End-to-End Security for Video Distribution

András Bohó, Glenn Van Wallendael, Ann Dooms, Jan De Cock, Geert Braeckman, Peter Schelkens, Bart Preneel, Rik Van De Walle

Research output: Contribution to journalArticlepeer-review

Abstract

Content distribution applications such as digital broadcast- ing, video-on-demand services (VoD), video conferencing, surveillance and telesurgery are confronted with difficulties - besides the inevitable compression and quality challenges - with respect to intellectual property management, authenticity, privacy regulations, access control etc. Meeting such security requirements in an end-to-end video distribution scenario poses significant challenges. If the entire content is encrypted at the content creation side, the space for signal processing operations is very limited. Decryption, followed by video processing and re-encryption is also to be avoided as it is far from efficient, complicates key management and could expose the video to possible attacks. Additionally, also when the content is delivered and decrypted, the protection is gone. Watermarking can complement encryption in these scenarios by embedding a message within the content itself containing for example ownership infor- mation, unique buyer codes or content descriptions. Ideally, securing the video distribution should therefore be possible throughout the distribution chain in a flexible way allowing the encryption, watermarking and encoding/transcoding operations to commute.
This paper introduces the reader to the relevant techniques that are needed to implement such an end-to-end commutative security system for video distribution, and presents a practical solution for encryption and wa- termarking compliant with H.264/AVC and the upcoming HEVC (High Efficiency Video Coding) video coding standards. To minimize the overhead and visual impact, a practical trade-off between the security of the encryption routine, robust watermarking and transcoding possibilities is investigated. We demonstrate that our combined commutative protection system effectively scrambles video streams, achieving SSIM (Structural Similarity Index) values below 0.2 across a range of practical bit rates, while allowing robust watermarking and transcoding.
Original languageEnglish
Pages (from-to)97-107
Number of pages11
JournalIEEE Signal Processing Magazine
Volume30
Publication statusPublished - 1 Mar 2013

Keywords

  • security
  • watermarking
  • encryption
  • video adaptation
  • signal processing in the encrypted domain

Fingerprint

Dive into the research topics of 'End-to-End Security for Video Distribution'. Together they form a unique fingerprint.

Cite this