Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
A case for end system multicast (keynote address)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
An Empirical Study of Secure MPEG Video Transmissions
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
MMSD '96 Proceedings of the 1996 International Workshop on Multimedia Software Development (MMSD '96)
Securing media for adaptive streaming
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
A novel encryption algorithm for high resolution video
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Hi-index | 0.00 |
An approach for securing video transmission on an end system multicast session is described. Existing solutions use encryption techniques that require the use of a shared key. Although they can achieve efficient encryption/decryption and meet the demands of real-time video, a publicly available service needing only the integrity and non-repudiation of the message is not considered. In this study, we offer such a method using public key cryptography. This method can be used in an end system multicast infrastructure where video originates from one source, but spreads with the help of receiving peers. Two different methods are described and compared: 1) Encryption of the entire packet. 2) Encryption of the unique digest value of the transmitted packet (i.e. digitally signing). The receivers then check the integrity of the received packets using the public key provided by the sender. Also, this way the non-repudiation of the transmitted video is provided.