Skip to main content

A Contents Encryption Mechanism Using Reused Key in IPTV

  • Conference paper
Advances in Information Security and Its Application (ISA 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 36))

Included in the following conference series:

  • 353 Accesses

Abstract

Recently IPTV is being spotlighted as a new stream service to stably provide video, audio and control signals to subscribers through the application of IP protocol. However, the IPTV system is facing more security threats than the traditional TV. This study proposes a multicasting encryption mechanism for secure transmission of the contents of IPTV by which the content provider encrypts their contents and send the encrypted contents and the key used for encryption of the contents to the user. In order to reduce the time and cost of Head-End, the proposed mechanism encrypts the media contents at the Head-End, embeds the code of the IPTV terminal used at the Head-End in the media contents for user tracking, and performs desynchronization for protection of the media contents from various attacks.

This work was supported by the Security Engineering Research Center, granted by the Korea Ministry of Knowledge Economy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47–60. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Pagani, M.: Multimedia and Interactive Digital TV - Managing the Opportunities Created by Digital Convergence. IRM Press (2003)

    Google Scholar 

  3. Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way functions trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)

    Article  Google Scholar 

  4. Park, S., Jeong, J., Kwon, T.: Contents Distribution System Based on MPEG-4 ISMACryp in IP Set-top Box Environments. IEEE Transactions on Consumer Electronics 52(2) (May 2006)

    Google Scholar 

  5. Wang, Q., Du, Q., Lin, G.: IPTV STB Software Update Scheme Based on SNMP. In: 2006 IEEE International Conference on Electro/information Technology, 197–200 (May 2006)

    Google Scholar 

  6. Lin, C.-C., Chen, M.-S.: On Controlling Digital TV Set-Top-Box by Mobile Devices via IP Network. In: Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005) (2005)

    Google Scholar 

  7. Pescador, F., Sanz, C., Garrido, M.J., Santos, C., Antoniello, R.: A DSP Based IP Set-Top Box for Home Entertainment. IEEE Transactions on Consumer Electronics 52(1) (February 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, YS., Kim, YT., Cho, YB., Lee, KJ., Park, GC., Lee, SH. (2009). A Contents Encryption Mechanism Using Reused Key in IPTV. In: Park, J.H., Zhan, J., Lee, C., Wang, G., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Its Application. ISA 2009. Communications in Computer and Information Science, vol 36. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02633-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02633-1_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02632-4

  • Online ISBN: 978-3-642-02633-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics