4 research outputs found

    Puzzle -A Novel Video Encryption Algorithm

    Get PDF
    Abstract. Networked multimedia applications have matured in recent years to be deployed in a larger scale in the Internet. Confidentiality is one of the primary concerns of these services for their commercial usages, e.g. in video on demand services or in video conferences. In particular, video encryption algorithms are strongly required that fulfill real-time requirements. In this paper we present the video encryption algorithm Puzzle to encrypting video streams in software. It is fast enough to fulfill real-time constraints and to provide a sufficient security. Puzzle is a video compression independent algorithm which can be easily incorporated into existing multimedia systems

    Known-Plaintext Attack Against a Permutation Based Video

    Get PDF
    One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack

    Adaptive Data Security System And Method

    Get PDF
    A system and method for data communication with adaptive security in which a send host transmits a data stream to a receive host in packets which contain an authentication data block with an authentication header and a signature block. The authentication header advantageously contains various fields including a verification type, a security algorithm, a minimum security level, a target security level, and an actual security level. The receive host adaptively performs verification of the data packets using varying security levels based in part on the availability of security operations per second (SOPS) in the receive host. Where a data stream in the receive host is delayed by a security processing bottleneck, the receive host may alter the verification type, security algorithm, or the actual security level to speed up the processing of the data stream by reducing the amount of security processing performed. The receive host further allocates the SOPS among the data streams received based on a priority assigned to each data stream.Georgia Tech Research Corporatio

    Security Enhanced MPEG Player

    No full text
    Conventional cryptography deals with the encryption and decryption of traditional textual data. The advent of networked multimedia systems will make continuous media streams, such as real time audio and video, increasingly pervasive in future computing and communications environments. It is thus important to secure networked continuous media from potential eavesdroppers. In this paper, we consider the process of real-time encryption and decryption for video streams. We implement a software-only security enhanced MPEG player. The security enhanced player implements a protection hierarchy by specializing the encryption scheme based on MPEG's coding sequences. Encryption may be performed on only I frames, I and P frames, on all I, P and B frames. Increased protection incurs more overhead as more encryption is done. Our security enhanced MPEG player incurs small average overheads in terms of achievable frame rate compared with the unmodified MPEG player, depending on the MPEG frame size, e..
    corecore