Skip to main content

Evaluation of different video encryption methods for a secure multimedia conferencing gateway

  • Conference paper
  • First Online:
From Multimedia Services to Network Services (COST237 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1356))

Included in the following conference series:

Abstract

In multimedia conferencing systems the need for confidentiality and privacy gains more and more in importance, particularly in open networks like the Internet. In this paper we give an overview of the security requirements of multimedia conferencing systems and of applicable security functions. For real-time video transmissions there is a special need for selective encryption of the transmitted data. Existing methods are investigated and their strengths and weaknesses will be shown.

To combine different security functionalities we present the implementation of a scalable security gateway, adaptive to the requirements of specific applications and the properties of special forms of multimedia data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. I. Agi, L. Gong: An Empirical Study of Secure MPEG Video Transmissions. ISOC Symposium on Network and Distributed System Security, San Diego, CA, 1996

    Google Scholar 

  2. E. Amir, S. McCanne, H. Zhang: An Application Level Video Gateway. Proc. 3rd ACM Multimedia, San Francisco, CA, 1995

    Google Scholar 

  3. P. Bahl, P.S. Gauthier, R.A. Ulichney: Software-only Compression, Rendering, and Playback of Digital Video. Digital Technical Journal Vol. 7(4), 1995

    Google Scholar 

  4. K. Bahr, E. Hinsch, G. Schulze: Incorporating Security Functions in Multimedia Conferencing Applications in the Context of the MICE Project. Proc. 2nd Int'l Workshop IWACA'94, Heidelberg, Germany, 1994

    Google Scholar 

  5. The Digital Video Broadcasting Project. http://www.ebu.ch/dvb-home.html, 1996

    Google Scholar 

  6. H. Eriksson: The Multicast Backbone. Comm. of the ACM, 37(8), pp. 54–60, 1994

    Google Scholar 

  7. W. Schneider (Ed.): SecuDE Documentation. ftp://ftp.darmstadt.gmd.de/secude/, Darmstadt, Germany, 1997

    Google Scholar 

  8. E. Hinsch, A. Jaegemann, I. Roper, L. Wang: The Secure Conferencing User Agent — A Tool to Provide Secure Conferencing with MBONE Multimedia Conferencing Applications. Proc. IDMS '96, Berlin, Germany, 1996

    Google Scholar 

  9. ITU-T Recommendation H.263: Video coding for low bit rate communication. 1996

    Google Scholar 

  10. ISO/ IEC International Standard 10918: Digital Compression and Coding of Continuous-Tone Still Images. 1993

    Google Scholar 

  11. T. Kunkelmann, R. Reinema: A Scalable Security Architecture for Multimedia Communication Standards. Proc. 4th IEEE Int'l Conference on Multimedia Computing and Systems, Ottawa, Canada, 1997

    Google Scholar 

  12. X. Lai: On the Design and Security of Block Ciphers. ETH Series in Information Processing, 1, H. Gorre Verlag, Konstanz, 1992

    Google Scholar 

  13. T.B. Maples, G.A. Spanos: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. Proc. 4th Int'l Conference on Computer and Communications, Las Vegas, NV, 1995

    Google Scholar 

  14. J. Meyer, F. Gadegast: Security Mechanisms for Multimedia Data with the Example MPEG-1 Video. http://www.cs.tu-berlin.de/-phade/secmpeg.html, 1995

    Google Scholar 

  15. ISO/ IEC International Standard 11172: Coding of Moving Pictures and Associated Audio for Digital Storage Media up to about 1.5 Mbit/s. 1993

    Google Scholar 

  16. Object Management Group: Security Service: v1.0. 1996

    Google Scholar 

  17. K. Patel, B.C. Smith, L.A. Rowe: Performance of a Software MPEG Video Decoder. Proc. ACM Multimedia, Anaheim, CA, 1993

    Google Scholar 

  18. L. Qiao, K. Nahrstedt: A New Algorithm for MPEG Video Encryption. Proc. 1st Int'l Conf. on Imaging Science, Systems and Technology, Las Vegas, NV, 1997

    Google Scholar 

  19. H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson: RTP: A Transport Protocol for Real-Time Applications. RFC 1889, 1996

    Google Scholar 

  20. B. Schneier: Applied Cryptography. 2nd Edition, ISBN 0-471-11709-9, John Wiley, New York, 1996

    Google Scholar 

  21. D. Stevenson, N. Hillery, G. Byrd: Secure Communications in ATM Networks. Comm. of the ACM, 38(2), pp. 45–52,1995

    Google Scholar 

  22. R. Steinmetz: Data Compression in Multimedia computing — standards and systems. Multimedia Systems, 1(4), pp. 187–204, Springer Verlag, Berlin 1994

    Google Scholar 

  23. R. Steinmetz, K. Nahrstedt: Multimedia: Computing, Communications and Applications. Prentice Hall, München 1995

    Google Scholar 

  24. L. Tang: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. Proc. 4th ACM Int'l Multimedia Conference, Boston, MA, 1996

    Google Scholar 

  25. T. Ylbnen: The SSH (Secure Shell) Remote Login Protocol. http://www.cs.hut.fi/ssh/RFC, 1995

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

André Danthine Christophe Diot

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kunkelmann, T., Reinema, R., Steinmetz, R., Blecher, T. (1997). Evaluation of different video encryption methods for a secure multimedia conferencing gateway. In: Danthine, A., Diot, C. (eds) From Multimedia Services to Network Services. COST237 1997. Lecture Notes in Computer Science, vol 1356. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0026619

Download citation

  • DOI: https://doi.org/10.1007/BFb0026619

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63935-0

  • Online ISBN: 978-3-540-69671-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics