TR-IIS-05-012    Fulltext

An Application-layer Security Control for Real-time Video Streaming

Chia-Hui Wang, Jan-Ming Ho


In the shared Internet, real-time video streaming service is now prevalent and popular. Real-time video streaming services such as video conferencing, surveillance videos and live videos may preserve privacy and commercial values. Thus, it’s very important to secure real-time video streaming services from potential eavesdropper.
However, security has been aware of inadequacy for real-time video streaming applications because it contends for lots of resources.
In this paper, we propose an effective application-level security control to protect the real-time video streaming. This method will economically transpose the data block in the sender’s buffer by a given secrete key of database through a receiver’s buffer occupancy feedback control. Authenticated receiver can restore the scrambled video data from the receiver’s buffer by the secrete key to playback the original video. However, without the secrete keys to restore the data, eavesdropper will not be able to playback the video. It’s hard to break the encryption even if eavesdropper tries to store the scrambled video data for processing later.
We evaluate the proposed scheme’s effect to the playback QoS of real-time video streaming and secure ability through theoretical analysis and some experimental data. Furthermore, this method will be applied on a test-bed of Internet video surveillance services to demonstrate the resource-saving and highly secure capabilities.

Keywords: Video Streaming Security, Secrete Key, Transposition Cipher, Feedback Control