University of Illinois Chicago
Browse

Fast Encryption Techniques for Multimedia Contents

Download (3.2 MB)
thesis
posted on 2012-01-30, 00:00 authored by Fadi J. Al-Masalha
The evolution of wireless handsets from simple mobile phones to smart devices, capable of capturing multimedia information and accessing Internet, has enabled its users to share multimedia contents with other network-capable devices in the vicinity or across the Internet. However, multimedia contents may include private information that a user would share only if it is secure from sniffing and other digital attacks. The same scenario is factual for video transmission from security IP cameras as it may be open to public and many other applications unless secured. Achieving security by fully encrypting multimedia contents (using Virtual Private Networks or otherwise) is not a viable solution, particularly for mobile devices, as they run on limited battery power and employ relatively slower processors compared to their desktop counterparts. These limitations have forced the handsets manufacturers to move the security operations to other parts of the networks thus compromising scalability as well as privacy. This dissertation investigates scalable, power efficient selective encryption techniques for secure real-time streaming of multimedia contents coded using different audio and video codecs. Specifically, selective encryption techniques are proposed for RTP streams, OGG streams, G-729 coded VOIP streams, and VLC coded multimedia streams. The structural properties of codecs and network containers are exploited to identify a subset of bits in the media that are important for the decoding process. Subsequently only these subsets are encrypted to realize security of the entire bit stream. The proposed solutions do not require media decoding, and encrypt on the average less than 5% of the packet load, while still providing robust security equivalent to that of a fully encrypted bit stream. These schemes are ubiquitous to the end users and can be deployed at any node in the network without compromising privacy of the contents. The security properties of the proposed schemes are demonstrated by analyzing the computation complexity for different digital attacks on the partially encrypted streams. The results show that it will take exhaustive combinations/trials to play out the digital media in the absence of encryption key. The performance evaluation is conducted on different platforms such as desktop computers, laptops, netbooks, and handlheld smart devices to consider the effects of computation power and battery capacity. The proposed scheme is compared with full encryption schemes based on different encryption methods, including AES and Chaotic maps.

History

Advisor

Khokhar, Ashfaq

Department

Computer Science

Degree Grantor

University of Illinois at Chicago

Degree Level

  • Doctoral

Committee Member

Eriksson, Jakob Venkatakrishnan, V. N. Kshemkalyani, Ajay Chowdhury, Masud

Publisher Statement

Dissertation 2011

Language

  • en_US

Issue date

2012-01-30

Usage metrics

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC