopting a latest more efficient video codec VP9, which is an open and royalty free video codec and is proved to be more efficient than H.264. Finally, we could only selective encrypt and decrypt some essential parts of the entire video stream during the codecs process to further improve the efficiency. In a conclusion, we propose a more efficient idea to provide access control of digital video in set-top boxes. This scheme is proved to be more efficient and more practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Advanced Encryption Standard (AES) (2001) Federal, information processing standards Publication 197 [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  2. Allah O S F, Ahmed H.E.H, Kalash H M (2007) Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images. International Conference on Electrical Engineering, 2007: 1–7. doi: 10.1109/ICEE.2007.4287293

  3. Bankoski J, Bultje RS, Grange A, Gu Q, Han J, Koleszar J, Mukherjee D, Wilkins P, Xu Y (2013) Towards a next generation open-source video codec. In Proceedings SPIE 8666, Visual Information Processing and Communication IV 8666(6): 1–13. doi: 10.1117/12.2009777

  4. Bjøntegaard G (2001) Calculation of average psnr differences between rd-curves. ITU-T SC16/Q6, 13th Video Coding Experts Group (VCEG) Meeting, Austin, Texas, USA

  5. Chen T, Huang Y, Tsai C, Hsieh B, Chen L (2006) Architecture design of context-based adaptive variable-length coding for H. 264/AVC. IEEE Trans Circ Syst II: Express Briefs 53(96):832–836. doi:10.1109/TCSII.2006.880014

    Article  Google Scholar 

  6. Contini S, Rivest RL, Robshaw MJB, Yin YL (1998) The security of the RC6™ Block Cipher.

  7. Daemen J, Rijmen V (1998) AES proposal: Rijndael. Ventura CA: NIST, pp 1–45. Available: http://www.Esat.kuleuven.ac.be/vijmen/rijndael.

  8. Furht B (1998) Handbook of internet and multimedia systems and applications. CRC Press, Boca Raton

    Google Scholar 

  9. Furht BB, Socek D, Eskicioglu AM (2005) Fundamentals of Multimedia Encryption Techniques. In: Multimedia security handbook, 3rd edn. USA: CRC press, pp 109–146

  10. Lian S (2009) Compression-combined encryption. In: Multimedia content encryption-Technique and application, 13th edn. USA: CRC press, pp 89–91

  11. Lian S, Sun J, Wang Z (2004) Quality analysis of several typical MPEG video encryption algorithms. J Image Graph (in Chinese) 9(4):483–490. doi:10.3969/j.issn. 1006-8961.2004.04.019

    Google Scholar 

  12. Liu W, Chang W (2006) Research on encryption technology for the streaming media. J Cent South For Univ (in Chinese) 26(6):119–122. doi:10.3969/j.issn. 1673-923X.2006.06.030

    Google Scholar 

  13. Mamoona Asghar (2012) Efficient Security for Scalable Coded Video Distribution. A Thesis submitted for the degree of Doctor of Philosophy, School of Computer Science & Electronic Engineering University of Essex, UK

  14. Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 15(7):2061–2075. doi:10.1109/TIP.2006.873426

    Article  Google Scholar 

  15. Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard. IEEE Trans Circ Syst Video Technol 13(7):620–636. doi:10.1109/TCSVT.2003.815173

    Article  Google Scholar 

  16. Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J-J (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008:179290. doi:10.1155/2008/179290

    Google Scholar 

  17. Mathur M, Kesarwani A (2013) . In Proceedings of National Conference on New Horizons in IT: 143–148

  18. Mukherjee D, Bankoski J, Grange A, Han J, Koleszar J, Wilkins P, Xu Y, Bultje R (2013) The latest open-source video codec VP9 – An overview and preliminary results, Picture Coding Symposium : 390–393. doi: 10.1109/PCS.2013.6737765

  19. Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E (2001) Report on the development of the advanced encryption standard (AES). J Res Natl Inst Stand Technol. doi:10.6028/jres.106.023

    Google Scholar 

  20. Ostermann J, Bormans J, List P, Marpe D, Narroschke M, Pereira F, Stockhammer T, Wedi T (2004) Video coding with H.264/AVC: Tools, performance, and complexity. IEEE Circ Syst Mag 4(1):7–28. doi:10.1109/MCAS.2004.1286980

    Article  Google Scholar 

  21. Pande A, Zambreno J (2013) Advances in multimedia encryption. In: Embedded multimedia security systems, 1st edn. Springer London, pp 11–22. doi: 10.1007/978-1-4471-4459-5_2

  22. Rivest RL, Robshaw MJB, Sidney R, Yin YL (1998) The RC6 Block Cipher. In First Advanced Encryption Standard (AES) Conference. Available: http://people.csail.mit.edu/rivest/Rc6.pdf.

  23. Rivest RL, Robshaw MJB, Yin YL (2001) RC6 as the AES. 16d Stowe Rd, London, W12 8BN

  24. Schafer R, Wiegand T, Schwarz H (2003) The emerging h.264/AVC standard. EBU Tech Rev 293:1–12

    Google Scholar 

  25. Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans Circ Syst Video Technol 17(9):1103–1120. doi:10.1109/TCSVT.2007.905532

    Article  Google Scholar 

  26. Shiguo Lian (2009) Multimedia Encryption in Typical Applications. In: Multimedia content encryption, 13th edn. USA: CRC press, pp 192–194

  27. Verma HK, Singh RK (2012) Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms. International Journal of Computer Applications (0975 – 8887) 42(16): 1–7. doi: 10.5120/5774-6002

  28. Wang G, Lu Y, Zhang L, Alfarrarjeh A, Zimmermann R, Kim SH, Shahabi C (2014) Active key frame selection for 3D model reconstruction from crowdsourced geo-tagged videos. 2014 I.E. Int Conf Multimedia Expo (ICME): 1–6. doi: 10.1109/ICME.2014.6890253

  29. Wiegand T, Schwarz H, Joch A, Kossentini F, Sullivan GJ (2003) Rate-constrained coder control and comparison of video coding standards. IEEE Trans Circ Syst Video Technol 13(7):688–703. doi:10.1109/TCSVT.2003.815168

    Article  Google Scholar 

  30. Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circ Syst Video Technol 13(7):560–576. doi:10.1109/TCSVT.2003.815165

    Article  Google Scholar 

  31. Yang Y, Huang Z, Shen H, Zhou X (2011) Mining multi-tag association for image tagging. World Wide Web 14(2):133–156. doi:10.1007/s11280-010-0099-8

    Article  Google Scholar 

  32. Yang Y, Huang Z, Yang Y, Shen H, Luo J (2013) Local image tagging via graph regularized joint group sparsity. Pattern Recognit 46(5):1358–1368

    Article  MATH  Google Scholar 

  33. Yang Y, Shen H, Nie F, Ji R, Zhou X (2013) Discriminative nonnegative spectral clustering with out-of-sample extension. IEEE Trans Knowl Data Eng 25(8):1760–1771. doi:10.1109/TKDE.2012.118

    Article  Google Scholar 

  34. Yang Y, Yang Y, Huang Z, Shen H, Nie F (2011) Tag localization with spatial correlations and joint group sparsity. Proc IEEE Comput Vis Pattern Recognit 8:881–888. doi:10.1109/CVPR.2011.5995499

    Google Scholar 

  35. Yang Y, Yang Y, Shen H (2013) Effective transfer tagging from image to video. ACM Trans Multimed Comput Commun Appl 9(2). doi: 10.1145/2457450.2457456

  36. Yang Y, Zha Z, Gao Y, Zhu X, Chua T (2014) Exploiting Web images for semantic video indexing via sample-specific loss. IEEE Trans Multimedia 16(6):1677–1689. doi:10.1109/TMM.2014.2323014

    Article  Google Scholar 

  37. Zhang L, Gao Y, Hong R, Hu Y, Ji R, Dai Q (2015) Probabilistic skimlets fusion for summarizing multiple consumer landmark videos. IEEE Trans Multimedia 17(1):40–49. doi:10.1109/TMM.2014.2370257

    Article  Google Scholar 

  38. Zhang L, Han Y, Yang Y, Song M, Yan S, Tian Q (2013) Discovering discrminative graphlets for aerial image categories recognition. IEEE Trans Image Process 22(12):5071–5084. doi:10.1109/TIP.2013.2278465

    Article  MathSciNet  Google Scholar 

  39. Zhang L, Song M, Zhao Q, Liu X, Bu J, Chen C (2013) Probabilistic graphlet transfer for photo cropping. IEEE Trans Image Process 22(2):802–815. doi:10.1109/TIP.2012.2223226

    Article  MathSciNet  Google Scholar 

  40. Zhang L, Xia Y, Mao K, Ma H, Shan Z (2014) An effective video summarization framework toward handheld devices. Ind Electron PP(99):1. doi:10.1109/TIE.2014.2336639

    Google Scholar 

  41. Zhang Y, Zimmermann R, Zhang L, Shamma DA (2014) Point of interest detection from multiple sensor-rich videos in geo-space. Proc ACM Int Conf Multimedia 14:861–864. doi:10.1145/2647868.2655027

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Deep exploration instrumentation and equipment development (SinoProbe-09-01-03) under Grant No.201011078, Key Technologies and Applications of Network of Things, which is a major scientific and technological project of Jilin Province under Grant No. 3002304.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongtu Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hu, L., Li, Y., Li, T. et al. The efficiency improved scheme for secure access control of digital video distribution. Multimed Tools Appl 75, 12645–12662 (2016). https://doi.org/10.1007/s11042-015-2450-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2450-7

Keywords

Navigation