2009 Picture Coding Symposium 2009
DOI: 10.1109/pcs.2009.5167429
|View full text |Cite
|
Sign up to set email alerts
|

A novel H.264 SVC encryption scheme for secure bit-rate transcoding

Abstract: This paper presents a novel architecture for the secure delivery of encrypted H.264 SVC bitstreams. It relies on a block cipher and stream cipher used in a novel way that would allow an intermediary transcoder to truncate the bitstream to the appropriate bit-rate without decrypting the data. The system, called SVC-sec, is compared to other architectures presented in the literature and it is shown that SVC-sec offers many benefits, particularly when used with FGS streams.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…The following approaches have been proposed for SVC encryption [3], [5], [19], [65], which all preserve the NALU structure and encrypt almost all of the NALU payload. As the NALU structure is preserved, scalability is preserved in the encrypted domain.…”
Section: ) Compression [Integrated Encryption]mentioning
confidence: 99%
“…The following approaches have been proposed for SVC encryption [3], [5], [19], [65], which all preserve the NALU structure and encrypt almost all of the NALU payload. As the NALU structure is preserved, scalability is preserved in the encrypted domain.…”
Section: ) Compression [Integrated Encryption]mentioning
confidence: 99%
“…The encryption and watermarking approaches discussed in this paper for H.264/AVC can be readily extended to SVC (similar to e.g. in [28]). …”
Section: Transcoding: Classificationmentioning
confidence: 99%
“…To maintain the independency of each encrypted NAL unit, a unique Initialization Vector (IV) is determined for each NAL unit. Going against this norm, the video encryption architecture discussed in [14] derives the IV from a previously encrypted NAL unit. In this way, a dependency is created between encrypted NAL units.…”
Section: B Content Protection For Adaptationmentioning
confidence: 99%