Abstract
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. Our constructions make only use of hash functions and achieve the optimal bound regarding the minimum number of keys and the time complexity in computing all the decryption keys. We also formalize new security notions about collusion-resistance. Unlike prior key management schemes, our second scheme resists to certain collusion attacks. The collusion-resistance achieved is practical and hence sufficient for encryption of scalable video streams.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hanaoka, G., Ogawa, K., Murota, I., Ohtake, G., Majima, K., Oyamada, K., Gohshi, S., Namba, S., Imai, H.: Separating encryption and key issuance in digital rights management systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 365–376. Springer, Heidelberg (2003)
Joye, M., Yen, S.-M.: One-way cross-trees and their applications. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 346–356. Springer, Heidelberg (2002)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. Circuits Syst. Video Techn. 11(3), 301–317 (2001)
Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: Johnson, C., Montague, P., Steketee, C. (eds.) ACSW Frontiers. CRPIT, vol. 21, pp. 49–58. Australian Computer Society (2003)
ECRYPT Yearly Report on Algorithms and Keysizes. D.SPA.10 Rev. 1.1. IST-2002-507932 ECRYPT (2006) (January 2007), http://www.ecrypt.eu.org/documents/D.SPA.21-1.1.pdf
Rivest, R.: The MD5 Message - digert Algorithm. Internet activities board, internet privacy task force, request for comments, RFC 1321 (1992)
Yuan, C., Zhu, B.B., Su, M., Wang, X., Li, S., Zhong, Y.: Layered access control for MPEG-4 fgs video. In: ICIP (1), pp. 517–520 (2003)
Zhu, B.B., Feng, M., Li, S.: An efficient key scheme for layered access control of mpeg-4 fgs video. In: ICME, pp. 443–446. IEEE, Los Alamitos (2004)
Zhu, B.B., Yuan, C., Wang, Y., Li, S.: Scalable protection for MPEG-4 fine granularity scalability. IEEE Transactions on Multimedia 7(2), 222–233 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karroumi, M., Massoudi, A. (2009). Hash-Based Key Management Schemes for MPEG4-FGS. In: Bao, F., Li, H., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2009. Lecture Notes in Computer Science, vol 5451. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00843-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-00843-6_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00842-9
Online ISBN: 978-3-642-00843-6
eBook Packages: Computer ScienceComputer Science (R0)