Skip to main content

Scalable security mechanisms in transport systems for enhanced multimedia services

  • Conference paper
  • First Online:
  • 114 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1425))

Abstract

Data confidentiality is a very important issue for communication in open networks. Secure communication usually will be achieved by encryption mechanisms. For distributed multimedia applications the usage of encryption in real-time can cause a performance problem due to the time complexity of the cryptographic algorithms. In these cases partial encryption is a solution to satisfy real-time demands.

In this paper we examine the usage of partial encryption in transport systems for multimedia data. This implies that the partial encryption scheme cannot take advantage of special properties of the multimedia data content. So we first demonstrate that in most cases it is sufficient to encrypt only a small portion of randomly chosen data from a video stream to achieve an adequate level of security.

There are different approaches to integrate partial encryption mechanisms in transport systems. As a first approach, we investigate the integration in the transport layer. This offers several facilities for the integration. An alternative approach is located in the network layer, where alternative routing methods for a multimedia data stream are analyzed. A discussion of the impact of partial encryption to transport system mechanisms concludes this paper.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Meyer, F. Gadegast: Security mechanisms for Multimedia Data with the Example MPEG-1-Video. http://www.powerweb.de/mpeg/doc/seemeng.ps.gz, 1995

    Google Scholar 

  2. B. Schneier: Applied Cryptography. 2nd Edition, ISBN 0-471-11709-9, John Wiley, New York, 1996

    Google Scholar 

  3. National Bureau of Standards: Data Encryption Standard. FIPS 46, Government Printing Service, 1977

    Google Scholar 

  4. X. Lai: On the Design and Security of Block Ciphers. ETH Series in Information Processing, 1, H. Gone Verlag, Konstanz, 1992

    Google Scholar 

  5. W. Diffie, M.E. Hellmann: New Directions in Cryptography. IEEE Transactions on Information Theory, 6, pp. 644–654, 1976

    Google Scholar 

  6. R. Rivest, A. Shamir, L. Adleman: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2), pp. 120–126, 1978

    Google Scholar 

  7. T. Ylönen: The SSH (Secure Shell) Remote Login Protocol. http://www.cs.hut.filssh/RFC, 1995

    Google Scholar 

  8. A.O. Freier, P. Karhon, P.C. Kocher: The SSL Protocol Version 3.0. ftp://ietf.org/intemet-drafts/draft-ietf-tls-ssl-version3-OO.txt, 1996

    Google Scholar 

  9. H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson: RTP:: A Transport Protocol for Real-Time Applications. RFC 1889, 1996

    Google Scholar 

  10. T. Aalto: IPv6 Authentication Header and Encapsulated Security Payload. http://www.tcm.hut.fi/Opinnot/Tik-110.551/1996/ahesp.html, 1996

    Google Scholar 

  11. ATM Forum: Phase I ATM Security Specification (3rd Draft). ATM Forum BTD-SEC-01.03, 1997

    Google Scholar 

  12. J. Gray, A. Kshemkalyani, M. Matyas et al.: ATM Cell Encryption and Key Update Synchronization. Telecommunication Systems Journal, Vol. 7(4), pp. 391–408, 1997

    Google Scholar 

  13. ISO/IEC International Standard 10918: Digital Compression and Coding of Continuous-Tone Still Images. 1993

    Google Scholar 

  14. W. Namgoong, N. Chaddha, T.H.Y. Meng: Low-Power Video Encoder/Decoder Using Wavelet/TSVQ With Conditional Replenishment. Proc.ICASSP'96, Atlanta, GA, 1996

    Google Scholar 

  15. ISO/IEC International Standard 11172: Coding of Moving Pictures and Associated Audio for Digital Storage Media up to about 1.5 Mbit/s. 1993

    Google Scholar 

  16. ITU-T Recommendation H.263: Video coding for low bit rate communication. 1996

    Google Scholar 

  17. Ron Frederic: Experiences with real-time software video compression. XEROX Pare, ftp://ftp.parc.xerox.com/pub/net-research/nv-paper.ps, 1994

    Google Scholar 

  18. P. Bahl, P.S. Gauthier, R.A. Ulichney: Software-only Compression, Rendering, and Playback of Digital Video. Digital Technical Journal Vol. 7(4), 1995

    Google Scholar 

  19. German National Research Center for Information Technology (GMD): SECUDE — A General Purpose Security Toolkit. http://www.secude.com/, 1996

    Google Scholar 

  20. K. Patel, B.C. Smith, L.A. Rowe: Performance of a Software MPEG Video Decoder. Proc. ACM Multimedia, Anaheim, CA, 1993

    Google Scholar 

  21. C.E. Shannon: Communication Theory of Secret Systems. Bell System Technical Journal, Vol 28(4), pp. 656–715, 1948

    Google Scholar 

  22. T. Kunkelmann, R. Reinema, R. Steinmetz, T. Blecher: Evaluation of Different Video Encryption Methods for a Secure Multimedia Gateway. Proc. 4th COST 237 Workshop, Lisboa, Portugal, Springer Verlag, LNCS 1356, December 1997

    Google Scholar 

  23. D. Y. Pan: Digital Audio compression. Digital Technical Journal Vol. 5(2), 1993

    Google Scholar 

  24. T. Kunkelmann, R. Reinema: A Scalable Security Architecture for Multimedia Communication Standards. Proc. 4th IEEE Int'l Conference on Multimedia Computing and Systems, Ottawa, Canada, 1997

    Google Scholar 

  25. L. Tang: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. Proc. 4th ACM International Multimedia Conference, Boston, MA, 1996

    Google Scholar 

  26. T. Dierks, C. Allen: The TLS Protocol Version 1.0. ftp://ietf.org./intemet-drafts/draft-ietf-tls-protocol-Ol.txt, 1996

    Google Scholar 

  27. L. Delgrossi, S. Schaller, L. Wolf: Relationships among Dependent Real-Time Streams. 12th Int'l Conference On Computer Communication, Seoul, Korea, 1995

    Google Scholar 

  28. H.Harney, C. Muckenhim: Group Key Management Protocol (GKMP) Architecture. ftp://ietf.org/intemet-drafts/draft-hamey-gkmp-arch-01.txt, 1996

    Google Scholar 

  29. S. Mittra: lotus: A Framework for Scalable Secure Multicasting. Proc. ACM SIGCOMM, Cannes, France, 1997

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

David Hutchison Ralf Schäfer

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kunkelmann, T., Vogler, H., Moschgath, M.L., Wolf, L. (1998). Scalable security mechanisms in transport systems for enhanced multimedia services. In: Hutchison, D., Schäfer, R. (eds) Multimedia Applications, Services and Techniques — ECMAST'98. ECMAST 1998. Lecture Notes in Computer Science, vol 1425. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64594-2_96

Download citation

  • DOI: https://doi.org/10.1007/3-540-64594-2_96

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64594-8

  • Online ISBN: 978-3-540-69344-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics