Abstract
Over the last years, our lifestyle has been positively upset by the sudden advent of technology. The Internet of Things (IoT), offering universal and ubiquitous connectivity to both people and objects, revealed to be the silver bullet for enabling a vast number of previously unexpected applications. In particular, media streaming providers are growing in business and scope, and we can forecast that soon, video streaming will substitute TV broadcasting activities. With the increasing success of multi-user smart environments, empowered by new-generation smart devices and IoT architectures, multimedia contents (i.e., images and videos) need to be effectively accessed anytime and anywhere. Recent advances in computer vision technologies have made the development of intelligent monitoring systems for video surveillance and ambient-assisted living. Such a scenario permits better integration among technologies, multimedia content, and end-users. However, there are several challenges, and some are still open. More precisely, due to the sensitivity of some multimedia content (e.g., video-surveillance streams), it is paramount to preserve users’ privacy. Again, it is necessary to guarantee the integrity of usage rights during any multimedia transmission process, starting from the video encoding phase. In this way, the private content is disclosed only when the stream is decoded on the other endpoint, by the legitimate user.
In this article, we present a secure video transmission strategy that can address the challenges mentioned above. The proposed strategy takes advantage of both watermarking and video scrambling techniques to make it possible for the secure and privacy-preserving transmission of multimedia streaming. Through our proposal, multimedia streaming is of low quality and thus unusable. However, it can be fully recovered and enjoyed only by authorized users. Finally, due to its low complexity and energy-efficiency, our proposal is particularly suitable for onboard implementations.
- [1] . 2019. Video watermarking scheme based on IDR frames using MPEG-2 structure. Int. J. Info. Comput. Secur. 11, 6 (2019), 585–603.Google Scholar
- [2] . 2015. Privacy in mini-drone-based video surveillance. In Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition
(FG’15) , Vol. 4. IEEE, 1–6.Google Scholar - [3] . 2019. One-pass lossless data hiding and compression of remote sensing data. Future Gen. Comput. Syst. 90 (2019), 222–239.Google Scholar
Cross Ref
- [4] . 2020. Compression-based steganography. Concurr. Comput.: Pract. Exper. 32, 8 (2020), e5322.Google Scholar
Cross Ref
- [5] . 2020. Securing visual search queries in ubiquitous scenarios empowered by smart personal devices. Info. Sci. 508 (2020), 393–404.Google Scholar
Cross Ref
- [6] . 2017. On-board format-independent security of functional magnetic resonance images. ACM Trans. Embed. Comput. Syst. 16, 2 (2017), 56.Google Scholar
Digital Library
- [7] . 2018. An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 148 (2018), 124–144.Google Scholar
Digital Library
- [8] . 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 12 (1997), 1673–1687.Google Scholar
Digital Library
- [9] . 2012. A brief introduction to OpenCV. In Proceedings of the 35th International Convention MIPRO. IEEE, 1725–1730.Google Scholar
- [10] . 2007. MPEG Video Compression Standard. Springer Science & Business Media, Boston.Google Scholar
- [11] . 1998. Watermarking of uncompressed and compressed video. Signal Process. 66, 3 (1998), 283–301.Google Scholar
Digital Library
- [12] . 2019. Resilient color image watermarking using accurate quaternion radial substituted chebyshev moments. ACM Trans. Multimedia Comput. Commun. Appl. 15, 2 (2019), 46.Google Scholar
Digital Library
- [13] . 2018. Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gen. Comput. Syst. 83 (2018), 596–606.Google Scholar
Digital Library
- [14] . 2018. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144 (2018), 134–144.Google Scholar
Digital Library
- [15] . 1993. Pvrg-jpeg Codec 1.1.
Technical Report . Portable Video Research Group, Stanford University.Google Scholar - [16] . 2010. Watermarking of digital video stream for source authentication. IJCSI Int. J. Comput. Sci. 7, 4 (2010), 7.Google Scholar
- [17] . 1991. The MPEG video compression standard. In Compcon Spring’91 Digest of Papers. IEEE, 334–335.Google Scholar
Cross Ref
- [18] . 2017. Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE MultiMedia 24, 3 (2017), 64–71.Google Scholar
Digital Library
- [19] . 2019. Toward a secure video watermarking in compressed domain. J. Info. Secur. Appl. 48 (2019), 102370.Google Scholar
- [20] . 2018. A scalable architecture for uncompressed-domain watermarked videos. IEEE Trans. Info. Forensics Secur. 14, 6 (2018), 1432–1444.Google Scholar
Cross Ref
- [21] . 2015. Visual privacy protection methods: A survey. Expert Syst. Appl. 42, 9 (2015), 4177–4195.Google Scholar
Digital Library
- [22] . 2012. Copyright protection for images on mobile devices. In Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, IEEE, Palermo, Italy, 585–590.Google Scholar
Digital Library
- [23] . 2013. A secure low complexity approach for compression and transmission of 3-D medical images. In Proceedings of the 8th International Conference on Broadband and Wireless Computing, Communication and Applications. IEEE, 387–392.Google Scholar
Digital Library
- [24] . 2014. Protection of microscopy images through digital watermarking techniques. In 2014 International Conference on Intelligent Networking and Collaborative Systems. IEEE, 65–72.Google Scholar
Digital Library
- [25] . 2018. On the protection of consumer genomic data in the Internet of Living Things. Comput. Secur. 74 (2018), 384–400.Google Scholar
Digital Library
- [26] . 2007. Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location. ACM Trans. Multimedia Comput. Commun. Appl. 3, 3 (2007), 18.Google Scholar
Digital Library
- [27] . 2016. Design space exploration for adaptive privacy protection in airborne images. In Proceedings of the 13th IEEE International Conference on Advanced Video and Signal Based Surveillance
(AVSS’16) . IEEE, 159–165.Google ScholarCross Ref
- [28] . 2018. MPEG digital video coding standards. In Compressed Video over Networks. CRC Press, 45–88.Google Scholar
- [29] . 2020. A semi-fragile video watermarking algorithm based on chromatic residual DCT. Multimedia Tools Appl. 79, 3 (2020), 1759–1779.Google Scholar
Cross Ref
- [30] . 2015. Robust color image watermarking using geometric invariant quaternion polar harmonic transform. ACM Trans. Multimedia Comput. Commun. Appl. 11, 3 (2015), 40.Google Scholar
Digital Library
- [31] . 2010. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31, 5 (2010), 347–354.Google Scholar
Digital Library
- [32] . 1998. Digital watermarking: Marking the valuable while probing the invisible. Commun. ACM 41, 7 (1998), 31–35.Google Scholar
Digital Library
- [33] . 2018. Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos-based S-box. Symmetry 10, 9 (2018), 399.Google Scholar
Cross Ref
Index Terms
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments
Recommendations
Challenges for User Centered Smart Environments
Proceedings of the 13th International Conference on Human-Computer Interaction. Part III: Ubiquitous and Intelligent InteractionFuture smart environments integrate information on persons, ambient resources and objects. Many rich visions of smart environments have been developed, and current technological and market developments promise to bring aspects of these visions of into ...
Challenges to ensuring human safety throughout the life-cycle of Smart Environments
SafeThings'17: Proceedings of the 1st ACM Workshop on the Internet of Safe ThingsThe homes, offices, and vehicles of tomorrow will be embedded with numerous "Smart Things," networked with each other and with the Internet. Many of these Things are embedded in the physical infrastructure, and like the infrastructure they are designed ...
Preserving User Privacy in Pervasive Environments with a Collaborative Model
SERE-C '13: Proceedings of the 2013 IEEE Seventh International Conference on Software Security and Reliability CompanionPrivacy is the most often cited criticism of context awareness in pervasive environments. Context aware pervasive applications have the vulnerabilities of capturing extensive portions of users' activities. Whether such data capture is an actual threat ...






Comments