Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
Zimmermann Real-time Transport Protocol for Hierarchical Keys Generation of Encrypted Scalable Video Streaming.
Author(s):
1. MN Asghar: Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, 63100, Punjab, Pakistan
2. H Majid: Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, 63100, Punjab, Pakistan
3. R Kausar: Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, 63100, Punjab, Pakistan
4. IS Bajwa: Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, 63100, Punjab, Pakistan
5. M Fleury: School of Computer Science and Electronic Engineering, University of Essex, Colchester, CO4 3SQ, UK
Abstract:
Effective key management has been a fundamental prelude before encryption of single-layer video streams in the public Internet. In addition to single-layer video, multi-layer video can provide scalable on-demand video streaming, especially within a mobile network. The objective of the proposed mechanism was to reduce the number of keys exchanged for setting up an encrypted scalable video stream. The method proposed had access to the highest enhancement layer to which users were entitled, together with access to all layers below down to the base layer. A low-latency key exchange mechanism i.e. Zimmermann Real-time Transport Protocol (ZRTP) was used for the hierarchical keys? generation of scalable video in conjunction with an in-house form of selective encryption. The results confirmed that the keys? generation time was reduced by 7 µs than the previous techniques. It was also concluded from the results that the selective encryption method was decoder compatible and produced zero bit-rate overhead.
Page(s): 110-118
DOI: DOI not available
Published: Journal: Pakistan Journal of Science, Volume: 69, Issue: 1, Year: 2017
Keywords:
Keywords are not available for this article.
References:
[1] Abu-Zahra , A.,Z.Shahid,A.Rattrout,W.Puech, 2010.Independent protection of different layers in spatially scalable video coding, 10 240 -246
[2] Adams , C.,S.Lloyd,Inc, 2002.Addison-Wesley Longman Publishing Co, 0672323915 -
[3] Arkko , J.,E.Carrara,L.Lindholm,M.Naslund,K.Norrman, 2004.MIKEY: Multimedia Internet KEYing, IETF, 3830 -
[4] AsgharM. N.,M.Fleury,S. Makki, 2016.Interoperable conditional access with video selective encryption for portable devices,Multimedia Tools and Applications. DOI 10.1007/s11042- 016-3725-3 1 -14
[5] Asghar , M. N.,Ghanbari, 2012.MIKEY for keys management of H.264 scalable video coded layers,J. of King Saud Univ. - Computer Info. Sci. 24 107 -116
[6] Asghar , M. N.,M.Ghanbari,M.Fleury,Reed, 2014a.,Sufficient encryption based on entropy coding syntax elements of H.264/SVC, Multimedia Tools and Applications 73 10215 -10241
[7] Asghar , M. N.,M.Ghanbari,M.Fleury,M., .Reed (2014b). Confidentiality of a selectively encrypted H.264 coded video bit-stream,J. of Visual Commun. and Image Representation 25 487 -498
[8] Baugher , M.,D.McGrew,M.Naslund,K.Norrman, 2004.The Secure Real-time Transport Protocol (SRTP), IETF, 3711 -
[9] Blokowski , G.,R.Steinmetz,J.Sel, 1996.A media synchronization survey: Reference model, specification, and case studies, IEEE, 14 3 -35
[10] Blom , R.,E.Carrara,F.Lindholm,K.Norrman,Näslund,B.Furht,D.Kirovski, 2005.Key management and protection for IP multimedia, 169 -196
[11] Deng , R. H.,X.Ding,Y.Wu,Z.Wei, 2014.Efficient block-based transparent encryption of H.264/SVC bitstreams,Multimedia Systems 20 165 -178
[12] Fan , M.,C.Yuan,Y.Zhang, 2010.An efficient hierarchical key management of H,in Proc. of IEEE Int. Conf. on Intelligent Computing and Intelligent Syst 757 -760
[13] Federal, 2001.Information processing standards publication 197, Advanced Encryption Standard (AES, -
[14] Ghanbari , M., 2003.Standard codecs: Image compression to advanced video coding, -
[15] Helle , P.,M.Siekmann,Stegemann, 2013.A scalable video coding extension of HEVC, in Proc of Data Compression Conf, 201 -210
[16] Hlavacs , H., W.,Gansterer , H.,Schabauer , J.,Zottl , M.,Petrashek , T.,Hoeher , and O.,Jung, 2009.Enhancing ZRTP by using computational puzzles,Int. J. of Universal Comput. Sci. 14 693 -716
[17] Hong , D.,J.Wonkap,Boyce, 2012.Scalability support in HEVC,in Proc. of IEEE Int. Symp. on Circuits Syst. 890 -893
[18] Kolesnikov , V.,V.Gurbani, 2015.Efficient key management system and method, Patent no,US9106628 B2. -
[19] Lian , S., 2008.Digital rights management for the home TV based on scalable video coding,” IEEE Trans. Consumer Electron 54 1287 -1293
[20] Li , C.,X.Zhou,Y.Zong, 2009.Layered encryption for scalable video coding,”,in Proc. IEEE Conf. Image Signal Process., 1-4. -
[21] Park , S. W.,D.Yi,S. U., 2008.Shin (2008a). A practical key management scheme using the frame based features for layered access control of H.264/SVC,Proc. of Int. Symp. Info. Theory and its Applications 4895406 -
[22] Park , S. W., 2008b.Efficient selective encryption scheme for the H.264/Scalable Video Coding (SVC),in Proc. of IEEE Int. Conf. on Networked Computing and Advanced Info. Management 371 376 -
[23] Rosenblatt , W.,S.Mooney,TBooks, 2003.Digital rights management: Business and technology, -
[24] Schwarz , H., D.,Marpe , and T.,Wiegand, 2007.Overview of the scalable video coding extension of the H. 264/AVC standard,IEEE Trans. Circuits Syst. Video Technol 17 1103 -1120
[25] Siqi. L.,W.Wenbo,C.Qingfeng, 2015.Formal Analysis of the Real-time Multimedia Network Protocol ZRTP, Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical, 8 12 -17
[26] Stütz , T.,A. Uhl., 2012.A survey of H.264 AVC/SVC encryption,IEEE Trans. Circuits Syst. Video Technol 22 325 -339
[27] Unterwager , A.,A . Uhl, 2014.Slice groups for postcompression region of interest encryption in H.264/AVC and its scalable extension,Signal Processing: Image Commun. 29 1158 -1170
[28] Zimmermann , P.,A.Johnston,Callas, 2011.ZRTP: Media path key agreement for unicast secure RTP, IETF, 6189 -
Citations
Citations are not available for this document.
0

Citations

0

Downloads

33

Views