Abstract
We present an effective security control for multimedia streaming in public network via buffer-occupancy feedback controls of client’s playback buffer. There is a wide variety of multimedia-on-demand (MOD) applications can benefit from this end-to-end security control to protect the streaming data. Because the encryption/decryption for video packets are time-consuming process, our observation is that the playback buffer occupancy (PBO) can simply indicate the time availability to adjust the security level to affect the sending rate for the packet delivery. That is to say, adjusting security level can be applied further to keep the PBO away from buffer overflow and underflow. Therefore, we propose a feedback control of PBO not only to protect the MOD services from eavesdroppers, but also maintain the playback quality. To further boost the protection, we also apply Diffie-Hellman key negotiation method to provide the dynamic key changes while the PBO is controlled at a stable range for a long period. Moreover, due to the network uncertainty, different content delivery in MOD service will preserve different running PBOs. Then, they may have different applied security levels and key changes in service sessions. It will make eavesdroppers more difficult to recover the whole encrypted media data. In this paper, we also demonstrate the performance of encryption protection and preserved playback quality in our proposed schemes by experiments on a true VOD system with well-known encryptions of DES, 2DES and 3DES.
Keywords
The work was partially done while the author was visiting the Institute of Information Science, Academia Sinica, Taiwan in 2005 and supported by National Science Council, Project No. NSC 94-2213-E-130-001, Taiwan.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chao, H.-C., Wu, T.Y., Chen, J.-L.: Security-enhanced packet video with dynamic multicast throughput adjustment. International Journal of Network Management 11, 147–159 (2001)
Li, Y., Chen, Z., Tan, S.-M., Campbell, R.H.: Security-enhanced MPEG player. In: Proceedings of International Workshop on Multimedia Software Development, 25-26 March (1996)
Kunkelmann, T., Reinema, R.: A scalable security architecture for multimedia communication standards. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems 1997, 3-6 June, pp. 660–661 (1997)
Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the fourth ACM international conference on Multimedia (February 1997)
Tosun, A.S., Feng, W.-C.: Efficient multi-layer coding and encryption of MPEG video streams. In: IEEE International Conference on Multimedia and Expo, ICME 2000, 30 July-2 August, vol. 1, pp. 119–122 (2000)
Wang, C.-H., Chang, R.-I., Ho, J.-M., Hsu, S.-C.: Rate-Sensitive ARQ for Real-Time Video Streaming. In: GLOBECOM’03, IEEE 2003 Global Communications Conference, 1- 5 December (2003)
Stallings, W.: Cryptography and Network Security, Principles and Practices. Prentice Hall, Englewood Cliffs (2003)
Ong, C.S., Nahrstedt, K., Yuan, W.: Qualily of Protection for Mobile Multimedia Applications. In: IEEE International Conference on Multimedia and Expo, ICME 2003, pp. II137–II140 (2003)
Zhang, H., Ferrari, D.: Rate-Controlled Service Disciplines. Journal of High Speed Networks 3(4) (1994)
Rizzo, L.: Dummynet:a simple approach to the evaluation of network protocols. Computer Communication Review, 31–41 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lai, JC., Wang, CH. (2006). Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. In: Chang, LW., Lie, WN. (eds) Advances in Image and Video Technology. PSIVT 2006. Lecture Notes in Computer Science, vol 4319. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11949534_89
Download citation
DOI: https://doi.org/10.1007/11949534_89
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68297-4
Online ISBN: 978-3-540-68298-1
eBook Packages: Computer ScienceComputer Science (R0)