Abstract
The application of digital video distribution is reaching a wider spectrum of customers, in which secure access control of video content during rendering and transmission has become more and more necessary and urgent. Considering the limited computing power and the real-time requirement of set-top boxes, the efficiency of the decryption process is particularly significant. In this paper, we try to search for a scheme to improve the efficiency of the exist schemes for access control of digital video in set-top boxes mainly from three approaches. Firstly, with the specific comparison between AES and RC6, we conclude that RC6 provides sufficient security for set-top boxes, and the decryption process of RC6 is more efficient. Secondly, we improve the efficiency of the codecs process by adopting a latest more efficient video codec VP9, which is an open and royalty free video codec and is proved to be more efficient than H.264. Finally, we could only selective encrypt and decrypt some essential parts of the entire video stream during the codecs process to further improve the efficiency. In a conclusion, we propose a more efficient idea to provide access control of digital video in set-top boxes. This scheme is proved to be more efficient and more practical.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-015-2450-7/MediaObjects/11042_2015_2450_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-015-2450-7/MediaObjects/11042_2015_2450_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-015-2450-7/MediaObjects/11042_2015_2450_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-015-2450-7/MediaObjects/11042_2015_2450_Fig4_HTML.gif)
Similar content being viewed by others
References
Advanced Encryption Standard (AES) (2001) Federal, information processing standards Publication 197 [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Allah O S F, Ahmed H.E.H, Kalash H M (2007) Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images. International Conference on Electrical Engineering, 2007: 1–7. doi: 10.1109/ICEE.2007.4287293
Bankoski J, Bultje RS, Grange A, Gu Q, Han J, Koleszar J, Mukherjee D, Wilkins P, Xu Y (2013) Towards a next generation open-source video codec. In Proceedings SPIE 8666, Visual Information Processing and Communication IV 8666(6): 1–13. doi: 10.1117/12.2009777
Bjøntegaard G (2001) Calculation of average psnr differences between rd-curves. ITU-T SC16/Q6, 13th Video Coding Experts Group (VCEG) Meeting, Austin, Texas, USA
Chen T, Huang Y, Tsai C, Hsieh B, Chen L (2006) Architecture design of context-based adaptive variable-length coding for H. 264/AVC. IEEE Trans Circ Syst II: Express Briefs 53(96):832–836. doi:10.1109/TCSII.2006.880014
Contini S, Rivest RL, Robshaw MJB, Yin YL (1998) The security of the RC6™ Block Cipher.
Daemen J, Rijmen V (1998) AES proposal: Rijndael. Ventura CA: NIST, pp 1–45. Available: http://www.Esat.kuleuven.ac.be/vijmen/rijndael.
Furht B (1998) Handbook of internet and multimedia systems and applications. CRC Press, Boca Raton
Furht BB, Socek D, Eskicioglu AM (2005) Fundamentals of Multimedia Encryption Techniques. In: Multimedia security handbook, 3rd edn. USA: CRC press, pp 109–146
Lian S (2009) Compression-combined encryption. In: Multimedia content encryption-Technique and application, 13th edn. USA: CRC press, pp 89–91
Lian S, Sun J, Wang Z (2004) Quality analysis of several typical MPEG video encryption algorithms. J Image Graph (in Chinese) 9(4):483–490. doi:10.3969/j.issn. 1006-8961.2004.04.019
Liu W, Chang W (2006) Research on encryption technology for the streaming media. J Cent South For Univ (in Chinese) 26(6):119–122. doi:10.3969/j.issn. 1673-923X.2006.06.030
Mamoona Asghar (2012) Efficient Security for Scalable Coded Video Distribution. A Thesis submitted for the degree of Doctor of Philosophy, School of Computer Science & Electronic Engineering University of Essex, UK
Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 15(7):2061–2075. doi:10.1109/TIP.2006.873426
Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard. IEEE Trans Circ Syst Video Technol 13(7):620–636. doi:10.1109/TCSVT.2003.815173
Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J-J (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008:179290. doi:10.1155/2008/179290
Mathur M, Kesarwani A (2013) . In Proceedings of National Conference on New Horizons in IT: 143–148
Mukherjee D, Bankoski J, Grange A, Han J, Koleszar J, Wilkins P, Xu Y, Bultje R (2013) The latest open-source video codec VP9 – An overview and preliminary results, Picture Coding Symposium : 390–393. doi: 10.1109/PCS.2013.6737765
Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E (2001) Report on the development of the advanced encryption standard (AES). J Res Natl Inst Stand Technol. doi:10.6028/jres.106.023
Ostermann J, Bormans J, List P, Marpe D, Narroschke M, Pereira F, Stockhammer T, Wedi T (2004) Video coding with H.264/AVC: Tools, performance, and complexity. IEEE Circ Syst Mag 4(1):7–28. doi:10.1109/MCAS.2004.1286980
Pande A, Zambreno J (2013) Advances in multimedia encryption. In: Embedded multimedia security systems, 1st edn. Springer London, pp 11–22. doi: 10.1007/978-1-4471-4459-5_2
Rivest RL, Robshaw MJB, Sidney R, Yin YL (1998) The RC6™ Block Cipher. In First Advanced Encryption Standard (AES) Conference. Available: http://people.csail.mit.edu/rivest/Rc6.pdf.
Rivest RL, Robshaw MJB, Yin YL (2001) RC6 as the AES. 16d Stowe Rd, London, W12 8BN
Schafer R, Wiegand T, Schwarz H (2003) The emerging h.264/AVC standard. EBU Tech Rev 293:1–12
Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans Circ Syst Video Technol 17(9):1103–1120. doi:10.1109/TCSVT.2007.905532
Shiguo Lian (2009) Multimedia Encryption in Typical Applications. In: Multimedia content encryption, 13th edn. USA: CRC press, pp 192–194
Verma HK, Singh RK (2012) Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms. International Journal of Computer Applications (0975 – 8887) 42(16): 1–7. doi: 10.5120/5774-6002
Wang G, Lu Y, Zhang L, Alfarrarjeh A, Zimmermann R, Kim SH, Shahabi C (2014) Active key frame selection for 3D model reconstruction from crowdsourced geo-tagged videos. 2014 I.E. Int Conf Multimedia Expo (ICME): 1–6. doi: 10.1109/ICME.2014.6890253
Wiegand T, Schwarz H, Joch A, Kossentini F, Sullivan GJ (2003) Rate-constrained coder control and comparison of video coding standards. IEEE Trans Circ Syst Video Technol 13(7):688–703. doi:10.1109/TCSVT.2003.815168
Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circ Syst Video Technol 13(7):560–576. doi:10.1109/TCSVT.2003.815165
Yang Y, Huang Z, Shen H, Zhou X (2011) Mining multi-tag association for image tagging. World Wide Web 14(2):133–156. doi:10.1007/s11280-010-0099-8
Yang Y, Huang Z, Yang Y, Shen H, Luo J (2013) Local image tagging via graph regularized joint group sparsity. Pattern Recognit 46(5):1358–1368
Yang Y, Shen H, Nie F, Ji R, Zhou X (2013) Discriminative nonnegative spectral clustering with out-of-sample extension. IEEE Trans Knowl Data Eng 25(8):1760–1771. doi:10.1109/TKDE.2012.118
Yang Y, Yang Y, Huang Z, Shen H, Nie F (2011) Tag localization with spatial correlations and joint group sparsity. Proc IEEE Comput Vis Pattern Recognit 8:881–888. doi:10.1109/CVPR.2011.5995499
Yang Y, Yang Y, Shen H (2013) Effective transfer tagging from image to video. ACM Trans Multimed Comput Commun Appl 9(2). doi: 10.1145/2457450.2457456
Yang Y, Zha Z, Gao Y, Zhu X, Chua T (2014) Exploiting Web images for semantic video indexing via sample-specific loss. IEEE Trans Multimedia 16(6):1677–1689. doi:10.1109/TMM.2014.2323014
Zhang L, Gao Y, Hong R, Hu Y, Ji R, Dai Q (2015) Probabilistic skimlets fusion for summarizing multiple consumer landmark videos. IEEE Trans Multimedia 17(1):40–49. doi:10.1109/TMM.2014.2370257
Zhang L, Han Y, Yang Y, Song M, Yan S, Tian Q (2013) Discovering discrminative graphlets for aerial image categories recognition. IEEE Trans Image Process 22(12):5071–5084. doi:10.1109/TIP.2013.2278465
Zhang L, Song M, Zhao Q, Liu X, Bu J, Chen C (2013) Probabilistic graphlet transfer for photo cropping. IEEE Trans Image Process 22(2):802–815. doi:10.1109/TIP.2012.2223226
Zhang L, Xia Y, Mao K, Ma H, Shan Z (2014) An effective video summarization framework toward handheld devices. Ind Electron PP(99):1. doi:10.1109/TIE.2014.2336639
Zhang Y, Zimmermann R, Zhang L, Shamma DA (2014) Point of interest detection from multiple sensor-rich videos in geo-space. Proc ACM Int Conf Multimedia 14:861–864. doi:10.1145/2647868.2655027
Acknowledgments
This work was supported by the Deep exploration instrumentation and equipment development (SinoProbe-09-01-03) under Grant No.201011078, Key Technologies and Applications of Network of Things, which is a major scientific and technological project of Jilin Province under Grant No. 3002304.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hu, L., Li, Y., Li, T. et al. The efficiency improved scheme for secure access control of digital video distribution. Multimed Tools Appl 75, 12645–12662 (2016). https://doi.org/10.1007/s11042-015-2450-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2450-7