Skip to main content

Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services

  • Conference paper
Advances in Image and Video Technology (PSIVT 2006)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 4319))

Included in the following conference series:

Abstract

We present an effective security control for multimedia streaming in public network via buffer-occupancy feedback controls of client’s playback buffer. There is a wide variety of multimedia-on-demand (MOD) applications can benefit from this end-to-end security control to protect the streaming data. Because the encryption/decryption for video packets are time-consuming process, our observation is that the playback buffer occupancy (PBO) can simply indicate the time availability to adjust the security level to affect the sending rate for the packet delivery. That is to say, adjusting security level can be applied further to keep the PBO away from buffer overflow and underflow. Therefore, we propose a feedback control of PBO not only to protect the MOD services from eavesdroppers, but also maintain the playback quality. To further boost the protection, we also apply Diffie-Hellman key negotiation method to provide the dynamic key changes while the PBO is controlled at a stable range for a long period. Moreover, due to the network uncertainty, different content delivery in MOD service will preserve different running PBOs. Then, they may have different applied security levels and key changes in service sessions. It will make eavesdroppers more difficult to recover the whole encrypted media data. In this paper, we also demonstrate the performance of encryption protection and preserved playback quality in our proposed schemes by experiments on a true VOD system with well-known encryptions of DES, 2DES and 3DES.

The work was partially done while the author was visiting the Institute of Information Science, Academia Sinica, Taiwan in 2005 and supported by National Science Council, Project No. NSC 94-2213-E-130-001, Taiwan.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chao, H.-C., Wu, T.Y., Chen, J.-L.: Security-enhanced packet video with dynamic multicast throughput adjustment. International Journal of Network Management 11, 147–159 (2001)

    Article  Google Scholar 

  2. Li, Y., Chen, Z., Tan, S.-M., Campbell, R.H.: Security-enhanced MPEG player. In: Proceedings of International Workshop on Multimedia Software Development, 25-26 March (1996)

    Google Scholar 

  3. Kunkelmann, T., Reinema, R.: A scalable security architecture for multimedia communication standards. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems 1997, 3-6 June, pp. 660–661 (1997)

    Google Scholar 

  4. Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the fourth ACM international conference on Multimedia (February 1997)

    Google Scholar 

  5. Tosun, A.S., Feng, W.-C.: Efficient multi-layer coding and encryption of MPEG video streams. In: IEEE International Conference on Multimedia and Expo, ICME 2000, 30 July-2 August, vol. 1, pp. 119–122 (2000)

    Google Scholar 

  6. Wang, C.-H., Chang, R.-I., Ho, J.-M., Hsu, S.-C.: Rate-Sensitive ARQ for Real-Time Video Streaming. In: GLOBECOM’03, IEEE 2003 Global Communications Conference, 1- 5 December (2003)

    Google Scholar 

  7. Stallings, W.: Cryptography and Network Security, Principles and Practices. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  8. Ong, C.S., Nahrstedt, K., Yuan, W.: Qualily of Protection for Mobile Multimedia Applications. In: IEEE International Conference on Multimedia and Expo, ICME 2003, pp. II137–II140 (2003)

    Google Scholar 

  9. Zhang, H., Ferrari, D.: Rate-Controlled Service Disciplines. Journal of High Speed Networks 3(4) (1994)

    Google Scholar 

  10. Rizzo, L.: Dummynet:a simple approach to the evaluation of network protocols. Computer Communication Review, 31–41 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lai, JC., Wang, CH. (2006). Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. In: Chang, LW., Lie, WN. (eds) Advances in Image and Video Technology. PSIVT 2006. Lecture Notes in Computer Science, vol 4319. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11949534_89

Download citation

  • DOI: https://doi.org/10.1007/11949534_89

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68297-4

  • Online ISBN: 978-3-540-68298-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics