Skip to main content
Log in

A scheme for conditional access-based systems using index locations of DCT coefficients

  • Original Research Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Most of the existing conditional access-based systems (CAS) follow a standard methodology. The service provider shares two copies for single information (specifically image for this work). One copy is a low-resolution version which is shared in the public domain for preview purpose. The other one is a high-resolution version to be provided to the customers through a secure channel on demand (after payment). We propose a novel scheme that can be efficiently adapted in such a scenario. We analyze the images in the discrete cosine transform (DCT) domain and note that polynomials of suitable degree, representing the sorted DCT coefficients together with original index locations, can uniquely represent an image. We show that the arrangement of DCT index locations, after the actual coefficients have been sorted by magnitude, is significantly different for various images and we exploit this to design an efficient CAS-based scheme. We also show that the amount of private data, which a service provider needs to transmit through a secure channel to the customers on demand, is reduced significantly. This reduction in transmitted data makes the system apt for real-time secure applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. American National Standard X9.17: Financial Institution Key Management (Wholesale), American National Standard Institute (1985)

  2. Bigstockphoto.com. http://www.bigstockphoto.com/. Accessed 20 Feb 2014

  3. Das, T.K., Maitra, S.: Cryptanalysis of correlation-based watermarking schemes using single watermarked copy. IEEE Signal Process. Lett. 11(4), 446–449 (2004)

    Article  Google Scholar 

  4. Das, T.K., Maitra, S., Zhou, J.: Cryptanalysis of Chu’s DCT based watermarking scheme. IEEE Trans. Multimed. 8(3), 629–632 (2006)

    Article  Google Scholar 

  5. Delgado, J., Llorente, S., and Rodriguez, E.: Digital rights and privacy policies management as a service. Consumer Commun. Netw. Conf. (CCNC), 14–17 January, 2012 IEEE, vol., no., pp.527–531, (2012)

  6. Data Encryption Standard, FIPS PUBS 46-2. http://www.itl.nist.gov/fipspubs/fip46-2.htm (1993). Accessed 20 Feb 2014

  7. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22, 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  8. Dufaux, F., Ebrahimi, T.: Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circuits Syst. Video Tech. 18(8), 1168–1174 (2008)

    Article  Google Scholar 

  9. Easley, R., Byung Cho., Kim and Daewon Sun.: Optimal digital rights management with uncertain piracy. In: System Science (HICSS), 2012 45th Hawaii International Conference on, 4–7 January, vol., no., pp 4525–4534 (2012)

  10. Fotomoto.com. http://www.fotomoto.com/. Accessed 20 Feb 2014

  11. Goldburg, B., Sridharan, S., Dawson, E.: Design and cryptanalysis of transform-based analog speech scramblers. IEEE J. Sel. Areas Commun. 11(5), 735–744 (1993)

    Article  Google Scholar 

  12. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Pearson Education, Upper Saddle River, NJ (2003)

  13. Gupta, A., Sultana, S., Kirkpatrick, M., Bertino, E.: A selective encryption approach to fine-grained access control for P2P file sharing. In: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on, 9–12 October ,pp.1–10 (2010)

  14. Databases. http://www.imageprocessingplace.com/root_files_V3/image_databases.htm. Accessed 20 Feb 2014

  15. Kim, J., Choi, H.: Improvements on Sun’s conditional access system in Pay-TV broadcasting systems. IEEE Trans. Multimed. 12(4), 337–340 (2010)

    Article  Google Scholar 

  16. Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proc. IEEE 92(6), 918–932 (2004)

    Article  Google Scholar 

  17. Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.: On the design of perceptual MPEG-video encryption algorithms. IEEE Trans. Circuits Syst. Video Tech. 17(2), 214–223 (2007)

    Article  Google Scholar 

  18. Lian, S., Chen, X.: On the design of partial encryption scheme for multimedia content. Math. Comput. Modell. 57(11–12), 2613–2624 (2013)

  19. Lookabaough, T., Sicker, D.C.: Selective encryption for consumer applications. IEEE Commun. Mag. 42(5), 124–129 (2004)

  20. Naor, D., Naor, M.: Protecting cryptographic keys: the trace-andrevoke approach. Computer, 47–53 (2003)

  21. Pande, A., Mohapatra, P., Zambreno, J.: Securing multimedia content using joint compression and encryption. Multimed. IEEE 20(4), 50–61 (2013)

    Article  Google Scholar 

  22. Peng, F., Zhu, X.-W., Long, M.: An ROI privacy protection scheme for H.264 video based on FMO and Chaos. IEEE Trans. Inf. Forensics Sec. 8(10), 1688–1699 (2013)

    Article  Google Scholar 

  23. PlanetObserever.com. http://www.planetobserver.com/. Accessed 20 Feb 2014

  24. Sanchez, D.D., Marin, A., Almenarez, F., Cortes, A.: Sharing conditional access modules through the home network for pay TV access. IEEE Trans. Consum. Electron. 55(1), 88–96 (2009)

    Article  Google Scholar 

  25. Shahid, Z., Puech, W.: Visual protection of HEVC video by selective encryption of CABAC binstrings. Multimed. IEEE Trans. 16(1), 24–36 (2014)

    Article  Google Scholar 

  26. Wallace, G. K.: The JPEG still picture compression standard. IEEE Trans. Consum. Electron. 38(1), pp. xviii–xxxiv (1992)

  27. Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., Chen, H.: Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Trans. Multimed. 12(3), 215–223 (2010)

    Article  Google Scholar 

  28. Wang, S., Laih, C.: Efficient key distribution for access control in Pay-TV systems. IEEE Trans. Multimed. 10(3), 480–492 (2008)

    Article  Google Scholar 

  29. Wang, W., Hempel, M., Peng, D., Wang, H., Sharif, H., Chen, H.: On energy efficient encryption for video streaming in wireless sensor networks. IEEE Trans. Multimed. 12(5), 417–426 (2010)

    Article  Google Scholar 

  30. Win, L.L., Thomas, T., Emmanuel, S.: Privacy enabled digital rights management without trusted third party assumption. IEEE Trans. Multimed. 14(3), 546–554 (2012)

    Article  Google Scholar 

  31. Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimed. 5(1), 118–129 (2003)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for their detailed comments that improved editorial as well as technical presentation of this paper. We also acknowledge the Centre of Excellence in Cryptology, Indian Statistical Institute for supporting this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toshanlal Meenpal.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Meenpal, T., Banik, S. & Maitra, S. A scheme for conditional access-based systems using index locations of DCT coefficients. J Real-Time Image Proc 13, 363–373 (2017). https://doi.org/10.1007/s11554-014-0409-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-014-0409-y

Keywords

Navigation