Advertisement

Puzzle – A Novel Video Encryption Algorithm

  • Fuwen Liu
  • Hartmut Koenig
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)

Abstract

Networked multimedia applications have matured in recent years to be deployed in a larger scale in the Internet. Confidentiality is one of the primary concerns of these services for their commercial usages, e.g. in video on de mand services or in video conferences. In particular, video encryption algorithms are strongly required that fulfill real-time requirements. In this paper we present the video encryption algorithm Puzzle to encrypting video streams in software. It is fast enough to fulfill real-time constraints and to provide a sufficient security. Puzzle is a video compression independent algorithm which can be easily incorporated into existing multimedia systems.

Keywords

Video Stream Encryption Algorithm Stream Cipher Video Encryption Cipher Text 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    NIST: Advanced Encryption Standard. FIPS 197 (2001)Google Scholar
  2. 2.
    Agi, I., Gong, L.: An Empirical Study of MPEG Video Transmission. In: NDSS 1996, pp.137-144 (1996)Google Scholar
  3. 3.
    Haskell, B.G., Puri, A., Netravali, A.N.: Digital Video: An Introduction to MPEG-2. Kluwer Academic Publishers, Dordrecht (1996)Google Scholar
  4. 4.
    Fuhrt, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2004)Google Scholar
  5. 5.
    Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: IASTED International Conference on Communications, Internet and Information Technology (CIIT) (2003)Google Scholar
  6. 6.
    Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proceedings ACM International Conference on Multimedia, pp. 219–229 (1996)Google Scholar
  7. 7.
    Shi, C., Wang, S.Y., Bhargava, B.: MPEG Video Encryption in Real-Time Using Secret Key Cryptography. In: PDATA 1999 (1999)Google Scholar
  8. 8.
    Zeng, W., Lei, S.: Efficient Frequency Domain Selective Scrambling of Digital Video. IEEE Transactions on Multimedia (2002)Google Scholar
  9. 9.
    Wu, C.–P., Kuo, C.-C.J.: Efficient Multimedia Encryption via Entropy Codec Design. In: SPIE Int. Symposium on Electronic Imaging 2001, vol. 4314 (2001)Google Scholar
  10. 10.
    Spanos, G.A., Maples, T.B.: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. In: ICCCN, pp. 2–10 (1995)Google Scholar
  11. 11.
    Li, Y., Chen, Z., Tan, S.-M., Campbell, R.H.: Security Enhanced MPEG Player. In: IEEE 1st International Workshop on Multimedia Software (1996)Google Scholar
  12. 12.
    Qiao, L., Nahrstedt, K.: Comparison of MPEG Encryption Algorithms. Computer and Graphics 22(4), 437–448 (1998)CrossRefGoogle Scholar
  13. 13.
    Liu, F., Koenig, H.: A Novel Encryption Algorithm for High Resolution Video. In: Proceeding of ACM NOSSDAV 2005, pp. 69–74 (2005)Google Scholar
  14. 14.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and its Applications. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  15. 15.
    Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  16. 16.
    Rogaway, P., Coppersmith, D.: A software-optimized encryption algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 56–63. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  17. 17.
    Dworkin, M.: Recommendation for Block Cipher Modes of Operation, Methods, and Techniques. NIST Special Publication 800-38A (December 2001)Google Scholar
  18. 18.
    The BRAVIS video conference system, http://www.bravis.tu-cottbus.de

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Fuwen Liu
    • 1
  • Hartmut Koenig
    • 1
  1. 1.Department of Computer ScienceBrandenburg University of Technology CottbusCottbusGermany

Personalised recommendations