Selective control mechanism for multi-datastream security in streaming media system
-
摘要: 部分加密等媒体数据加密算法是保护媒体数据安全的有效方法,但用其加密流媒体系统中的多路媒体数据将使系统面临效率、规模扩展与安全性问题.为此提出基于数据安全权重的多数据流加密的动态最优选择控制模型,根据各数据流的带宽、权重等参数,为不同数据动态选择不同强度的加密方法.由于化简后的数学模型是NP难的0-1背包问题,结合实际系统特点提出基于贪婪启发思想的增量式近似算法.理论分析和实验表明该算法时间复杂度低且具有良好的近似性.最终在一个实用流媒体系统——Admire系统中设计实现了选择控制模型的原型子系统.Abstract: Partial encryption and other media encryption schemes are effective approaches to encrypt the media data which are high volume and latency sensitive. However, use one media encryption scheme to protect all the media streams in a streaming media system will induce efficiency, scalability and security problems. To solve this problem, a security weightiness based dynamic optimal selective control mechanism for multi-datastream encryption was proposed. The idea of partial encryption was generalized from encrypting a subset of one stream to multi-streams. It can determine the optimum encryption algorithm with different security levels for each stream in the system, according to stream-s bandwidth, weightiness and other parameters. Since the simplified mathematical model is 0-1 knapsack problem which is NP-hard, a greedy heuristic incremental approximate algorithm was designed. Theoretical and experimental analyses show the approximate rate and speed of the algorithm are effective enough to support real-time applications. A prototype was implemented in an actual video conferencing system: Admire.
-
Key words:
- multimedia system /
- security of data /
- partial encryption /
- optimal control /
- approximate algorithm
-
[1] Jin T, Sheng X Z, Lu J. Admire, a prototype of large scale e-collaboration platform //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:335-343 [2] Huang T, Yu X N.An adaptive mixing audio gateway in heterogeneous networks for admire system //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:294-302 [3] Yin H, Lin C, Qiu F,et al. CASM: A content-aware protocol for secure video multicast[J]. IEEE Trans on Multimedia,2006,8(2):270-277 [4] Liu F W, Koenig H. A novel encryption algorithm for high sesolution video //Proc of NOSSDAV05.New York:ACM Press,2005:69-74 [5] ITU-T H.235(v3). Security and encryption for h-Series (H.323 and other H.245-based) multimedia terminals[S] [6] Maples T, Spanos G. Performance study of a selective encryption scheme for the security of networked, real-time video //4th Int Conf on Computer Comm and Networks. Wash. D C: IEEE Computer Society Press,1995:2-10 [7] Tang L. Methods for encrypting and decrypting MPEG video data efficiently //Proceedings of the 4th ACM International Conference on Multimedia. Boston, MA: ACM Press, 1996:219-230 [8] Servetti A,Martin J C. Perception-based partial encryption of compressed speech [J]. IEEE Trans on Speech and Audio Processing,2002,10:637-643 [9] Cheng H, Li X B.Partial encryption of compressed images and videos[J]. IEEE Trans on Signal Processing,2000,3: 2439 2451 [10] Tosun A S, Feng W C. On error preserving encryption algorithms for wireless video transmission //Proc of the 9th ACM International Conference on Multimedia.New York:ACM Press,2001: 302-308 [11] Lookabaugh T, Sicker D C, Keaton D M, et al. Security analysis of selectively encrypted MPEG-2 streams //Proc of the Multimedia Systems and Applications VI. Bellingham: SPIE Press, 2003:10-21 [12] Qiao T L, Narhstedt K. Comparison of MPEG encryption algorithms[J]. Computer and Graphics,1998,22 (4): 437-448 [13] Robertazzi T G. Computer networks and system: queuing theory and performance evaluation[M]. Berlin: Springer, 2000 [14] Martello S, Toth P. Knapsack problems: algorithms and computer implementations[M]. Chichester: John Wiley & Sons, 1990 [15] Sahni S. Approximate algorithms for the 0-1 knapsack problem [J]. Journal of the Assoc for Computing Machinery, 1975,22(1):115-124
点击查看大图
计量
- 文章访问数: 3989
- HTML全文浏览量: 122
- PDF下载量: 966
- 被引次数: 0