MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Protocol considerations for a prefix-caching proxy for multimedia streams
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Collusion attack on a multi-key secure video proxy scheme
Proceedings of the 12th annual ACM international conference on Multimedia
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A multilayered digital content distribution using a group-key based on web
Future Generation Computer Systems
Quasi-commutative watermarking and encryption for secure media content distribution
Multimedia Tools and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
Because of limited server and network capacities in multimedia streaming, proxies are commonly used to cache multimedia objects such that, by accessing nearby proxies, clients can enjoy smaller start-up latencies and reduced packet loss and delay jitters for their requests. However, the use of video proxies increases the risk that multimedia data are exposed to unauthorized access by intruders. In this paper, we present a framework for implementing a secure video proxy or, more generally, a secure proxy architecture. The framework employs a notion of asymmetric reversible parametric sequences to provide the following security properties: (1) data confidentiality during transmission, (2) end-to-end data confidentiality, (3) data confidentiality against proxy intruders, and (4) data confidentiality against member collusion. Our framework is grounded on a multi-key RSA technique such that system resilience against attacks is provably strong given standard computability assumptions. We also propose the use of a set of encryption configuration parameters to trade off proxy encryption throughput against the viewing quality of video by unauthorized parties. Implementation results on a Pentium III/800 MHz machine show that our techniques can simultaneously achieve high encryption throughput and extremely low video quality (in terms of both PSNR and the visual quality of decoded frames) during unauthorized viewing.