Volume 34 Issue 11
Nov.  2008
Turn off MathJax
Article Contents
Xiao Chen, Ma Shilong, Lü Weifeng, et al. Selective control mechanism for multi-datastream security in streaming media system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(11): 1292-1297. (in Chinese)
Citation: Xiao Chen, Ma Shilong, Lü Weifeng, et al. Selective control mechanism for multi-datastream security in streaming media system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(11): 1292-1297. (in Chinese)

Selective control mechanism for multi-datastream security in streaming media system

  • Received Date: 26 Sep 2007
  • Publish Date: 30 Nov 2008
  • Partial encryption and other media encryption schemes are effective approaches to encrypt the media data which are high volume and latency sensitive. However, use one media encryption scheme to protect all the media streams in a streaming media system will induce efficiency, scalability and security problems. To solve this problem, a security weightiness based dynamic optimal selective control mechanism for multi-datastream encryption was proposed. The idea of partial encryption was generalized from encrypting a subset of one stream to multi-streams. It can determine the optimum encryption algorithm with different security levels for each stream in the system, according to stream-s bandwidth, weightiness and other parameters. Since the simplified mathematical model is 0-1 knapsack problem which is NP-hard, a greedy heuristic incremental approximate algorithm was designed. Theoretical and experimental analyses show the approximate rate and speed of the algorithm are effective enough to support real-time applications. A prototype was implemented in an actual video conferencing system: Admire.

     

  • loading
  • [1] Jin T, Sheng X Z, Lu J. Admire, a prototype of large scale e-collaboration platform //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:335-343 [2] Huang T, Yu X N.An adaptive mixing audio gateway in heterogeneous networks for admire system //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:294-302 [3] Yin H, Lin C, Qiu F,et al. CASM: A content-aware protocol for secure video multicast[J]. IEEE Trans on Multimedia,2006,8(2):270-277 [4] Liu F W, Koenig H. A novel encryption algorithm for high sesolution video //Proc of NOSSDAV05.New York:ACM Press,2005:69-74 [5] ITU-T H.235(v3). Security and encryption for h-Series (H.323 and other H.245-based) multimedia terminals[S] [6] Maples T, Spanos G. Performance study of a selective encryption scheme for the security of networked, real-time video //4th Int Conf on Computer Comm and Networks. Wash. D C: IEEE Computer Society Press,1995:2-10 [7] Tang L. Methods for encrypting and decrypting MPEG video data efficiently //Proceedings of the 4th ACM International Conference on Multimedia. Boston, MA: ACM Press, 1996:219-230 [8] Servetti A,Martin J C. Perception-based partial encryption of compressed speech [J]. IEEE Trans on Speech and Audio Processing,2002,10:637-643 [9] Cheng H, Li X B.Partial encryption of compressed images and videos[J]. IEEE Trans on Signal Processing,2000,3: 2439 2451 [10] Tosun A S, Feng W C. On error preserving encryption algorithms for wireless video transmission //Proc of the 9th ACM International Conference on Multimedia.New York:ACM Press,2001: 302-308 [11] Lookabaugh T, Sicker D C, Keaton D M, et al. Security analysis of selectively encrypted MPEG-2 streams //Proc of the Multimedia Systems and Applications VI. Bellingham: SPIE Press, 2003:10-21 [12] Qiao T L, Narhstedt K. Comparison of MPEG encryption algorithms[J]. Computer and Graphics,1998,22 (4): 437-448 [13] Robertazzi T G. Computer networks and system: queuing theory and performance evaluation[M]. Berlin: Springer, 2000 [14] Martello S, Toth P. Knapsack problems: algorithms and computer implementations[M]. Chichester: John Wiley & Sons, 1990 [15] Sahni S. Approximate algorithms for the 0-1 knapsack problem [J]. Journal of the Assoc for Computing Machinery, 1975,22(1):115-124
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3946) PDF downloads(964) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return