A quality adaptable multilayer video content protection scheme

Author(s):  
Wei-Bin Lee ◽  
Ming-Yi Liu ◽  
Jia-Hong Li
2011 ◽  
Vol 403-408 ◽  
pp. 3847-3853 ◽  
Author(s):  
Jay M. Joshi ◽  
Kiran R. Parmar ◽  
Upena D. Dalal

Three technologies can be used for content protection in DVB-H; IPSec, SRTP and ISMACryp. ISMA Encryption and Authentication is one of the three chosen technologies for service protection in DVB-H (Digital Video Broadcasting - Handheld), the TV system for portable handheld devices. This paper deals with modification in ISMACryp. The ISMACryp is encoded with MPEG-4 video and MPEG-4 AAC (advanced audio coding), while leaving all structural data as it is. Two modes of ISMACryp are available; the CTR mode (Counter type) and CBC mode (Cipher Block Chaining) mode. Both modes of ISMACryp is based on 128-bit AES algorithm. AES algorithms are more complex and require larger time with more clock cycles for execution. This paper is being first simulate and implement existing ISMACryp using 128-bit Rijndael algorithm and then modified it with KASUMI algorithm that will be provided lower number of clock pulses with lower execution time. The simulation is done in Matlab and implementation in TMS320C6713 DSP kit.


2005 ◽  
Vol 93 (1) ◽  
pp. 171-183 ◽  
Author(s):  
E.I. Lin ◽  
A.M. Eskicioglu ◽  
R.L. Lagendijk ◽  
E.J. Delp

Author(s):  
Shiguo Lian

The principal concern of this chapter is to provide those in the multimedia or content protection community with an overview of multimedia content encryption technology. Multimedia (image, audio, or video) content encryption technologies are reviewed, from the background, brief history, performance requirement, to research progress. Additionally, the general encryption algorithms are classified, and their performances are analyzed and compared. Furthermore, some special encryption algorithms are introduced. Finally, some open issues and potential research topics are presented, followed by some conclusions. The author hopes that the chapter will not only inform researchers of the progress of multimedia content encryption, but also guide the design of practical applications in the industry field.


Sign in / Sign up

Export Citation Format

Share Document