Skip to main content
Log in

Interoperable conditional access with video selective encryption for portable devices

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The pay-TV industry seeks to extend its reach to portable display devices. At the same time, it seeks to ensure a horizontal market by making interoperable the Conditional Access Systems (CASs) employed to protect content. To achieve interoperability for such devices, this paper proposes a form of selective encryption for video that allows simultaneous distribution of a small percentage of video data on a per-CAS basis, allowing sharing of the unencrypted video between the CASs. The bitrate overhead for each additional CAS enabled is found to be on average 7.41 %, whereas the computational overhead amounts to no more than 40 ms for the benchmark sequences tested. Adaptation of CAS to transparent encryption of scalable video is also demonstrated in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. ARRIS (2015) Joint Statement on DSTAC Report. Available at http://apps.fcc.gov/ecfs/comment/view?id=60001099145, retrieved 04/25/16

  2. Asghar MN, Ghanbari M (2012) MIKEY for keys management of H.264 scalable video coded layers. J King Saud Univ – Comput Inform Sci 24(2):107–116

    Google Scholar 

  3. Asghar MN, Fleury M, Ghanbari M (2012) Key management protocols for secure wireless multimedia services: a review. Recent Patents on Telecommunications 1(1):41–53

    Article  Google Scholar 

  4. Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014a) Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multimedia Tools and Applications, http://link.springer.com/article/10.1007%2Fs11042-014-2160-6 Accessed 30th Sept. 2015

  5. Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014b) Confidentiality of a selectively encrypted H.264 coded video bit-stream. J Vis Commun Image Represent 25(2):487–498

    Article  Google Scholar 

  6. Bing B (2010) 3D and HD broadband video networking. Artech House, Norwood

    Google Scholar 

  7. Boyadjis, B, Perrin, M-E, Bergeron, C, Lecomte, S, (2014) A real-time ciphering transcoder for H.264 and HEVC streams. In: IEEE Int. Conf. Image Process., pp 3432–3434

  8. Brown R (2015) Downloadable security and the future of CableCards. Article available at http://www.cablelabs.com/downloadable-security-and-the-future-of-cablecards/, retrieved 04/25/16

  9. Chen, T, Lanchi, X, Xingjun W (2013) Combination of DRM and mobile code: a practice to protect TV contents and applications on android smartphone. In: IEEE Int. Conf. on Networking and Distrib. Comput., pp 89–93

  10. Chow S, Eisen P, Johnson H, van Oorschot PC (2002) White-box cryptography and an AES implementation. In: 9th Annu. Workshop on Sel. Areas in Cryptography, pp 250–270

  11. Clayson PL, Dallard NS (1997) System issues in the implementation of DVB Simulcrypt conditional access. In: Proc. Int. Broadcast. Conv., pp 470–475

  12. Coutrot F, Michon V (1989) A single conditional access system for satellite-cable and terrestrial TV. IEEE Trans Consum Electron 35(3):464–468

    Article  Google Scholar 

  13. Deng RH, Ding X, Wu Y, Wei Z (2014) Efficient block-based transparent encryption of H.264/SVC bitstreams. Multimedia Systems 20(2):165–178

    Article  Google Scholar 

  14. Downloadable Security Technology Advisory Committee (2015) DSTAC Summary Report. 344 pages. Available from https://transition.fcc.gov/dstac/dstac-report, retrieved 04/25/16

  15. Hong D, Wonkap J, Boyce J, Abbas A (2012) Scalability support in HEVC. In: IEEE Int. Symp. on Circuits Syst., pp 890–893

  16. Huynh-Thu Q, Ghanbari M (2012) The accuracy of PSNR in predicting video quality for different scenes and frame rates. Telecommun Syst 49(1):35–48

    Article  Google Scholar 

  17. ITU Radiocommunication Assembly (1992) Conditional-Access Broadcasting System, ITU-R Rec. BT.810

  18. Jakobsson M, Reiter MK (2002) Discouraging software piracy using software aging. In: Security and Privacy in Digital Rights Management, pp 1–12

  19. Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: Proc. Ninth Int. Conf. Networks, pp 140–145

  20. Kaufman C, Perlman R, Speciner M (2002) Network security: private communications in a public world. Prentice Hall, Upper Saddle River

    Google Scholar 

  21. Koo H-S (2015) Downloadable multi-CA/DRM service model and architecture for mobile broadcasting. In: IEEE Int. Conf. on Inform. and Commun. Technol. Convergence, pp 722–724

  22. Li S, Chen G, Cheung A, Bhargava B, Lo K-T (2007) On the design of perceptual MPEG-video encryption algorithms. IEEE Trans Circuits Syst Video Technol 17(2):1–10

    Article  Google Scholar 

  23. Lookabaugh T, Sicke DC (2004) Selective encryption for consumer applications. IEEE Commun Mag 42(5):124–129

    Article  Google Scholar 

  24. Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264 video compression standard. IEEE Trans Circuits Syst Video Technol 13(4):620–636

    Article  Google Scholar 

  25. Massoudi, A, Lefebvre, F, De Vleeschouwer, C, Macq, B, Quisquater, JJ (2008) Overview on selective encryption of image and video: Challenges and perspective. EURASIP J Inf Security, vol. 2008, article no. 5, 1–18.

  26. Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    Book  MATH  Google Scholar 

  27. Mikityuk A, Zachey B, Friedrich O (2014) Digital rights management and its evolution in the context of IPTV platforms in the web domain. In: IEEE/CIC Symp. on Privacy and Security in Commun., pp 193–198

  28. Moon J, Kim J, Park J, Paik E (2008) Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software. In: 3rd Int. Conf. on Convergence and Hybrid Inform. Technol. for the IPTV Syst., pp 380–385

  29. Pedlow Jr. LM, Agnihotri D (2007) Batch-mode session-based encryption of Video on Demand content. US patent no. 7,263,187 B2

  30. Pinson MN, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50(3):312–322

    Article  Google Scholar 

  31. Rosenblatt B (2011) The new technologies for pay TV content security. White Paper, GiantSteps Media Technology Strategies

  32. Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans Circuits Syst Video Technol 17(9):1103–1120

    Article  Google Scholar 

  33. Shahid Z, Puech W (2014) Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans Multimedia 16(1):24–36

    Article  Google Scholar 

  34. Shirazi H, Cosmas J, Cutts D (2010) A cooperative cellular and broadcast system conditional access system for pay-TV systems. IEEE Trans Broadcast 56(1):44–57

    Article  Google Scholar 

  35. Sodagar I (2011) The MPEG-DASH standard for multimedia streaming over the internet. IEEE Multimedia 18(4):62–67

    Article  Google Scholar 

  36. Sullivan GJ, Ohm J-R, Han W-J, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circuits Syst Video Technol 22(12):1649–1668

    Article  Google Scholar 

  37. Sun H-M, Leu M-C (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959

    Article  Google Scholar 

  38. Tews E, Wälde J, Weiner M (2011) Breaking DVB-CAS. In: Proc. West European Workshop on Research in Cryptography, pp 96–99

  39. van Rijnsoever BJ, Lenoir P, Linnartz JP (2003) Interoperable protection for digital multimedia content. J VLSI Signal Process 34(1):167–179

    Article  MATH  Google Scholar 

  40. van Someren N, Shamir A (1999) Playing hide and seek with keys. Financial Cryptography 99:118–124

    MATH  Google Scholar 

  41. Van Wallendael G, Boho A, De Cock J, Munteanu A, Van de Walle R (2013) Encryption for high efficiency video coding with video adaptation capabilities. IEEE Trans Consum Electron 59(3):634–642

    Article  Google Scholar 

  42. Wan J, Liu J, Zhang R, Deng RH (2013) A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Trans Multimedia 15(6):1353–1364

    Article  Google Scholar 

  43. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  44. Weinmann, Wirt, K (2004) Analysis of the DVB Common Scrambling Algorithm. In: Proc. Eighth IFIP TC-6 TC-11 Conf. on Commun. and Multimedia Security, pp 195–207

  45. Wiegand T, Sullivan JG, Bjøntegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560–576

    Article  Google Scholar 

  46. Zimmermann, P, Johnston, A, Avvaya, E, Callas, J (2011) ZRTP: media path key agreement for unicast secure RTP. IETF, RFC 6189

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Fleury.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Asghar, M.N., Fleury, M. & Makki, S. Interoperable conditional access with video selective encryption for portable devices. Multimed Tools Appl 76, 13139–13152 (2017). https://doi.org/10.1007/s11042-016-3725-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3725-3

Keywords

Navigation