Optimized Authentication, Transmission and Access Control Schemes for Multimedia
Chang Wen Chen,Xinglei Zhu
2013-01-01
Abstract:Multimedia applications have been exploding with the development of various media source coding standards, channel coding techniques, cross-layer techniques and recent advances of social media networks. The popularity and diversity of multimedia applications invokes new challenges in delivering the media content to users. This thesis addresses several essential challenges in multimedia communication, including transmission, authentication and access control issues for multimedia applications. With the popularity of wireless network and mobile devices, in many multimedia applications it is common to deliver the multimedia content to various users with heterogeneous network bandwidth and media consumption environments, aspects of which include display size, computation capacity etc. It is desired that each user can consume media content compatible with its heterogeneous environment to achieve optimal quality of service. Because of the special characteristics of multimedia content such as the unequal importance of the encoded media slices and the special requirements of transmission over heterogeneous networks, traditional data based broadcasting and multicasting schemes are no longer capable to address these emerging challenges. In another aspect, the security issues in media communication are becoming increasingly important, especially on wireless networks, where it is less expensive for malicious intruders to manipulate the media content, because of special features of wireless networks such as limited bandwidth, time-varying error prone channel status and open-to-air access mode. In this paper, by security, we mean authentication of the multimedia content to prevent malicious attacks on multimedia content and access control to prevent illegal access of multimedia content. There is a pressing need to develop efficient media security schemes along with multimedia transmission schemes so that the multimedia communication is not impaired by malicious attacks or unauthorized access. This thesis consists of three studies. In the first study, we present a joint designed transmission-authentication system named Joint Media Error and Authenticity Protection (JMEAP) that is able to achieve both reliable and secure transmission of media content over heterogeneous networks. We jointly consider the three major components of the media transmission system: media source coding, error protection channel coding and media authentication in the system. With a prior knowledge of these components, we can fully utilize the inherent correlation between them and achieve optimal rate allocation between these components. We have studied the characteristics of JPEG2000 encoded image and H.264/AVC video clips and applied the framework on these multimedia formats. In the second study, we present a study on a network coding based multirate multicasting scheme that is capable of delivering layered encoded multimedia content to various users using network coding. We propose an efficient forward-backward protocol for the nodes in the transmission system to efficiently collaborate with each other to deliver proper network coded packets to receivers to achieve near optimal performance. In the third study, we present a collusion resilient access control scheme for multi-dimension scalable multimedia. The access control scheme consists of two components, a multiple dimensional key generation scheme and an attribute-based key distribution scheme. The multimedia content can be scalable encoded single format media such as a H.264/SVC encoded video stream or a mixture of several possible scalable media formats, such as webpage content or the social media content. Based on the theory of partial ordered set (poset), we have built an efficient key generation scheme to reduce the number of keys to deliver to users, while following the key derivation requirements for scalable encoded multimedia. Based on attribute property based encryption, we have built a collusion resistant key distribution scheme to deliver the user key to various users.