An Efficient Security System for CABAC Bin-Strings of H.264/SVC
The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we propose a complete security system for H.264/scalable video coding (SVC) video codec and present a solution for the bit-rate and format complia...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on circuits and systems for video technology Jg. 23; H. 3; S. 425 - 437 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York, NY
IEEE
01.03.2013
Institute of Electrical and Electronics Engineers |
| Schlagworte: | |
| ISSN: | 1051-8215, 1558-2205 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we propose a complete security system for H.264/scalable video coding (SVC) video codec and present a solution for the bit-rate and format compliance problems by careful selection of entropy coder syntax elements (bin-strings) for selective encryption (SE), and the problem of managing multiple layer encryption keys for scalable video distribution. A standard key management protocol, multimedia Internet keying protocol, is implemented for the hierarchical key generation mechanism, in which a subscriber has only one encryption key to unlock all scalable layers that have been subscribed to. The evaluation demonstrates the resulting video quality degradation arising from SE for many CIF and 4 CIF test video sequences, without there being any impact upon the bit-rate or format compliancy, and with small computational delay. The security and statistical analysis performed further verify the effectiveness of the proposed security system for H.264/SVC. The proposed system is highly suitable for video distribution to users who have subscribed to a varying degree of video quality on devices with medium to high computational resources. |
|---|---|
| AbstractList | The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we propose a complete security system for H.264/scalable video coding (SVC) video codec and present a solution for the bit-rate and format compliance problems by careful selection of entropy coder syntax elements (bin-strings) for selective encryption (SE), and the problem of managing multiple layer encryption keys for scalable video distribution. A standard key management protocol, multimedia Internet keying protocol, is implemented for the hierarchical key generation mechanism, in which a subscriber has only one encryption key to unlock all scalable layers that have been subscribed to. The evaluation demonstrates the resulting video quality degradation arising from SE for many CIF and 4 CIF test video sequences, without there being any impact upon the bit-rate or format compliancy, and with small computational delay. The security and statistical analysis performed further verify the effectiveness of the proposed security system for H.264/SVC. The proposed system is highly suitable for video distribution to users who have subscribed to a varying degree of video quality on devices with medium to high computational resources. |
| Author | Ghanbari, M. Asghar, M. N. |
| Author_xml | – sequence: 1 givenname: M. N. surname: Asghar fullname: Asghar, M. N. email: masghaa@essex.ac.uk organization: Sch. of Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK – sequence: 2 givenname: M. surname: Ghanbari fullname: Ghanbari, M. email: ghan@essex.ac.uk organization: Sch. of Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27141651$$DView record in Pascal Francis |
| BookMark | eNp9kLFOwzAURS0EEm3hB2DJwpjUz3FsZ0JpVChSJYaUrpbj2siodSo7DP17UloYGJjefdI9dzhjdOk7bxC6A5wB4HK6qpv1KiMYSEYIpiWFCzSCohDp8BaXQ8YFpIJAcY3GMX5gDFRQPkKPlU_m1jrtjO-TxujP4PpD0hxib3aJ7UJSV7OqTmbOp00fnH-PSWeTRUYYnTbr-gZdWbWN5vZ8J-jtab6qF-ny9fmlrpapJiXvUwOGaWBcmFxsCLfcUKYFyzFrFbcWmG2NIcKqFrdlSykvbAsY52CN1WTT5hP0cNrdq6jV1gbltYtyH9xOhYMkHCiwAoaeOPV06GIMxkrtetW7zvdBua0ELI_C5LcweRQmz8IGlPxBf9b_he5PkDPG_AKMgADO8y_Z4HbM |
| CODEN | ITCTEM |
| CitedBy_id | crossref_primary_10_1016_j_ijleo_2020_165911 crossref_primary_10_1016_j_jvcir_2017_02_017 crossref_primary_10_1109_TCSVT_2020_2976050 crossref_primary_10_1049_iet_ipr_2017_0022 crossref_primary_10_1109_TCSVT_2019_2924910 crossref_primary_10_3390_s150407953 crossref_primary_10_1109_TIFS_2013_2259819 crossref_primary_10_1016_j_ijcip_2025_100786 crossref_primary_10_1109_TCOMM_2020_3015500 crossref_primary_10_1109_ACCESS_2020_3024926 crossref_primary_10_1016_j_ijleo_2016_07_024 crossref_primary_10_3390_s19051228 crossref_primary_10_1007_s11042_019_7253_9 crossref_primary_10_3390_e24060755 crossref_primary_10_1145_3672568 crossref_primary_10_1007_s12626_016_0067_6 crossref_primary_10_1109_TCSVT_2015_2511879 crossref_primary_10_1109_TIFS_2014_2302899 crossref_primary_10_1007_s11071_017_3563_5 crossref_primary_10_1016_j_ins_2016_08_059 crossref_primary_10_1109_TCE_2022_3228679 |
| Cites_doi | 10.1007/978-3-540-77255-2_27 10.17487/rfc1321 10.1109/NCM.2008.259 10.1109/TMM.2003.808817 10.1109/TIP.2006.873426 10.1109/TCSVT.2003.815168 10.1016/j.jvcir.2011.02.005 10.1109/TIT.2004.824921 10.17487/rfc3830 10.1016/0020-0190(78)90024-8 10.7763/IJCEE.2010.V2.141 10.1587/transinf.E92.D.851 10.1109/TCE.2003.1261218 10.1109/TCSVT.2007.905532 10.1117/12.571869 10.1109/JPROC.2004.839623 10.17487/rfc2104 10.1109/TCSVT.2003.815173 10.1093/ietfec/e91-a.1.12 10.1109/MCAS.2004.1286980 10.1109/ICASSP.2001.940394 10.1109/CISP.2009.5302934 10.1109/JPROC.2004.839611 10.1145/1161366.1161402 10.1109/ICIP.2006.312886 10.1155/2007/79048 10.1109/ICIP.2001.959047 10.1049/PBTE054E 10.1016/j.sigpro.2010.10.012 10.1016/j.image.2010.03.005 10.1007/11922841_33 10.1109/TSP.2005.855418 10.1109/TCE.2002.1010141 10.1109/LSP.2005.851261 10.1155/2008/179290 |
| ContentType | Journal Article |
| Copyright | 2014 INIST-CNRS |
| Copyright_xml | – notice: 2014 INIST-CNRS |
| DBID | 97E RIA RIE AAYXX CITATION IQODW |
| DOI | 10.1109/TCSVT.2012.2204941 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef Pascal-Francis |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Applied Sciences |
| EISSN | 1558-2205 |
| EndPage | 437 |
| ExternalDocumentID | 27141651 10_1109_TCSVT_2012_2204941 6218177 |
| Genre | orig-research |
| GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS RXW TAE TN5 VH1 AAYXX CITATION IQODW RIG |
| ID | FETCH-LOGICAL-c297t-e1e6c1678e38d27f7e46c86306ba7ff16fbee28fab0b9b4475fb10031fefc2db3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 30 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000317392600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1051-8215 |
| IngestDate | Mon Jul 21 09:16:51 EDT 2025 Sat Nov 29 01:44:04 EST 2025 Tue Nov 18 21:55:22 EST 2025 Tue Aug 26 16:45:36 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | Video coding Scalability Information rate Entropy Multimedia communication Video codecs Implementation Video signal processing Copyright Degradation Selective encryption Subscriber Safety Damaging Multimedia Internet protocol H.264/scalable video coding (SVC) Coding circuit Multiple layer Key management Information transmission Binary coding Adaptive coding Image quality AES-CFB algorithm Intellectual property security system Arithmetic code context adaptive binary arithmetic coding (CABAC) multimedia Internet keying protocol (MIKEY) Syntax |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c297t-e1e6c1678e38d27f7e46c86306ba7ff16fbee28fab0b9b4475fb10031fefc2db3 |
| PageCount | 13 |
| ParticipantIDs | crossref_citationtrail_10_1109_TCSVT_2012_2204941 pascalfrancis_primary_27141651 crossref_primary_10_1109_TCSVT_2012_2204941 ieee_primary_6218177 |
| PublicationCentury | 2000 |
| PublicationDate | 2013-03-01 |
| PublicationDateYYYYMMDD | 2013-03-01 |
| PublicationDate_xml | – month: 03 year: 2013 text: 2013-03-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY |
| PublicationTitle | IEEE transactions on circuits and systems for video technology |
| PublicationTitleAbbrev | TCSVT |
| PublicationYear | 2013 |
| Publisher | IEEE Institute of Electrical and Electronics Engineers |
| Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers |
| References | ref13 ref12 ref15 ref52 ref11 ref10 white (ref36) 1995 ref17 kim (ref31) 2007 ref16 ref19 esslinger (ref45) 2010 ref51 ref50 ref46 spinsante (ref14) 2005 ref48 (ref49) 1996 ref42 ref41 won (ref30) 2006; lncs 4283 ref9 ref4 ref3 ref6 ref5 sullivan (ref38) 2004 ref40 sttz (ref21) 2009 ref35 ref34 ref37 (ref43) 2001 ref33 ref32 ref2 ref1 ref39 yuan (ref24) 2003 magli (ref22) 0 li (ref26) 2008 tesch (ref47) 2006 kuchar (ref44) 2000; 30 ref23 ref25 ref20 (ref7) 2005 yuan (ref29) 2004; 27 ref28 ref27 uhl (ref8) 2005; 15 apostolopoulos (ref18) 2006 |
| References_xml | – start-page: 1338 year: 2005 ident: ref14 article-title: Masking video information by partial encryption of H.264/AVC coding parameters publication-title: Proc 13th Eur Signal Process Conf – ident: ref16 doi: 10.1007/978-3-540-77255-2_27 – year: 2006 ident: ref47 publication-title: Security Threat Mitigation and Response Understanding Cisco Security MARS – ident: ref34 doi: 10.17487/rfc1321 – ident: ref33 doi: 10.1109/NCM.2008.259 – year: 2006 ident: ref18 publication-title: Network-Aware Multimedia Processing and Communications – year: 0 ident: ref22 article-title: Conditional access techniques for H.264/AVC and H.264/SVC compressed video publication-title: IEEE Trans Circuits Syst Video Technol – ident: ref13 doi: 10.1109/TMM.2003.808817 – year: 1996 ident: ref49 publication-title: One-Way Transmission Time – ident: ref4 doi: 10.1109/TIP.2006.873426 – ident: ref1 doi: 10.1109/TCSVT.2003.815168 – ident: ref25 doi: 10.1016/j.jvcir.2011.02.005 – ident: ref48 doi: 10.1109/TIT.2004.824921 – start-page: 446 year: 2009 ident: ref21 article-title: Format-compliant encryption of H.264/AVC and SVC publication-title: Proc 10th IEEE Int Symp Multimedia – ident: ref42 doi: 10.17487/rfc3830 – start-page: 1 year: 2007 ident: ref31 article-title: A selective video encryption for the region of interest in scalable video coding publication-title: Proc IEEE Region 10 Conf – ident: ref40 doi: 10.1016/0020-0190(78)90024-8 – start-page: 496 year: 2008 ident: ref26 article-title: NAL level encryption for scalable video coding publication-title: Proc PCM – ident: ref9 doi: 10.7763/IJCEE.2010.V2.141 – ident: ref32 doi: 10.1587/transinf.E92.D.851 – ident: ref12 doi: 10.1109/TCE.2003.1261218 – ident: ref3 doi: 10.1109/TCSVT.2007.905532 – ident: ref46 doi: 10.1117/12.571869 – ident: ref50 doi: 10.1109/JPROC.2004.839623 – year: 2005 ident: ref7 publication-title: Multimedia Encryption and Watermarking – start-page: 454 year: 2004 ident: ref38 article-title: The H.264/AVC advanced video coding standard: Overview and introduction to the fidelity range extensions publication-title: Proc 27th SPIE Conf Applicat Digital Image Process – ident: ref35 doi: 10.17487/rfc2104 – ident: ref39 doi: 10.1109/TCSVT.2003.815173 – volume: 30 start-page: 3 year: 2000 ident: ref44 article-title: Dispelling the myths of cryptography publication-title: Database-and-Network-Journal – ident: ref15 doi: 10.1093/ietfec/e91-a.1.12 – ident: ref2 doi: 10.1109/MCAS.2004.1286980 – start-page: 79 year: 2010 ident: ref45 publication-title: The CrypTool Script Cryptography Mathematics and More – ident: ref19 doi: 10.1109/ICASSP.2001.940394 – ident: ref27 doi: 10.1109/CISP.2009.5302934 – year: 2001 ident: ref43 publication-title: Federal Information Processing Standards Publication 197 – start-page: 620 year: 2003 ident: ref24 article-title: Efficient and fully scalable encryption for MPEG-4 FGS publication-title: Proc IEEE Int Symp Circuits Syst – ident: ref17 doi: 10.1109/JPROC.2004.839611 – ident: ref6 doi: 10.1145/1161366.1161402 – ident: ref51 doi: 10.1109/ICIP.2006.312886 – ident: ref37 doi: 10.1155/2007/79048 – ident: ref20 doi: 10.1109/ICIP.2001.959047 – ident: ref41 doi: 10.1049/PBTE054E – ident: ref23 doi: 10.1016/j.sigpro.2010.10.012 – year: 1995 ident: ref36 publication-title: Computer System and Network Security – ident: ref28 doi: 10.1016/j.image.2010.03.005 – volume: lncs 4283 start-page: 407 year: 2006 ident: ref30 article-title: Scalable protection and access control in full scalable video coding publication-title: Proc 5th Int Workshop Digital Watermarking doi: 10.1007/11922841_33 – volume: 27 start-page: 257 year: 2004 ident: ref29 article-title: Selective video stream encryption algorithm based on chaos publication-title: Chin J Comput – ident: ref5 doi: 10.1109/TSP.2005.855418 – ident: ref11 doi: 10.1109/TCE.2002.1010141 – ident: ref10 doi: 10.1109/LSP.2005.851261 – volume: 15 year: 2005 ident: ref8 publication-title: Advances in Information Security series – ident: ref52 doi: 10.1155/2008/179290 |
| SSID | ssj0014847 |
| Score | 2.2451384 |
| Snippet | The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we... |
| SourceID | pascalfrancis crossref ieee |
| SourceType | Index Database Enrichment Source Publisher |
| StartPage | 425 |
| SubjectTerms | Access methods and protocols, osi model AES-CFB algorithm Applied sciences Circuit properties Coding, codes context adaptive binary arithmetic coding (CABAC) Electric, optical and optoelectronic circuits Electronic circuits Electronics Encoding Encryption Exact sciences and technology H.264/scalable video coding (SVC) Image processing Information, signal and communications theory key management multimedia internet keying protocol (MIKEY) Protocols security system Signal and communications theory Signal convertors Signal processing Static VAr compensators Syntactics Telecommunications Telecommunications and information theory Teleprocessing networks. Isdn |
| Title | An Efficient Security System for CABAC Bin-Strings of H.264/SVC |
| URI | https://ieeexplore.ieee.org/document/6218177 |
| Volume | 23 |
| WOSCitedRecordID | wos000317392600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2205 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014847 issn: 1051-8215 databaseCode: RIE dateStart: 19910101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La8JAEB6s9NAe-rKl9iF76K2NZtckm5yKBsVDkYJWvIXsZhaEEouP_v7ubmJQKIXeAtlJwre7zEx25vsAnlzFmVCudHT2wR29KHwn4kJvd9-jUjDpp1YzcvbGx-NwPo_ea_BS9cIgoi0-w7a5tGf52VJuza-yTmD8EedHcMR5UPRqVScGXmjFxHS4QPV7qb9rkHGjzjSezKamiou1GTN8KPTACVlVFVMTma41LKrQs9hzMsPz_33eBZyVwSTpFbN_CTXMr-B0j2KwAa-9nAwsTYS2JZNSrY4UROVER6wk7vV7MekvcmeyMTZrslRk1NYhTGcyi6_hYziYxiOnFE1wJIv4xkGKgaTaBWE3zBhXHL1AhoHODETKlaKBEogsVKlwRSQM3Z8S1GxthUqyTHRvoJ4vc7wForIs81PPRxOlIOumoUxdPRj1U10qVRPoDsVEloziRtjiM7GZhRslFvnEIJ-UyDfhubL5Kvg0_hzdMDBXI0uEm9A6mKzqPuNUB5g-vfvd7h5OmFWzMCVkD1DfrLb4CMfye7NYr1p2Pf0ABhrFaw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED90CuqD3-L8zINv2q3J2qZ9kq0oE-cQNsfeSpNeYCCd7MO_3yTtioIIvhWaa8svCXfX3P1-ADeu4kwoVzo6--COXhS-E3Ght7vvUSmY9FOrGTnq8X4_HI-j1zW4q3phENEWn2HDXNqz_Gwql-ZXWTMw_ojzddjwPY-5RbdWdWbghVZOTAcMVL-Z-qsWGTdqDuPBaGjquFiDMcOIQn-4IaurYqoi07kGRhWKFt_czOPe_z5wH3bLcJK0i_k_gDXMD2HnG8ngEdy3c_JgiSK0LRmUenWkoConOmYlcbvTjklnkjuDhbGZk6ki3YYOYpqDUXwMb48Pw7jrlLIJjmQRXzhIMZBUOyFshRnjiqMXyDDQuYFIuVI0UAKRhSoVroiEIfxTgprNrVBJlonWCdTyaY6nQFSWZX7q-WjiFGStNJSpqwejfqpLpaoDXaGYyJJT3EhbvCc2t3CjxCKfGOSTEvk63FY2HwWjxp-jjwzM1cgS4Tpc_Zis6j7jVIeYPj373e4atrrDl17Se-o_n8M2s9oWpqDsAmqL2RIvYVN-Libz2ZVdW193-Miy |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Efficient+Security+System+for+CABAC+Bin-Strings+of+H.264%2FSVC&rft.jtitle=IEEE+transactions+on+circuits+and+systems+for+video+technology&rft.au=Asghar%2C+Mamoona+Naveed&rft.au=Ghanbari%2C+Mohammad&rft.date=2013-03-01&rft.issn=1051-8215&rft.eissn=1558-2205&rft.volume=23&rft.issue=3&rft.spage=425&rft.epage=437&rft_id=info:doi/10.1109%2FTCSVT.2012.2204941&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCSVT_2012_2204941 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1051-8215&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1051-8215&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1051-8215&client=summon |