Abstract
An approach for securing video transmission on an end system multicast session is described. Existing solutions use encryption techniques that require the use of a shared key. Although they can achieve efficient encryption/decryption and meet the demands of real-time video, a publicly available service needing only the integrity and non-repudiation of the message is not considered. In this study, we offer such a method using public key cryptography. This method can be used in an end system multicast infrastructure where video originates from one source, but spreads with the help of receiving peers. Two different methods are described and compared: 1) Encryption of the entire packet. 2) Encryption of the unique digest value of the transmitted packet (i.e. digitally signing). The receivers then check the integrity of the received packets using the public key provided by the sender. Also, this way the non-repudiation of the transmitted video is provided.
This work is supported in part by TUBITAK (The Scientific and Technical Research Council of Turkey) under CAREER Award Grant 104E064.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chu, Y., Rao, S., Zhang, H.: A case for end system multicast. In: Proceedings of ACM Sigmetrics (2000)
Civanlar, M.R., Ozkasap, O., Celebi, T.: Peer-to-peer multipoint video conferencing on the Internet. Signal Processing: Image Communication 20, 743–754 (2005)
Akkus, I.E., Civanlar, M.R., Ozkasap, O.: Peer-to-peer Multipoint Video Conferencing Using Layered Video. In: International Conference on Image Processing ICIP 2006 (to appear, 2006)
Spanos, G.A., Maples, T.B.: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. In: Forth International Conference on Computer Communications and Networks, pp. 2–10 (1995)
Li, Y., Chen, Z., Tan, S.M., Campbell, R.H.: Security Enhanced MPEG Player. In: IEEE 1st International Workshop on Multimedia Software (1996)
Agi, I., Gong, L.: An Empirical Study of MPEG Video Transmission. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 137–144 (1996)
Venkatramani, C., Westerink, P., Verscheure, O., Frossard, P.: Securing Media For Adaptive Streaming. In: Proceedings of the Eleventh ACM International Conference on Multimedia. ACM Press, New York (2003)
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: RFC3711 The Secure Real-time Transport Protocol (SRTP) (2004)
Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications (2003)
Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia. ACM Press, New York (1997)
Changgui, S., Bhargava, B.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the Sixth ACM International Conference on Multimedia. ACM Press, New York (1998)
Liu, F., Koenig, H.: A Novel Encryption Algorithm for High Resolution Video. In: Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video NOSSDAV 2005 (2005)
Perrig, A., Song, D., Canetti, R., Tygar, J.D., Briscoe, B.: RFC4082 Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction (2005)
Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. EEE/ACM Transactions on Networking (TON) 7(4) (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Akkus, I.E., Ozkasap, O., Civanlar, M.R. (2006). Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11848035_80
Download citation
DOI: https://doi.org/10.1007/11848035_80
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-39392-4
Online ISBN: 978-3-540-39393-1
eBook Packages: Computer ScienceComputer Science (R0)