Secure Media Streaming & Secure Adaptation for Non-Scalable Video

Similar documents
Secure Scalable Streaming and Secure Transcoding with JPEG-2000

Rate-Distortion Hint Tracks for Adaptive Video Streaming

Performance of a Multiple Description Streaming Media Content Delivery Network

Unbalanced Multiple Description Video Communication Using Path Diversity

Low-Latency Wireless Video Over Networks Using Path Diversity

Compressed-Domain Video Processing and Transcoding

ERROR-ROBUST INTER/INTRA MACROBLOCK MODE SELECTION USING ISOLATED REGIONS

Module 6 STILL IMAGE COMPRESSION STANDARDS

Homogeneous Transcoding of HEVC for bit rate reduction

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University

First-order distortion estimation for efficient video streaming at moderate to high packet loss rates

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Optimal Estimation for Error Concealment in Scalable Video Coding

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014

Lecture 5: Error Resilience & Scalability

Complexity Reduced Mode Selection of H.264/AVC Intra Coding

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

ADAPTIVE JOINT H.263-CHANNEL CODING FOR MEMORYLESS BINARY CHANNELS

Robust Lossless Data Hiding. Outline

Fast Mode Decision for H.264/AVC Using Mode Prediction

Optimal Packet Scheduling for Wireless Video Streaming with Error-Prone Feedback

Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding

Recommended Readings

JPEG 2000 vs. JPEG in MPEG Encoding

Double Feedback Streaming Agent for Real-time Delivery of Media over 3G Wireless Networks

Efficient Real-Time Multicast Video Streaming Using Network Processors

Distributed Video Coding

An Efficient Mode Selection Algorithm for H.264

1480 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 5, OCTOBER 2012

Fast Decision of Block size, Prediction Mode and Intra Block for H.264 Intra Prediction EE Gaurav Hansda

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding

ESTIMATION OF THE UTILITIES OF THE NAL UNITS IN H.264/AVC SCALABLE VIDEO BITSTREAMS. Bin Zhang, Mathias Wien and Jens-Rainer Ohm

Scalable video coding with robust mode selection

Routing-aware Multiple Description Coding with Multipath Transport for Video Delivered over Mobile Ad-hoc Networks

Rate-Distortion Optimized Layered Coding with Unequal Error Protection for Robust Internet Video

SNR Scalable Transcoding for Video over Wireless Channels

Compression of VQM Features for Low Bit-Rate Video Quality Monitoring

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 9, SEPTEMBER

Video Transcoding Architectures and Techniques: An Overview. IEEE Signal Processing Magazine March 2003 Present by Chen-hsiu Huang

Advanced Video Coding: The new H.264 video compression standard

Layered Self-Identifiable and Scalable Video Codec for Delivery to Heterogeneous Receivers

Multimedia Systems Video II (Video Coding) Mahdi Amiri April 2012 Sharif University of Technology

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS

View Synthesis for Multiview Video Compression

Error Protection of Wavelet Coded Images Using Residual Source Redundancy

Efficient MPEG-2 to H.264/AVC Intra Transcoding in Transform-domain

Error Concealment Used for P-Frame on Video Stream over the Internet

Mesh Based Interpolative Coding (MBIC)

Comparison of Shaping and Buffering for Video Transmission

One-pass bitrate control for MPEG-4 Scalable Video Coding using ρ-domain

Reliable Video Communication over Lossy Packet Networks using Multiple State Encoding and Path Diversity

Laboratoire d'informatique, de Robotique et de Microélectronique de Montpellier Montpellier Cedex 5 France

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

Investigation of the GoP Structure for H.26L Video Streams

Improving Interactive Video in Wireless Networks Using Path Diversity 1

NEW CAVLC ENCODING ALGORITHM FOR LOSSLESS INTRA CODING IN H.264/AVC. Jin Heo, Seung-Hwan Kim, and Yo-Sung Ho

Unit-level Optimization for SVC Extractor

An Implementation of Multiple Region-Of-Interest Models in H.264/AVC

Digital Video Processing

Error Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet.

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)

Reduced 4x4 Block Intra Prediction Modes using Directional Similarity in H.264/AVC

Title Adaptive Lagrange Multiplier for Low Bit Rates in H.264.

Scalable Extension of HEVC 한종기

IMPROVED CONTEXT-ADAPTIVE ARITHMETIC CODING IN H.264/AVC

Cross-Layer Perceptual ARQ for H.264 Video Streaming over Wireless Networks

Objective: Introduction: To: Dr. K. R. Rao. From: Kaustubh V. Dhonsale (UTA id: ) Date: 04/24/2012

Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems

Zonal MPEG-2. Cheng-Hsiung Hsieh *, Chen-Wei Fu and Wei-Lung Hung

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC

STUDY AND IMPLEMENTATION OF VIDEO COMPRESSION STANDARDS (H.264/AVC, DIRAC)

signal-to-noise ratio (PSNR), 2

Receiver-based adaptation mechanisms for real-time media delivery. Outline

ROBUST LOW-LATENCY VOICE AND VIDEO COMMUNICATION OVER BEST-EFFORT NETWORKS

Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding

A Quantized Transform-Domain Motion Estimation Technique for H.264 Secondary SP-frames

Pattern based Residual Coding for H.264 Encoder *

A MULTIPOINT VIDEOCONFERENCE RECEIVER BASED ON MPEG-4 OBJECT VIDEO. Chih-Kai Chien, Chen-Yu Tsai, and David W. Lin

Data Hiding in Video

Development and optimization of coding algorithms for mobile 3DTV. Gerhard Tech Heribert Brust Karsten Müller Anil Aksay Done Bugdayci

TECHNIQUES STREAMING FOR IMPROVED

RECOMMENDATION ITU-R BT.1720 *

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE

Robust Video Coding. Heechan Park. Signal and Image Processing Group Computer Science Department University of Warwick. for CS403

EFFICIENT PU MODE DECISION AND MOTION ESTIMATION FOR H.264/AVC TO HEVC TRANSCODER

A Hybrid Temporal-SNR Fine-Granular Scalability for Internet Video

ON THE PERFORMANCE OF H.264/MVC OVER LOSSY IP-BASED NETWORKS

Modified SPIHT Image Coder For Wireless Communication

Delivery Context in MPEG-21

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

H.264 to MPEG-4 Transcoding Using Block Type Information

View Synthesis for Multiview Video Compression

Advances in Efficient Resource Allocation for Packet-Based Real-Time Video Transmission

Low complexity H.264 list decoder for enhanced quality real-time video over IP

Reduced Frame Quantization in Video Coding

THE H.264 ADVANCED VIDEO COMPRESSION STANDARD

Smoooth Streaming over wireless Networks Sreya Chakraborty Final Report EE-5359 under the guidance of Dr. K.R.Rao

CS 260: Seminar in Computer Science: Multimedia Networking

Error-Exploiting Video Encoder to Extend Energy/QoS Tradeoffs for Mobile Embedded Systems

Transcription:

Secure Media Streaming & Secure Adaptation for Non-Scalable Video John G. Apostolopoulos Mobile and Media Systems Laboratory HP Laboratories Palo Alto HPL-24-86 October 2, 24* E-mail: japos@hpl.hp.com secure streaming, secure transcoding, secure scalable streaming, secure video, H.264/MPEG-4 AVC Two important capabilities in media streaming are () adapting the media for the time-varying available network bandwidth and diverse client capabilities, and (2) protecting the security of the media. Providing both end-to-end security and adapting at a (potentially untrusted) sender or mid-network node or proxy can be solved via a framework called Secure Scalable Streaming (SSS) which provides the ability to transcode the content without requiring decryption. In addition, this enables secure transcoding to be performed in a R-D optimized manner. The original SSS work was performed for scalably coded media. This paper examines its potential application to non-scalable media. Specifically, we examine the problems of how to scale non-scalable H.264/MPEG-4 AVC video and how to do it securely. We first show, perhaps surprisingly, that the importance of different P-frames in a sequence can vary by two orders of magnitude. Then we propose two approaches for securely streaming and adapting encrypted H.264 video streams in an R-D optimized manner using () Secure-Media R-D Hint Tracks, and (2) Secure Scalable Packets. While we can not scale the bit rate of encrypted non-scalable H.264 to the same extent possible for scalably coded media, our method does provide some scaling capability and more importantly provides 4-8 db gain compared to conventional approaches. * Internal Accession Date Only Approved for External Publication Copyright IEEE. To be presented at and published in IEEE International Conference on Image Processing (ICIP), 24-27 October 24, Singapore

Invited paper in What is the Latest in Networked Video? special session at IEEE ICIP 24. SECURE MEDIA STREAMING & SECURE ADAPTATION FOR NON-SCALABLE VIDEO John G. Apostolopoulos Streaming Media Systems Group Hewlett-Packard Labs, Palo Alto, CA japos@hpl.hp.com ABSTRACT Two important capabilities in media streaming are () adapting the media for the time-varying available network bandwidth and diverse client capabilities, and (2) protecting the security of the media. Providing both end-to-end security and adapting at a (potentially untrusted) sender or mid-network node or proxy can be solved via a framework called Secure Scalable Streaming (SSS) which provides the ability to transcode the content without requiring decryption. In addition, this enables secure transcoding to be performed in a R-D optimized manner. The original SSS work was performed for scalably coded media. This paper examines its potential application to non-scalable media. Specifically, we examine the problems of how to scale non-scalable H.264/MPEG- 4 AVC video and how to do it securely. We first show, perhaps surprisingly, that the importance of different P-frames in a sequence can vary by two orders of magnitude. Then we propose two approaches for securely streaming and adapting encrypted H.264 video streams in an R-D optimized manner using () Secure-Media R-D Hint Tracks, and (2) Secure Scalable Packets. While we can not scale the bit rate of encrypted non-scalable H.264 to the same extent possible for scalably coded media, our method does provide some scaling capability and more importantly provides 4-8 db gain compared to conventional approaches.. INTRODUCTION Two important desired capabilities for media streaming are media transcoding or adaptation and end-to-end security, and an important challenge lies in simultaneously enabling both capabilities. For example, it is beneficial to be able to efficiently stream and adapt encrypted media content at potentially untrusted nodes without breaking the end-to-end security. This may be desirable at a potentially untrusted (or vulnerable) streaming server, as shown in Figure 2, or at a potentially untrusted mid-network node or proxy which may need to adapt the incoming media stream to match the down-stream network and client capabilities, as shown in Figure 3. To maximize the security the media should be encrypted by the content creator and decrypted by the content consumer, and everywhere in-between the media should remain in encrypted form, referred to as end-to-end security. The conventional approach for transcoding in the network poses a security threat because transcoding encrypted streams would require giving the node the key, decrypting the stream, transcoding the decrypted stream, and re-encrypting the result an unacceptable solution as it breaks the end-to-end security. The author would like to thank Susie Wee, Wai-tian Tan, and Mitchell Trott of the HP Labs Stream Team for their helpful and fun discussions. The above problem is solved via a framework referred to as Secure Scalable Streaming (SSS) [, 2], which supports end-toend delivery of encrypted media content while enabling adaptive streaming and transcoding to be performed at intermediate, possibly untrusted, nodes without requiring decryption and therefore without compromising the end-to-end security of the system. We refer to this capability as Secure Transcoding to stress that the transcoding is performed without requiring decryption and therefore preserving the end-to-end security. SSS encodes media into secure scalable packets using jointly designed scalable coding, progressive encryption, and packetization techniques. This combination allows potentially untrusted nodes to perform transcoding operations such as bitrate reduction and spatial downsampling by simply truncating or discarding packets, and without decrypting the data. Secure scalable packets have unencrypted headers that provide R-D hints such as optimal truncation points which downstream transcoders can use to perform R-D-optimized transcoding. The SSS framework can in principle be used with any scalable media coder, e.g. speech, audio, image, video. For example, SSS has been examine in the context of JPEG-2 coded images [3], and is being standardized as part of JPEG-2 Part-8 Security (JPSEC) [4] (JPSEC supports a number of security services, e.g. [5]). SSS builds on well-studied cryptographic primitives, such as Advanced Encryption Standard (AES) for encryption, and the novelty lies in using these cryptographic primitives in a different manner from how they have been used before. The prior work has largely focused on secure streaming and secure transcoding for scalably coded content. While it is evident that the SSS framework is applicable to any scalable coder, in this paper we show its applicability to non-scalable coders. This perhaps non-intuitive capability essentially results because all (lossy) media coders inherently produce compressed bits where some bits are more important than other bits. This suggests the idea of reducing the bit rate by deliberately dropping the less important bits. To examine SSS with a non-scalable coder, we consider the newest video compression standard H.264/MPEG-4 Part Advanced Video Coding (AVC). Specifically, we consider when the video is coded with an initial I-frame followed by all P-frames, and no B-frames. Since the coded video consists of all P frames, it does not suggest a natural prioritization of frames (besides for the earlier P-frames being more important than the later ones). Nonetheless, we show that we can prioritize different P-frames in a surprisingly beneficial manner. We examine two specific examples of SSS with non-scalable H.264: () the use of a Secure Media R- D Hint Track for secure adaptive streaming (an extension of [6]), and (2) the use of Secure Scalable Packets for secure mid-network adaptation [, 2]. In each case the R-D information for each frame or packet is derived and left unencrypted to enable the efficient R-

D optimized streaming and adaptation, while the coded media data is encrypted. The closest related work that we are aware of is the recent [7] where the streaming server switches between multiple encrypted copies of the same content compressed at different bit rates (multiple file switching) to adapt to the available bandwidth. However, that work is limited to multiple-stream switching and does not consider the case of adapting a single compressed and encrypted stream as discussed in [, 2, 3], nor does it consider adapting the stream at a mid-network node. 2. SSS AND NON-SCALABLE VIDEO In SSS, adaptation is performed while preserving the end-to-end security by viewing the adaptation operation as an intelligent (R-D optimized) select/discard/truncate operation. In addition to avoiding decryption, this approach has the additional benefit of requiring low-complexity. The key steps in performing secure streaming and secure transcoding or adaptation of media are:. Understand/analyze the coded media 2. Create (unencrypted) R-D information for maximizing the quality of streaming and transcoding the encrypted media 3. Encrypt media to facilitate easy access 4. Organize/packetize to enable easy access The above approach is equally applicable for encrypted or unencrypted content, where for unencrypted content the third step (encryption) is not performed. For unencrypted content it provides the benefits of low-complexity R-D optimized streaming and adaptation. Furthermore, the fact that this approach is generically applicable to both encrypted and unencrypted content can be quite useful. The R-D information may be produced during encoding, or can also be derived from pre-encoded content. Different applications require different levels of security, and in some applications it is important to consider the potential leakage of information. With SSS, the leakage is given by the unencrypted R-D information, and of course by the attributes of the encrypted data itself, e.g. encrypted packet sizes. Therefore, when designing the R-D information it may be useful to consider not only performance and size, but also limiting the potential leakage. The two basic questions for non-scalable video are: () How do we scale non-scalable video? (2) How do we do it securely? Scaling in this context corresponds to reducing the bit rate, or reducing the packet rate or frame rate. Clearly, non-scalable media can not be scaled to the same extent as scalable media. However, it is interesting to understand to what extent it can be scaled. 3. BIT RATE SCALING OF NON-SCALABLE H.264 VIDEO: NOT ALL P-FRAMES ARE EQUAL A basic property of compressed video that has been exploited over the years is that different coded frames, and associated transmission packets, may have different importance, e.g. I-frames are more important that P-frames which are more important than B-frames, where importance in our context is in terms of the total meansquared-error (MSE) distortion that is incurred if that frame is lost. This property of IPB frame coding, and also of scalable coding, is widely used to provide unequal (prioritized) treatment to the coded data and thereby provide improved performance. In particular, this property is exploited in R-D optimized streaming. H.264 currently does not provide scalablity aside from the possible use of B-frames (temporal scalability). Furthermore, many H.264 applications do not use B-frames because of latency or memory constraints. To examine the use of SSS with non-scalable H.264, we consider when the video is coded with an initial I-frame followed by all P-frames, and no B frames. It is known that different P-frames have different importance, where, for example, the later P-frames in an MPEG Group of Pictures (GOP) typically are less important then the earlier P-frames in the GOP. However, a somewhat surprising observation is that P-frames can also differ in importance by a very significant amount. This is important since many applications primarily use P-frames, with very few I-frames, no B-frames, and no scalable coding. Therefore, by identifying and exploiting the varying importance of different P-frames in a sequence we can achieve improved performance. This approach extends trivially to include I and B frames. All experiments are performed using JM 2. of the H.264/MPEG- 4 AVC video compression standard. Four standard test sequences in QCIF format are used, Carphone, Foreman, Mother & Daughter (MthrDhter), and Salesman. Each is coded at a constant quantization level for an average PSNR of about 36 db, at 3 fps, and has at least 35 frames. The first frame of each sequence is intra-coded, followed by all P-frames. Every 4 frames a slice is intra updated to improve error-resilience by reducing error propagation (as recommended in JM 2.), corresponding to an intra update period of N =4 9=36frames. Every P-frame fits within a single 5 byte packet, hence in these experiments the loss of one packet corresponds to the loss of one P-frame. Every lost frame is replaced by the last correctly received frame, and distortion is measured after decoder error concealment. We assume that the initial I-frame is always correctly received to simplify the analysis. The importance of each P-frame in each of the four sequences is shown in Figure. The total distortion that results for losing only a single isolated frame k is plotted, as the lost frame k varies from 2 to 3. The total distortion is the distortion that afflicts frame k and all subsequent frames from error propagation. It is clear from the plots that there is a significant amount of variability in the distortion that arises. The cumulative distribution function (CDF) of the distortion is also plotted for each sequence. The CDF identifies that there is a long tail, i.e. a sizable number of frames which produce considerably more distortion than the average frame. This observation is examined in more detail in Table, where various statistics are computed for each sequence. The median distortion is chosen to represent the distortion that is incurred for the loss of a typical P-frame. A very interesting observation is the relationship between the maximum and minimum distortions to the typical (median) distortion for each sequence. The importance of the various P-frames in a sequence varies by two orders of magnitude, where some packets lead to an order of magnitude more distortion than the median packet, and the median packet leads to an order of magnitude more distortion than the least important packets. This two-orders of magnitude difference in the max-to-min total distortions for P-frames within a sequence signifies that considerable gain can be achieved by identifying and exploiting the unequal importance of different P-frames and their associated packets. 3.. R-D Optimized Processing of P-frames The great diversity in importance of different P-frames can be exploited by placing the R-D information for each P-frame into

Distortion 3 x for Single Loss 4 2 2 3 x 4 5 2 3 2 2 3 2 2 3 Frame Number Empirical CDF for Distortion.5 2 3 x 4.5 5 x 4.5 2.5 2 Fig.. Total distortion that results for losing any single P-frame, as a function of the lost frame (left) and corresponding CDF (right) for (top to bottom) Carphone, Foreman, MthrDhtr, and Salesman. its packet header [, 2], or in a R-D Hint Track (RDHT) associated with the coded video (and the additional storage available may support more information and sophisticated R-D optimization techniques [6]). The prior discussion focused on the total distortion produced by a single lost/dropped packet, including the effects of all error propagation. The total distortion produced by simultaneously dropping multiple packets may be approximated as the sum of the distortions that result for losing each packet alone. This additive model for distortion ignores the important interdependencies that result from the loss of multiple packets within an intra-refresh period (e.g. a burst loss generally leads to more distortion than an equal number of isolated losses [8]). However, the additive distortion model is a reasonable first-order approximation (note that this additive model explicitly accounts for the great diversity in importance of different P-frames, in contrast to some prior additive models which assume a homogeneous model of the video). This approach also requires significantly less R-D information, which is an important consideration when placing R-D hints in each packet (but of lesser importance for R-D hints stored on a server). Furthermore, this simple model of additive distortion is generally applicable for a variety of different types of coders and types of media. Assuming the additive model for total distortion, the optimal method for selecting among packets can be determined by associ- Sequence Carphone Foreman MthDhtr Salesman Mean 2:25 5:62 :25 :28 Median :34 2:75 :5 :7 Max 25:24 93:46 :7 :67 Min :26 :28 :3 :6 Max Median Median Min Max Min 8:79 34: :27 9:69 6:22 2:56 :8 :34 6:79 427:2 24:82 :23 Table. Total distortion for losing a single packet (single P- frame). Some P-frame packets are worth an order of magnitude more than the typical (median) packet in terms of the total distortion incurred if they are lost, and some are an order of magnitude less important thus some P-frames are two orders of magnitude more important than other P-frames within the same sequence. ating for every packet j a corresponding utility measured in terms of distortion per bit, defined as j = D(j)=R(j). For example, if the total available bit rate is less than the video rate, a decision must be made as to which packets to transmit and which to drop, in order to minimize the total distortion while simultaneously satisfying the rate constraint. This problem is straightforwardedly solved by rank ordering the packets based on their utility and transmitting those with higher utility while dropping those with lower utility. 4. SECURE ADAPTIVE STREAMING USING A SECURE-MEDIA RATE-DISTORTION HINT TRACK This section proposes a technique based on a Secure-Media Rate- Distortion Hint Track (SM-RDHT), for designing and operating media streaming systems that can perform R-D optimized streaming with low complexity and while preserving the content security. As background, the popular MPEG-4 File Format (MP4) incorporates a hint track which contains information about media type, packet framing, and timing information. This MP4 hint track provides hints to the streaming system that greatly simplifies the streaming. This is because the streamer no longer needs to () understand the compressed media syntax, and (2) analyze the media data in real time for packet framing and timing information. The Secure-Media R-D Hint Track provides two important extensions of conventional MP4 hint tracks: () the R-D attributes for the media are derived and summarized in the hint track to enable low-complexity R-D optimized streaming [6], and (2) the R-D hint track is stored unencrypted (similar to the unencrypted headers in the secure scalable packets) while the media itself is encrypted. The SM-RDHT therefore enables a sender to read the unencrypted R-D hints and perform low-complexity R-D optimized streaming of the media without having knowledge of the actual media. The performance of a SM-RDHT system is shown in Figure 2, where the transmitted bit rate for the Foreman sequence is reduced below the original coded bit rate. The conventional system does not distinguish between P frames, and therefore randomly selects packets to drop, while the SM-RDHT system intelligently determines which packets to drop to maximize the quality while meeting the available bandwidth constraint. Note that non-scalable H.264 provides limited ability to scale the bit rate as compared to a scalable coder, however it is also clear that the SM-RDHT system provides dramatic improvements in quality over a conventional system when scaling is necessary.

Untrusted Server Secure R D Optimized H.264 Streaming 36 24 Predicted SM RDHT streaming 22 Measured SM RDHT streaming Protected Content Conventional streaming Storage 2 98 96 94 92 Percent BW streamed 9 Fig. 2. Goal: Enable an untrusted sender to securely stream and adapt encrypted content for the available bandwidth without knowning what the content is. Performance of secure adaptive streaming using SM-RDHT versus conventional approach. PSNR (db) 34 32 3 28 26 Secure Transcoder Bottleneck Bandwidth Encrypted Stream Unencrypted Stream PSNR (db) Transcoding H.264 in the Network 36 34 32 3 28 26 24 22 Secure R D Optimized Adaptation Conventional Adaptation 2 98 96 94 92 Percent BW streamed Fig. 3. Secure R-D optimized mid-network adaptation: a midnetwork transcoder can securely adapt across a large number of streams to satisfy an output bandwidth constraint; the diversity gain from processing across many streams is evident. 9 5. SECURE TRANSCODING AT A MID-NETWORK NODE USING SECURE SCALABLE PACKETS In this example, non-scalable H.264 video is packetized into secure scalable packets with unencrypted packet headers that provide R-D information about the importance of each packet. This information provides hints for the downstream transcoders. Preliminary investigation suggests that one byte of information in the unencrypted packet header may be sufficient, however this depends on the specific capabilities required. Mid-network transcoders read the unencrypted headers of each packet and select or discard each packet based on its importance and the network constraints. An important attribute of this approach is that the mid-network transcoder can perform R-D optimized adaptation across multiple packets of a single stream or across packets of multiple different streams. The performance of this system is illustrated in Figure 3, where a large number of streams simultaneously pass through a node with limited output bandwidth, requiring the node to transcode the streams. Some of the non-scalable H.264 video streams are encrypted and some are not (but every packet includes transcoding hints) in order to highlight that both encrypted and unencrypted streams can be processed using the same low-complexity R-D optimization techniques. To illustrate the potential benefits of diversity gain from transcoding across multiple streams we consider the following somewhat artificial experiment which nevertheless highlights the key points. This plot shows an estimated upper bound on performance (estimated using the additive model and the derived R-D information), where all four test sequences are simulated to be streamed at all possible phases relative to each other. In this manner we simulate a much larger number of test sequences than are available, or alternatively this is equivalent to streaming the four sequences and the transcoder examining the entire sec length of each sequence to determine which packets to drop. The transcoder examines all packets from all sequences within a time window and selects which packets to transmit and which to discard based on the importance of each packet and the output bandwidth constraint. This is achieved by reading the unencrypted header of each packet in the window, sorting the results (a partial sort is sufficient), and selecting/discarding based on the priority. The performance in Figure 3 is better than that in Figure 2 as is evident by the smaller drop in PSNR. This is due to the diversity gain from processing across streams. Specifically, by transcod- ing across streams we can exploit the fact that many frames of MthrDthr and Salesman are of lesser importance than those of Foreman, and hence can be preferentially dropped. Therefore, the secure transcoder is attempting to maximize the quality (minimize the total distortion) across all of the streams. 6. SUMMARY This paper examined the problem of how to efficiently stream and adapt encrypted non-scalable media, while preserving end-to-end security. We showed that the Secure Scalable Streaming framework could be applied to non-scalable H.264 coded video, by identifying and intelligently distinguishing the importance of different P-frames. Specifically, we identified over two orders of magnitude difference in the importance of P-frames within a single sequence, and an even large difference can exist between multiple sequences. We examined two techniques where the media is encrypted and associated R-D information is placed in unencrypted packet headers or in the Secure Media RDHT enabling efficient R-D optimized streaming and adaptation at the sender, or at a mid-network node or proxy, for non-scalable H.264 video. Furthermore, this approach for R-D optimized streaming and adaptation is useful for streaming both encrypted and unencrypted content. 7. REFERENCES [] S.J. Wee and J.G. Apostolopoulos, Secure scalable video streaming for wireless networks, IEEE ICASSP, May 2. [2] S.J. Wee and J.G. Apostolopoulos, Secure scalable streaming enabling transcoding without decryption, IEEE ICIP, Oct. 2. [3] S.J. Wee and J.G. Apostolopoulos, Secure scalable streaming and secure transcoding with JPEG-2, IEEE ICIP, Sept 23. [4] ISO/IEC JPEG-2 Security (JPEC) Committee Draft, April 24. [5] Z. Zhang, Q. Sun, G. Qiu, Y.Q. Shi, and Z. Ni, A unified authentication framework for JPEG2, IEEE ICME, 24. [6] J. Chakareski, J. Apostolopoulos, S. Wee, W. Tan, and B. Girod, R-D hint tracks for low complexity R-D optimized video streaming, IEEE ICME, June 24. [7] C. Venkatramani, P. Westerink, O. Verscheure, and P. Frossard, Secure media for adaptive streaming, ACM Multimedia, pp. 37 3, Nov 23. [8] Y. Liang, J. Apostolopoulos, and B. Girod, Analysis of packet loss for compressed video: Does burst-length matter?, IEEE ICASSP, April 23.