ABSTRACT
The popularity of multimedia applications is rapidly growing nowadays. The confidentiality of video communication is of primary concern for their commercial use, e.g. in video on demand services or in multiparty video conferences. Specific video encryption algorithms are strongly required in real-time multimedia communication to fulfill the strict timing requi-rements. In this paper we present a novel video encryption algorithm, called Puzzle, to encrypt video data in software. It is fast enough to meet real-time demands and provides a sufficient security. The algorithm can readily be incorporated into existing multimedia systems.
- NIST: Advanced Encryption Standard. FIPS 197, 2001.Google Scholar
- I. Agi and L. Gong: An Empirical Study of MPEG Video Transmission. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp.137--144, 1996. Google ScholarDigital Library
- B. G. Haskell, A. Puri, and A. N. Netravali: Digital Video: An Introduction to MPEG-2. Kluwer Academic Publishers, 1996. Google ScholarDigital Library
- L. Tang: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In Proceedings ACM International Conference on Multimedia, pp.219--229, 1996. Google ScholarDigital Library
- C. Shi, S. Y. Wang, and B. Bhargava: MPEG Video Encryption in Real-Time Using Secret Key Cryptography. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDATA'99), 1999.Google Scholar
- W. Zeng and S. Lei: Efficient Frequency Domain Selective Scrambling of Digital Video. IEEE Transactions on Multimedia 5 (2003) 1, pp.115--129. Google ScholarDigital Library
- C.-P. Wu and C.-C. J. Kuo: Efficient Multimedia Encryption via Entropy Codec Design. SPIE Int. Symposium on Electronic Imaging 2001, Vol. 4314, 2001.Google Scholar
- G. A. Spanos and T. B. Maples: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. Forth International Conference on Computer Communications and Networks, pp. 2--10, 1995. Google ScholarDigital Library
- Y. Li, Z. Chen, S. -M. Tan, and R. H. Campbell: Security Enhanced MPEG Player. IEEE 1st International Workshop on Multimedia Software, 1996. Google ScholarDigital Library
- L. Qiao and K. Nahrstedt: Comparison of MPEG Encryption Algorithms. Computer and Graphics 22 (1998) 4, pp.437--448.Google ScholarCross Ref
- The BRAVIS peer-to-peer video conference system. http://www.bravis.tu-cottbus.de.Google Scholar
- P. Rogaway and D. Coppersmith: A software-optimized encryption algorithm. In Proceedings of the 1st International Workshop on Fast Software Encryption, Springer-Verlag, pp.56--63, 1993. Google ScholarDigital Library
- M. Dworkin: Recommendation for Block Cipher Modes of Operation, Methods, and Techniques. NIST Special Publication 800--38A, Dec.2001. Google ScholarDigital Library
- A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone: Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and its Applications, 1997. Google ScholarDigital Library
- E. Biham and A.Shamir: Differential Cryptanalysis of the Full 16-round DES. Advances in Cryptology-CRYPTO'92. Springer-Verlag. pp. 487--496, 1992. Google ScholarDigital Library
Index Terms
- A novel encryption algorithm for high resolution video
Recommendations
Identity-based proxy re-encryption version 2
Proxy re-encryption (PRE) enables an authorized proxy to convert a ciphertext under Alice's public key into a ciphertext under Bob's public key without exposing the encrypted message. In existing PRE systems, the original ciphertexts and the re-...
Generic construction of designated tester public-key encryption with keyword search
This paper provides two generic transformations to construct a designated tester public-key encryption with keyword search scheme using two identity-based encryption schemes. We also identify the properties of identity-based encryption that are ...
Trapdoor security in a searchable public-key encryption scheme with a designated tester
We study a secure searchable public-key encryption scheme with a designated tester (dPEKS). The contributions of this paper are threefold. First, we enhance the existing security model to incorporate the realistic abilities of dPEKS attackers. Second, ...
Comments