Difference between revisions of "Security of Scalable Multimedia Streams"

From NMSL
Line 1: Line 1:
 
The demand for multimedia services has been rapidly increasing over the past few years. More and more users rely on multimedia services for many aspects of their daily lives, including work, education, and entertainment. This makes the security of delivering multimedia content of great importance. Therefore, we focus on providing source authentication and data integrity services for media stream, i.e., ensuring that streams being played by receivers are original and have not been tampered with by malicious attackers. Our especial focus is on scalable video streams, which are becoming very popular with respect to recent advances in scalable coding and the increasing heterogeneity among receiver devices.
 
The demand for multimedia services has been rapidly increasing over the past few years. More and more users rely on multimedia services for many aspects of their daily lives, including work, education, and entertainment. This makes the security of delivering multimedia content of great importance. Therefore, we focus on providing source authentication and data integrity services for media stream, i.e., ensuring that streams being played by receivers are original and have not been tampered with by malicious attackers. Our especial focus is on scalable video streams, which are becoming very popular with respect to recent advances in scalable coding and the increasing heterogeneity among receiver devices.
  
The typical approach for authentication of messages is the use of digital signatures. Accordingly, a naive solution for authenticating a stream may be to sign every packet. This clearly does not work in practice due to its high computational cost that is not affordable especially by receiver devices with limited capabilities. In addition to the real-time nature of the streams, the next major challenge for authentication of scalable video streams is their flexibility. The video is encoded and signed once, and there can be many valid substreams extractable from one bitstream, each of which needs to be authenticated. Furthermore, the third important issue is tolerating losses that frequently take place in transmissions, especially in wireless channels. Counteracting the impact of loss in video transmission scenarios is approached by several techniques such as Forward Error Correction (FEC), interleaved packetization, etc. This impact in case of "authenticated" video gets more highlighted due to the dependency the authentication scheme imposes on video packets, i.e., a video packet and its authentication information must both be successfully received, or the video packet is unusable.
+
The typical approach for authentication of messages is the use of digital signatures. Accordingly, a naive solution for authenticating a stream may be to sign every packet. This clearly does not work in practice due to its high computational cost that is not affordable especially by receiver devices with limited capabilities. In addition to the real-time nature of the streams, a major challenge for authentication of scalable video streams is their flexibility. The video is encoded and signed once, and there can be many valid substreams extractable from one bitstream, each of which needs to be authenticated. The third important issue is tolerating losses that frequently take place in transmissions, especially in wireless channels. Counteracting the impact of loss in video transmission scenarios is approached by several techniques such as Forward Error Correction (FEC), interleaved packetization, etc. This impact in case of "authenticated" video gets more highlighted due to the dependency the authentication scheme imposes on video packets, i.e., a video packet and its authentication information must both be successfully received, or the video packet is unusable.
  
 
We are investigating the above three challenges and several other subtle issues for authentication of scalable video streams in an efficient manner, with low communication overhead, and without limiting the flexibility of the stream. We also performed systematic tamperings with scalable videos to justify our approaches. Our main focus is on the recent and well favored scalable video structure H.264/SVC.
 
We are investigating the above three challenges and several other subtle issues for authentication of scalable video streams in an efficient manner, with low communication overhead, and without limiting the flexibility of the stream. We also performed systematic tamperings with scalable videos to justify our approaches. Our main focus is on the recent and well favored scalable video structure H.264/SVC.
Line 13: Line 13:
  
  
== Code ==
+
== Resources ==
  
* Will be released soon.
+
* Sample codes and tampering results will be released soon.

Revision as of 11:28, 27 August 2008

The demand for multimedia services has been rapidly increasing over the past few years. More and more users rely on multimedia services for many aspects of their daily lives, including work, education, and entertainment. This makes the security of delivering multimedia content of great importance. Therefore, we focus on providing source authentication and data integrity services for media stream, i.e., ensuring that streams being played by receivers are original and have not been tampered with by malicious attackers. Our especial focus is on scalable video streams, which are becoming very popular with respect to recent advances in scalable coding and the increasing heterogeneity among receiver devices.

The typical approach for authentication of messages is the use of digital signatures. Accordingly, a naive solution for authenticating a stream may be to sign every packet. This clearly does not work in practice due to its high computational cost that is not affordable especially by receiver devices with limited capabilities. In addition to the real-time nature of the streams, a major challenge for authentication of scalable video streams is their flexibility. The video is encoded and signed once, and there can be many valid substreams extractable from one bitstream, each of which needs to be authenticated. The third important issue is tolerating losses that frequently take place in transmissions, especially in wireless channels. Counteracting the impact of loss in video transmission scenarios is approached by several techniques such as Forward Error Correction (FEC), interleaved packetization, etc. This impact in case of "authenticated" video gets more highlighted due to the dependency the authentication scheme imposes on video packets, i.e., a video packet and its authentication information must both be successfully received, or the video packet is unusable.

We are investigating the above three challenges and several other subtle issues for authentication of scalable video streams in an efficient manner, with low communication overhead, and without limiting the flexibility of the stream. We also performed systematic tamperings with scalable videos to justify our approaches. Our main focus is on the recent and well favored scalable video structure H.264/SVC.


People


Resources

  • Sample codes and tampering results will be released soon.