Skip to main content

Secure Transmission of Video on an End System Multicast Using Public Key Cryptography

  • Conference paper
Multimedia Content Representation, Classification and Security (MRCS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4105))

  • 1453 Accesses

Abstract

An approach for securing video transmission on an end system multicast session is described. Existing solutions use encryption techniques that require the use of a shared key. Although they can achieve efficient encryption/decryption and meet the demands of real-time video, a publicly available service needing only the integrity and non-repudiation of the message is not considered. In this study, we offer such a method using public key cryptography. This method can be used in an end system multicast infrastructure where video originates from one source, but spreads with the help of receiving peers. Two different methods are described and compared: 1) Encryption of the entire packet. 2) Encryption of the unique digest value of the transmitted packet (i.e. digitally signing). The receivers then check the integrity of the received packets using the public key provided by the sender. Also, this way the non-repudiation of the transmitted video is provided.

This work is supported in part by TUBITAK (The Scientific and Technical Research Council of Turkey) under CAREER Award Grant 104E064.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chu, Y., Rao, S., Zhang, H.: A case for end system multicast. In: Proceedings of ACM Sigmetrics (2000)

    Google Scholar 

  2. Civanlar, M.R., Ozkasap, O., Celebi, T.: Peer-to-peer multipoint video conferencing on the Internet. Signal Processing: Image Communication 20, 743–754 (2005)

    Article  Google Scholar 

  3. Akkus, I.E., Civanlar, M.R., Ozkasap, O.: Peer-to-peer Multipoint Video Conferencing Using Layered Video. In: International Conference on Image Processing ICIP 2006 (to appear, 2006)

    Google Scholar 

  4. Spanos, G.A., Maples, T.B.: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. In: Forth International Conference on Computer Communications and Networks, pp. 2–10 (1995)

    Google Scholar 

  5. Li, Y., Chen, Z., Tan, S.M., Campbell, R.H.: Security Enhanced MPEG Player. In: IEEE 1st International Workshop on Multimedia Software (1996)

    Google Scholar 

  6. Agi, I., Gong, L.: An Empirical Study of MPEG Video Transmission. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 137–144 (1996)

    Google Scholar 

  7. Venkatramani, C., Westerink, P., Verscheure, O., Frossard, P.: Securing Media For Adaptive Streaming. In: Proceedings of the Eleventh ACM International Conference on Multimedia. ACM Press, New York (2003)

    Google Scholar 

  8. Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: RFC3711 The Secure Real-time Transport Protocol (SRTP) (2004)

    Google Scholar 

  9. Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications (2003)

    Google Scholar 

  10. Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia. ACM Press, New York (1997)

    Google Scholar 

  11. Changgui, S., Bhargava, B.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the Sixth ACM International Conference on Multimedia. ACM Press, New York (1998)

    Google Scholar 

  12. Liu, F., Koenig, H.: A Novel Encryption Algorithm for High Resolution Video. In: Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video NOSSDAV 2005 (2005)

    Google Scholar 

  13. Perrig, A., Song, D., Canetti, R., Tygar, J.D., Briscoe, B.: RFC4082 Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction (2005)

    Google Scholar 

  14. Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. EEE/ACM Transactions on Networking (TON) 7(4) (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Akkus, I.E., Ozkasap, O., Civanlar, M.R. (2006). Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11848035_80

Download citation

  • DOI: https://doi.org/10.1007/11848035_80

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-39392-4

  • Online ISBN: 978-3-540-39393-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics