Skip to main content
Log in

Security enhancement for video transmission via noise aggregation in immersive systems

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The interest in the field of immersive audio/visual systems exists for many years from both of the commercialization point of view and the research perspective. Technological advancements in the field of cameras, video display along with the processing hardware lead the way to a new generation of immersive systems. On one hand, advancement in video compression schemes like MPEG and H.264/AVC, and transmission technologies like and 3G and 4G LTE enhanced the feeling of virtual presence. However, on the other hand the secure transmission of immersive audio/visual contents over wireless networks is a challenge, as it suffers from the potential malicious attacks. One type of typical malicious attack is passive eavesdropping. The goal of this paper is to propose a solution to enhance the secure wireless transmissions of Video in Immersive Systems via simple yet effective physical-layer approach. To reduce the chance that that the passive eavesdropper extracts information, we present a physical-layer security method, termed noise aggregation, for the secure video transmission to legitimate receiver. Theoretical analyses and simulation results demonstrate that our method is able to effectively limit the amount of information eavesdropped by the unauthorized user at bit level, and thus significantly enhancing security for video distribution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Amitav M, Fakoorian SAA, Jing H, Lee Swindlehurst A (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tutorials 16:1550–1573

    Article  Google Scholar 

  2. Baldi M, Bianchi M, Chiaraluce F (2011) Increasing physical layer security through scrambled codes and ARQ. IEEE Int Conf Commun Workshops (ICC) 1–5

  3. Barros J, Rodrigues MRD (2006) Secrecy capacity of wireless channels. IEEE Int Symp Inf Theory 356–360

  4. Bar-Shalom Y, Li R, Kirubarajan T (2001) Estimation with applications to tracking and navigation. Wiley, New York

    Book  Google Scholar 

  5. Bloch M, Barros J, Rodrigues MRD (2008) Wireless information-theoretic security. IEEE Trans Inf Theory 2515–2534

  6. Boho A, Van Wallendael G, Dooms A, De Cock J, Braeckman G, Schelkens P, Preneel B, Van de Walle R (2013) End-To-end security for video distribution: the combination of encryption, watermarking and video adaptation. IEEE Signal Process Mag 30:97–107

    Article  Google Scholar 

  7. Harrison WK, Almeida J, Klinc D, McLaughlin SW, Barros J (2010) Stopping sets for physical-layer security. IEEE Inf Theory Workshop (ITW) 1–5

  8. Harrison WK, Boyce P (2014) Parity modifications and stopping sets in high-rate codes for physical-layer security. IEEE Conf Commun Netw Secur (CNS) 115–120

  9. Maurer U (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39:733–742

    Article  MathSciNet  MATH  Google Scholar 

  10. Naef M, Staadt O, Gross M (2005) Multimedia integration into the blue-c API. Elsevier, vol. Comuter and Graphics 29, pp. 3–15

  11. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  MATH  Google Scholar 

  12. Shiu Y-S, Chang SY, Huang SC-H, Chen H-H (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18:66–74

    Article  Google Scholar 

  13. Vernam GS (1926) Cipher printing telegraph system for secret wire and radio telegraphic communication. Trans Am Inst Electr Eng 45:285–301

    Google Scholar 

  14. Voloshynovskiy S, Koval O, Deguillaume F, Pun T (2008) Multimedia security: open problems and solutions. Aspects of Network and Information Security, IOS Press, vol. 17, pp. 143–151

  15. Wang Y, Wang H, Wang C (2013) Graph-based authentication design for color-depth-based 3D video transmission over wireless networks. IEEE Trans Netw Serv Manag 245–255

  16. Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54:1355–1387

    Article  MathSciNet  MATH  Google Scholar 

  17. Yang Z, Wu W, Nahrstedt K, Kurillo G, Bajcsy R (2009) Enabling multi-party 3D tele-immersive environments with ViewCast. ACM Trans Multimedia Comput Commun Appl

  18. Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 66–72

Download references

Acknowledgments

The research work reported in this paper is supported by the National Natural Science Foundation of China under the grant No. 61431011, the Specialized Research Fund for the Doctoral Program of Higher Education under the grant no. 20110201120014, Open Research Fund of National Mobile Communications Research Laboratory under the grant no. 2012D04 and the Fundamental Research Funds for the Central Universities

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qinghe Du.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hussain, M., Du, Q., Sun, L. et al. Security enhancement for video transmission via noise aggregation in immersive systems. Multimed Tools Appl 75, 5345–5357 (2016). https://doi.org/10.1007/s11042-015-2936-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2936-3

Keywords

Navigation