全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Secure and Reliable IPTV Multimedia Transmission Using Forward Error Correction

DOI: 10.1155/2012/720791

Full-Text   Cite this paper   Add to My Lib

Abstract:

With the wide deployment of Internet Protocol (IP) infrastructure and rapid development of digital technologies, Internet Protocol Television (IPTV) has emerged as one of the major multimedia access techniques. A general IPTV transmission system employs both encryption and forward error correction (FEC) to provide the authorized subscriber with a high-quality perceptual experience. This two-layer processing, however, complicates the system design in terms of computational cost and management cost. In this paper, we propose a novel FEC scheme to ensure the secure and reliable transmission for IPTV multimedia content and services. The proposed secure FEC utilizes the characteristics of FEC including the FEC-encoded redundancies and the limitation of error correction capacity to protect the multimedia packets against the malicious attacks and data transmission errors/losses. Experimental results demonstrate that the proposed scheme obtains similar performance compared with the joint encryption and FEC scheme. 1. Introduction As digital technologies process, Internet Protocol Television (IPTV) has emerged in the past years to deliver high-quality multimedia services to end users over IP broadband networks. Generally, IPTV has multifaceted content such as video/audio/text/graphic/data and needs to provide the user-required quality of experience (QoE), interactivity, security, and reliability in the IP-based networks [1]. The typical IPTV applications include the cable TV-like service and video on demand (VoD). In the cable TV-like service, the service provider can provide the entertainment, news, and sports programs in a regular standard definition (SD) or further high definition (HD) format, while the VoD service supports more personal options to select their favorite multimedia content. Because the IP technology is basically the same for the IPTV and Internet applications, IPTV is likely to integrate the existing and independent services over the home network connection. Since the content delivered through IPTV is mostly of high economic value and of copyright with user’s subscription, secure and reliable transmission becomes an important issue in provisioning IPTV content and services. The basic principle of the service and content protection is to ensure that users are only able to obtain the services they are entitled to access and use the content in accordance with the right they have been granted [2, 3]. For content and service protection, the conditional access system (CAS) and digital right management (DRM) are two primary protection technologies on

References

[1]  J. Maisonneuve, M. Deschanel, J. Heiles et al., “An Overview of IPTV Standards Development,” IEEE Transactions on Broadcasting, vol. 55, no. 2, pp. 315–328, 2009.
[2]  M. Jeffrey, S. Park, K. Lee, G. Adams, and S. Savage, “Content security for IPTV,” IEEE Communications Magazine, vol. 46, no. 11, pp. 138–146, 2008.
[3]  S. O. Hwang, “Content and service protection for IPTV,” IEEE Transactions on Broadcasting, vol. 55, no. 2, pp. 425–436, 2009.
[4]  H. Zhang, C. Chen, L. Zhao, S. Yang, and L. Zhou, “Content Protection for IPTV-current state of the art and challenges,” in Proceedings of the IMACS Multiconference on Computational Engineering in Systems Applications (CESA '06), pp. 1680–1685, Beijing, China, October 2006.
[5]  M. Ellis and C. Perkins, “Packet loss characteristics of IPTV-like traffic on residential links,” in Proceedings of the 7th IEEE Consumer Communications and Networking Conference (CCNC '10), Las Vegas, Nev, USA, January 2010.
[6]  M. Cha, G. Choudhury, J. Yates, A. Shaikh, and S. Moon, “Case study: resilient backbone design for IPTV services,” in Proceedings of the International World Wide Web Conference, IPTV Workshop, 2006.
[7]  Society of Motion Picture and Television Engineers, “Forward error correction for real-time video/audio transport over IP networks,” SMPTE specification 2022-1, 2007.
[8]  Digital Video Broadcasting (DVB), “IP datacast over DVB-H: content delivery protocols,” ETSI TS 102 472.
[9]  M. A. Haleem, C. N. Mathur, R. Chandramouli, and K. P. Subbalakshmi, “Opportunistic encryption: a trade-off between security and throughput in wireless networks,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 313–324, 2007.
[10]  M. Ruiping, L. Xing, and H. E. Michel, “A new mechanism for achieving secure and reliable data transmission in wireless sensor networks,” in Proceedings of the IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability, pp. 274–279, Woburn, Mass, USA, May 2007.
[11]  A. Neri, D. Blasi, L. Gizzi, and P. Campisi, “Joint Security and Channel Coding for Ofdm Communications,” in Proceedings of the European Signal Processing Conference (EUSIPCO'08), Lausanne, Switzerland, 2008.
[12]  X. Zhu, Q. Sun, Z. Zhang, and C. W. Chen, “A joint ECC based media error and authentication protection scheme,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '08), pp. 13–16, Hannover, Germany, June 2008.
[13]  C. Nanjunda, M. A. Haleem, and R. Chandramouli, “Robust encryption for secure image transmission over wireless channels,” in Proceedings of the IEEE International Conference on Communications (ICC '05), pp. 1287–1291, Seoul, Korea, May 2005.
[14]  A. Neri, D. Blasi, P. Campisi, and E. Maiorana, “Joint authentication and forward error correction of still images,” in Proceedings of the European Signal Processing Conference (EUSIPCO'10), pp. 2111–2115, Aalborg, Denmark, August 2010.
[15]  L. Yao and L. Cao, “Turbo codes-based image transmission for channels with multiple types of distortion,” IEEE Transactions on Image Processing, vol. 17, no. 11, pp. 2112–2121, 2008.
[16]  J. Daemen and V. Rijmen, The Design of Rijndael: AES—The Advanced Encryption Standard, Springer, 2002.
[17]  H. Cam, V. Ozduran, and O. N. Ucan, “A combined encryption and error correction scheme: AES-turbo,” Journal of Electrical and Electronics Engineering, vol. 9, no. 1, pp. 891–896, 2009.
[18]  N. Zivic, “On using the message digest for error correction in wireless communication networks,” in Proceedings of the International Workshop on Wireless Distributed Networks, Istanbul, Turkey, September 2010.
[19]  N. Zivic and C. Ruland, “Parallel joint channel coding and cryptography,” International Journal of Computer Science and Engineering, vol. 4, pp. 140–144, 2008.
[20]  L. Rizzo, “Effective erasure codes for reliable computer communication protocols,” ACM SIGCOMM Computer Communication Review, vol. 27, no. 2, pp. 24–36, 1997.
[21]  F. Borgonovo and A. Capone, “Efficiency of error-control schemes for real-time wireless applications on the Gilbert channel,” IEEE Transactions on Vehicular Technology, vol. 54, no. 1, pp. 246–258, 2005.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133