skip to main content
10.1145/1065983.1066001acmconferencesArticle/Chapter ViewAbstractPublication PagesmmsysConference Proceedingsconference-collections
Article

A novel encryption algorithm for high resolution video

Authors Info & Claims
Published:13 June 2005Publication History

ABSTRACT

The popularity of multimedia applications is rapidly growing nowadays. The confidentiality of video communication is of primary concern for their commercial use, e.g. in video on demand services or in multiparty video conferences. Specific video encryption algorithms are strongly required in real-time multimedia communication to fulfill the strict timing requi-rements. In this paper we present a novel video encryption algorithm, called Puzzle, to encrypt video data in software. It is fast enough to meet real-time demands and provides a sufficient security. The algorithm can readily be incorporated into existing multimedia systems.

References

  1. NIST: Advanced Encryption Standard. FIPS 197, 2001.Google ScholarGoogle Scholar
  2. I. Agi and L. Gong: An Empirical Study of MPEG Video Transmission. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp.137--144, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. G. Haskell, A. Puri, and A. N. Netravali: Digital Video: An Introduction to MPEG-2. Kluwer Academic Publishers, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Tang: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In Proceedings ACM International Conference on Multimedia, pp.219--229, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Shi, S. Y. Wang, and B. Bhargava: MPEG Video Encryption in Real-Time Using Secret Key Cryptography. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDATA'99), 1999.Google ScholarGoogle Scholar
  6. W. Zeng and S. Lei: Efficient Frequency Domain Selective Scrambling of Digital Video. IEEE Transactions on Multimedia 5 (2003) 1, pp.115--129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C.-P. Wu and C.-C. J. Kuo: Efficient Multimedia Encryption via Entropy Codec Design. SPIE Int. Symposium on Electronic Imaging 2001, Vol. 4314, 2001.Google ScholarGoogle Scholar
  8. G. A. Spanos and T. B. Maples: Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. Forth International Conference on Computer Communications and Networks, pp. 2--10, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Li, Z. Chen, S. -M. Tan, and R. H. Campbell: Security Enhanced MPEG Player. IEEE 1st International Workshop on Multimedia Software, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Qiao and K. Nahrstedt: Comparison of MPEG Encryption Algorithms. Computer and Graphics 22 (1998) 4, pp.437--448.Google ScholarGoogle ScholarCross RefCross Ref
  11. The BRAVIS peer-to-peer video conference system. http://www.bravis.tu-cottbus.de.Google ScholarGoogle Scholar
  12. P. Rogaway and D. Coppersmith: A software-optimized encryption algorithm. In Proceedings of the 1st International Workshop on Fast Software Encryption, Springer-Verlag, pp.56--63, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Dworkin: Recommendation for Block Cipher Modes of Operation, Methods, and Techniques. NIST Special Publication 800--38A, Dec.2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone: Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and its Applications, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Biham and A.Shamir: Differential Cryptanalysis of the Full 16-round DES. Advances in Cryptology-CRYPTO'92. Springer-Verlag. pp. 487--496, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A novel encryption algorithm for high resolution video

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          NOSSDAV '05: Proceedings of the international workshop on Network and operating systems support for digital audio and video
          June 2005
          210 pages
          ISBN:158113987X
          DOI:10.1145/1065983

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 June 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate118of363submissions,33%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader