Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.3.183

Encryption of MPEG using Error Propagation by a Receiver  

Jeong, Seo-Hyun (Korea University)
Lee, Sung-Ju (Korea University)
Chung, Young-Wha (Korea University)
Kim, Sang-Chun (Kangwon National University)
Min, Byoung-Ki (ASTEL)
Abstract
According to increased multimedia data(i.e., MPEG video stream) in mobile application, protecting data becomes an important problem in the multimedia data delivery. SECMPEG is a selective encryption approach for protecting multimedia data. However, the computational overhead of SECMPEG's security level 3 is quite large because it encrypts the whole I-frames whose size is relatively larger than P/B-frames. Therefore, we need to analyze the characteristics of MPEG2 standard and derive an effective encryption of the I-frames. In this paper, we propose a slice-level, selective encryption approach by using the error-propagation characteristics of I-frames by a receiver. Our experimental results show that the proposed approach can reduce the execution time of SECMPEG's security level 3 by a factor of 30 without degradation of the security.
Keywords
selective encryption; error propagation; MPEG2;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Kulkarni, B. Raman, and I. Gupta, "Multimedia Encryption: A Brief Overview," SCI 231, pp. 417-449, Sep. 2009.
2 A. Massoudi, et al., "Overview on Selective Encryption of Image and Video: Challenges and Perspectives," EURASIP J. on Information Security, Nov. 2008.
3 F. Liu and H. Koenig, "Survey of Video Encryption Algorithms," Computers & Security, Vol. 29, No. 1, pp. 3-15, June 2009.
4 G. Jakimoski and K. Subbalakshmi, "Cryptanalysis of Some Multimedia Encryption Schemes," IEEE Tr. Multimedia, Vol. 10, No. 3, pp. 330-338, 2008.   DOI
5 T. Seidel, D. Socek, and M. Sramka, "Cryptanalysis of Video Encryption Algorithms," Proc. of Central European Conf. on Cryptology, vol.29, pp. 1-9, Sep. 2004.
6 A. Gurijala, et al., "On Encryption-Compression Tradeoff of Pre/Post-Filtered Images," Proc. of SPIE, Vol. 5915, pp. 1-10, Sep. 2005.
7 J. Woods, "Center for Image Processing Research," http://www.cipr .rpi.edu/ftp_ pub/sequences/sif/yuv/.
8 J. Meyer and F. Gadegast, "Security Mechanism for Multimedia Data with the Example MPEG-1 Video," Project Description of SECMPEG, Technical University of Berlin, May 1995
9 T. Lookabaugh, et al., "Security Analysis of Selectively Encrypted MPEG2 Streams," Proc. of Multimedia Systems and Applications, pp. 10-21, Sep. 2003.
10 B. Furht and D. Kirovski, Multimedia Security Handbook, CRC press, 2005.
11 X. Liu and A. Eskicioglu, "Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions," Proc. of Conf. Communications, Internet, and Information Technology, pp. 17-19, Nov. 2003.
12 J. Watkinson, The MPEG Handbook, Elsevier, 2004.