Abstract
The pay-TV industry seeks to extend its reach to portable display devices. At the same time, it seeks to ensure a horizontal market by making interoperable the Conditional Access Systems (CASs) employed to protect content. To achieve interoperability for such devices, this paper proposes a form of selective encryption for video that allows simultaneous distribution of a small percentage of video data on a per-CAS basis, allowing sharing of the unencrypted video between the CASs. The bitrate overhead for each additional CAS enabled is found to be on average 7.41 %, whereas the computational overhead amounts to no more than 40 ms for the benchmark sequences tested. Adaptation of CAS to transparent encryption of scalable video is also demonstrated in this paper.
Similar content being viewed by others
References
ARRIS (2015) Joint Statement on DSTAC Report. Available at http://apps.fcc.gov/ecfs/comment/view?id=60001099145, retrieved 04/25/16
Asghar MN, Ghanbari M (2012) MIKEY for keys management of H.264 scalable video coded layers. J King Saud Univ – Comput Inform Sci 24(2):107–116
Asghar MN, Fleury M, Ghanbari M (2012) Key management protocols for secure wireless multimedia services: a review. Recent Patents on Telecommunications 1(1):41–53
Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014a) Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multimedia Tools and Applications, http://link.springer.com/article/10.1007%2Fs11042-014-2160-6 Accessed 30th Sept. 2015
Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014b) Confidentiality of a selectively encrypted H.264 coded video bit-stream. J Vis Commun Image Represent 25(2):487–498
Bing B (2010) 3D and HD broadband video networking. Artech House, Norwood
Boyadjis, B, Perrin, M-E, Bergeron, C, Lecomte, S, (2014) A real-time ciphering transcoder for H.264 and HEVC streams. In: IEEE Int. Conf. Image Process., pp 3432–3434
Brown R (2015) Downloadable security and the future of CableCards. Article available at http://www.cablelabs.com/downloadable-security-and-the-future-of-cablecards/, retrieved 04/25/16
Chen, T, Lanchi, X, Xingjun W (2013) Combination of DRM and mobile code: a practice to protect TV contents and applications on android smartphone. In: IEEE Int. Conf. on Networking and Distrib. Comput., pp 89–93
Chow S, Eisen P, Johnson H, van Oorschot PC (2002) White-box cryptography and an AES implementation. In: 9th Annu. Workshop on Sel. Areas in Cryptography, pp 250–270
Clayson PL, Dallard NS (1997) System issues in the implementation of DVB Simulcrypt conditional access. In: Proc. Int. Broadcast. Conv., pp 470–475
Coutrot F, Michon V (1989) A single conditional access system for satellite-cable and terrestrial TV. IEEE Trans Consum Electron 35(3):464–468
Deng RH, Ding X, Wu Y, Wei Z (2014) Efficient block-based transparent encryption of H.264/SVC bitstreams. Multimedia Systems 20(2):165–178
Downloadable Security Technology Advisory Committee (2015) DSTAC Summary Report. 344 pages. Available from https://transition.fcc.gov/dstac/dstac-report, retrieved 04/25/16
Hong D, Wonkap J, Boyce J, Abbas A (2012) Scalability support in HEVC. In: IEEE Int. Symp. on Circuits Syst., pp 890–893
Huynh-Thu Q, Ghanbari M (2012) The accuracy of PSNR in predicting video quality for different scenes and frame rates. Telecommun Syst 49(1):35–48
ITU Radiocommunication Assembly (1992) Conditional-Access Broadcasting System, ITU-R Rec. BT.810
Jakobsson M, Reiter MK (2002) Discouraging software piracy using software aging. In: Security and Privacy in Digital Rights Management, pp 1–12
Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: Proc. Ninth Int. Conf. Networks, pp 140–145
Kaufman C, Perlman R, Speciner M (2002) Network security: private communications in a public world. Prentice Hall, Upper Saddle River
Koo H-S (2015) Downloadable multi-CA/DRM service model and architecture for mobile broadcasting. In: IEEE Int. Conf. on Inform. and Commun. Technol. Convergence, pp 722–724
Li S, Chen G, Cheung A, Bhargava B, Lo K-T (2007) On the design of perceptual MPEG-video encryption algorithms. IEEE Trans Circuits Syst Video Technol 17(2):1–10
Lookabaugh T, Sicke DC (2004) Selective encryption for consumer applications. IEEE Commun Mag 42(5):124–129
Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264 video compression standard. IEEE Trans Circuits Syst Video Technol 13(4):620–636
Massoudi, A, Lefebvre, F, De Vleeschouwer, C, Macq, B, Quisquater, JJ (2008) Overview on selective encryption of image and video: Challenges and perspective. EURASIP J Inf Security, vol. 2008, article no. 5, 1–18.
Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton
Mikityuk A, Zachey B, Friedrich O (2014) Digital rights management and its evolution in the context of IPTV platforms in the web domain. In: IEEE/CIC Symp. on Privacy and Security in Commun., pp 193–198
Moon J, Kim J, Park J, Paik E (2008) Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software. In: 3rd Int. Conf. on Convergence and Hybrid Inform. Technol. for the IPTV Syst., pp 380–385
Pedlow Jr. LM, Agnihotri D (2007) Batch-mode session-based encryption of Video on Demand content. US patent no. 7,263,187 B2
Pinson MN, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50(3):312–322
Rosenblatt B (2011) The new technologies for pay TV content security. White Paper, GiantSteps Media Technology Strategies
Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans Circuits Syst Video Technol 17(9):1103–1120
Shahid Z, Puech W (2014) Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans Multimedia 16(1):24–36
Shirazi H, Cosmas J, Cutts D (2010) A cooperative cellular and broadcast system conditional access system for pay-TV systems. IEEE Trans Broadcast 56(1):44–57
Sodagar I (2011) The MPEG-DASH standard for multimedia streaming over the internet. IEEE Multimedia 18(4):62–67
Sullivan GJ, Ohm J-R, Han W-J, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circuits Syst Video Technol 22(12):1649–1668
Sun H-M, Leu M-C (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959
Tews E, Wälde J, Weiner M (2011) Breaking DVB-CAS. In: Proc. West European Workshop on Research in Cryptography, pp 96–99
van Rijnsoever BJ, Lenoir P, Linnartz JP (2003) Interoperable protection for digital multimedia content. J VLSI Signal Process 34(1):167–179
van Someren N, Shamir A (1999) Playing hide and seek with keys. Financial Cryptography 99:118–124
Van Wallendael G, Boho A, De Cock J, Munteanu A, Van de Walle R (2013) Encryption for high efficiency video coding with video adaptation capabilities. IEEE Trans Consum Electron 59(3):634–642
Wan J, Liu J, Zhang R, Deng RH (2013) A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Trans Multimedia 15(6):1353–1364
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13(4):600–612
Weinmann, Wirt, K (2004) Analysis of the DVB Common Scrambling Algorithm. In: Proc. Eighth IFIP TC-6 TC-11 Conf. on Commun. and Multimedia Security, pp 195–207
Wiegand T, Sullivan JG, Bjøntegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560–576
Zimmermann, P, Johnston, A, Avvaya, E, Callas, J (2011) ZRTP: media path key agreement for unicast secure RTP. IETF, RFC 6189
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Asghar, M.N., Fleury, M. & Makki, S. Interoperable conditional access with video selective encryption for portable devices. Multimed Tools Appl 76, 13139–13152 (2017). https://doi.org/10.1007/s11042-016-3725-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3725-3