Advertisement

Hash-Based Key Management Schemes for MPEG4-FGS

  • Mohamed Karroumi
  • Ayoub Massoudi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5451)

Abstract

We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. Our constructions make only use of hash functions and achieve the optimal bound regarding the minimum number of keys and the time complexity in computing all the decryption keys. We also formalize new security notions about collusion-resistance. Unlike prior key management schemes, our second scheme resists to certain collusion attacks. The collusion-resistance achieved is practical and hence sufficient for encryption of scalable video streams.

Keywords

symmetric-key encryption key management MPEG-4 Fine Grain Scalability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hanaoka, G., Ogawa, K., Murota, I., Ohtake, G., Majima, K., Oyamada, K., Gohshi, S., Namba, S., Imai, H.: Separating encryption and key issuance in digital rights management systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 365–376. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Joye, M., Yen, S.-M.: One-way cross-trees and their applications. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 346–356. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. Circuits Syst. Video Techn. 11(3), 301–317 (2001)CrossRefGoogle Scholar
  5. 5.
    Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: Johnson, C., Montague, P., Steketee, C. (eds.) ACSW Frontiers. CRPIT, vol. 21, pp. 49–58. Australian Computer Society (2003)Google Scholar
  6. 6.
    ECRYPT Yearly Report on Algorithms and Keysizes. D.SPA.10 Rev. 1.1. IST-2002-507932 ECRYPT (2006) (January 2007), http://www.ecrypt.eu.org/documents/D.SPA.21-1.1.pdf
  7. 7.
    Rivest, R.: The MD5 Message - digert Algorithm. Internet activities board, internet privacy task force, request for comments, RFC 1321 (1992)Google Scholar
  8. 8.
    Yuan, C., Zhu, B.B., Su, M., Wang, X., Li, S., Zhong, Y.: Layered access control for MPEG-4 fgs video. In: ICIP (1), pp. 517–520 (2003)Google Scholar
  9. 9.
    Zhu, B.B., Feng, M., Li, S.: An efficient key scheme for layered access control of mpeg-4 fgs video. In: ICME, pp. 443–446. IEEE, Los Alamitos (2004)Google Scholar
  10. 10.
    Zhu, B.B., Yuan, C., Wang, Y., Li, S.: Scalable protection for MPEG-4 fine granularity scalability. IEEE Transactions on Multimedia 7(2), 222–233 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Mohamed Karroumi
    • 1
  • Ayoub Massoudi
    • 1
  1. 1.Thomson R&D France Technology Group, Corporate ResearchSecurity LaboratoriesCesson-Sévigné CedexFrance

Personalised recommendations