skip to main content
research-article

Privacy-preserving Secure Media Streaming for Multi-user Smart Environments

Authors Info & Claims
Published:22 October 2021Publication History
Skip Abstract Section

Abstract

Over the last years, our lifestyle has been positively upset by the sudden advent of technology. The Internet of Things (IoT), offering universal and ubiquitous connectivity to both people and objects, revealed to be the silver bullet for enabling a vast number of previously unexpected applications. In particular, media streaming providers are growing in business and scope, and we can forecast that soon, video streaming will substitute TV broadcasting activities. With the increasing success of multi-user smart environments, empowered by new-generation smart devices and IoT architectures, multimedia contents (i.e., images and videos) need to be effectively accessed anytime and anywhere. Recent advances in computer vision technologies have made the development of intelligent monitoring systems for video surveillance and ambient-assisted living. Such a scenario permits better integration among technologies, multimedia content, and end-users. However, there are several challenges, and some are still open. More precisely, due to the sensitivity of some multimedia content (e.g., video-surveillance streams), it is paramount to preserve users’ privacy. Again, it is necessary to guarantee the integrity of usage rights during any multimedia transmission process, starting from the video encoding phase. In this way, the private content is disclosed only when the stream is decoded on the other endpoint, by the legitimate user.

In this article, we present a secure video transmission strategy that can address the challenges mentioned above. The proposed strategy takes advantage of both watermarking and video scrambling techniques to make it possible for the secure and privacy-preserving transmission of multimedia streaming. Through our proposal, multimedia streaming is of low quality and thus unusable. However, it can be fully recovered and enjoyed only by authorized users. Finally, due to its low complexity and energy-efficiency, our proposal is particularly suitable for onboard implementations.

REFERENCES

  1. [1] Ahuja Rakesh and Bedi Sarabjeet Singh. 2019. Video watermarking scheme based on IDR frames using MPEG-2 structure. Int. J. Info. Comput. Secur. 11, 6 (2019), 585603.Google ScholarGoogle Scholar
  2. [2] Bonetto Margherita, Korshunov Pavel, Ramponi Giovanni, and Ebrahimi Touradj. 2015. Privacy in mini-drone-based video surveillance. In Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG’15), Vol. 4. IEEE, 16.Google ScholarGoogle Scholar
  3. [3] Carpentieri Bruno, Castiglione Arcangelo, Santis Alfredo De, Palmieri Francesco, and Pizzolante Raffaele. 2019. One-pass lossless data hiding and compression of remote sensing data. Future Gen. Comput. Syst. 90 (2019), 222239.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Carpentieri B., Castiglione A., Santis A. De, Palmieri F., and Pizzolante R.. 2020. Compression-based steganography. Concurr. Comput.: Pract. Exper. 32, 8 (2020), e5322.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Carpentieri Bruno, Castiglione Arcangelo, Santis Alfredo De, Palmieri Francesco, Pizzolante Raffaele, and Xing Xiaofei. 2020. Securing visual search queries in ubiquitous scenarios empowered by smart personal devices. Info. Sci. 508 (2020), 393404.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Castiglione Arcangelo, Pizzolante Raffaele, Palmieri Francesco, Masucci Barbara, Carpentieri Bruno, Santis Alfredo De, and Castiglione Aniello. 2017. On-board format-independent security of functional magnetic resonance images. ACM Trans. Embed. Comput. Syst. 16, 2 (2017), 56.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Chai Xiuli, Zheng Xiaoyu, Gan Zhihua, Han Daojun, and Chen Yiran. 2018. An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 148 (2018), 124144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Cox Ingemar J., Kilian Joe, Leighton F. Thomson, and Shamoon Talal. 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 12 (1997), 16731687.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Culjak Ivan, Abram David, Pribanic Tomislav, Dzapo Hrvoje, and Cifrek Mario. 2012. A brief introduction to OpenCV. In Proceedings of the 35th International Convention MIPRO. IEEE, 17251730.Google ScholarGoogle Scholar
  10. [10] Fogg Chad, LeGall Didier J., Mitchell Joan L., and Pennebaker William B.. 2007. MPEG Video Compression Standard. Springer Science & Business Media, Boston.Google ScholarGoogle Scholar
  11. [11] Hartung Frank and Girod Bernd. 1998. Watermarking of uncompressed and compressed video. Signal Process. 66, 3 (1998), 283301.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Hosny Khalid M. and Darwish Mohamed M.. 2019. Resilient color image watermarking using accurate quaternion radial substituted chebyshev moments. ACM Trans. Multimedia Comput. Commun. Appl. 15, 2 (2019), 46.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Hossain M. Shamim, Muhammad Ghulam, Abdul Wadood, Song Biao, and Gupta Brij B.. 2018. Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gen. Comput. Syst. 83 (2018), 596606.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Hua Zhongyun, Yi Shuang, and Zhou Yicong. 2018. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144 (2018), 134144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Hung Andy C.. 1993. Pvrg-jpeg Codec 1.1. Technical Report. Portable Video Research Group, Stanford University.Google ScholarGoogle Scholar
  16. [16] Gopal D. M. M. Kesavan. 2010. Watermarking of digital video stream for source authentication. IJCSI Int. J. Comput. Sci. 7, 4 (2010), 7.Google ScholarGoogle Scholar
  17. [17] Gall Didier J. Le. 1991. The MPEG video compression standard. In Compcon Spring’91 Digest of Papers. IEEE, 334335.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Li Chengqing, Lin Dongdong, and Lü Jinhu. 2017. Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE MultiMedia 24, 3 (2017), 6471.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Mansouri Azadeh and Mahmoudi-Aznaveh Ahmad. 2019. Toward a secure video watermarking in compressed domain. J. Info. Secur. Appl. 48 (2019), 102370.Google ScholarGoogle Scholar
  20. [20] Mareen Hannes, Praeter Johan De, Wallendael Glenn Van, and Lambert Peter. 2018. A scalable architecture for uncompressed-domain watermarked videos. IEEE Trans. Info. Forensics Secur. 14, 6 (2018), 14321444.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Padilla-López José Ramón, Chaaraoui Alexandros Andre, and Flórez-Revuelta Francisco. 2015. Visual privacy protection methods: A survey. Expert Syst. Appl. 42, 9 (2015), 41774195.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Pizzolante Raffaele and Carpentieri Bruno. 2012. Copyright protection for images on mobile devices. In Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, IEEE, Palermo, Italy, 585590.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Pizzolante Raffaele, Carpentieri Bruno, and Castiglione Arcangelo. 2013. A secure low complexity approach for compression and transmission of 3-D medical images. In Proceedings of the 8th International Conference on Broadband and Wireless Computing, Communication and Applications. IEEE, 387392.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Pizzolante Raffaele, Castiglione Arcangelo, Carpentieri Bruno, Santis Alfredo De, and Castiglione Aniello. 2014. Protection of microscopy images through digital watermarking techniques. In 2014 International Conference on Intelligent Networking and Collaborative Systems. IEEE, 6572.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Pizzolante Raffaele, Castiglione Arcangelo, Carpentieri Bruno, Santis Alfredo De, Palmieri Francesco, and Castiglione Aniello. 2018. On the protection of consumer genomic data in the Internet of Living Things. Comput. Secur. 74 (2018), 384400.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Sakr Ziad and Georganas Nicolas D.. 2007. Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location. ACM Trans. Multimedia Comput. Commun. Appl. 3, 3 (2007), 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Sarwar Omair, Rinner Bernhard, and Cavallaro Andrea. 2016. Design space exploration for adaptive privacy protection in airborne images. In Proceedings of the 13th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS’16). IEEE, 159165.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Sikora Thomas. 2018. MPEG digital video coding standards. In Compressed Video over Networks. CRC Press, 4588.Google ScholarGoogle Scholar
  29. [29] Tian Lihua, Dai Hangtao, and Li Chen. 2020. A semi-fragile video watermarking algorithm based on chromatic residual DCT. Multimedia Tools Appl. 79, 3 (2020), 17591779.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Yang Hong-Ying, Wang Xiang-Yang, Niu Pan-Pan, and Wang Ai-Long. 2015. Robust color image watermarking using geometric invariant quaternion polar harmonic transform. ACM Trans. Multimedia Comput. Commun. Appl. 11, 3 (2015), 40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Ye Guodong. 2010. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31, 5 (2010), 347354.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Yeung Minerva M.. 1998. Digital watermarking: Marking the valuable while probing the invisible. Commun. ACM 41, 7 (1998), 3135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Zhu Congxu, Wang Guojun, and Sun Kehui. 2018. Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos-based S-box. Symmetry 10, 9 (2018), 399.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy-preserving Secure Media Streaming for Multi-user Smart Environments

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Internet Technology
          ACM Transactions on Internet Technology  Volume 22, Issue 2
          May 2022
          582 pages
          ISSN:1533-5399
          EISSN:1557-6051
          DOI:10.1145/3490674
          • Editor:
          • Ling Liu
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 October 2021
          • Accepted: 1 September 2020
          • Revised: 1 August 2020
          • Received: 1 June 2020
          Published in toit Volume 22, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!