INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.8, No.4, Apr. 2016

Low Complexity Multimedia Encryption

Full Text (PDF, 1166KB), PP.1-13


Views:62   Downloads:0

Author(s)

Karthik. Thiyagarajan, Kamal El-Sankary, Yongsheng Wang, Issam Hammad

Index Terms

Selective Encryption;Energy Critical Multimedia Devices;Scene Transition Detection;Intra Prediction Modes;Nonzero DCT Coefficients;Motion Vectors;Computational Cost;H.264/AVC

Abstract

Selective encryption algorithms have been proposed to encrypt syntax elements such as intra prediction modes, the sign bit of nonzero DCT coefficients, along with the sign bit of motion vectors. These syntax elements are sensitive enough to produce effective scrambling effect with a relative low computational cost. In this paper, a novel scheme is proposed to further optimize the computational overhead incurred by the encryption for energy critical multimedia applications. The proposed scheme adjusts the selection of syntax elements to be encrypted according to the scene transitions within adjacent video frames. The ratio of intra-coded macroblocks in inter (P and B) frames is calculated and compared with an adaptive threshold value to detect the scene transitions. Furthermore, based on statistical analysis for a few video sequences, a dynamic threshold model to detect the scene transition is proposed. When there is a scene transition between the previous video frame and the current video frame, intra prediction modes and the sign bit of DCT coefficients in the current frame are chosen as syntax elements to be encrypted, whereas in the absence of a scene transition, the sign bit of motion vectors is chosen as the only sensitive syntax elements to be encrypted. Experimental results show that compared with previous work in this field, the proposed scheme can efficiently lower the computational cost incurred by the encryption while maintaining a similar perceptual scrambling effect.

Cite This Paper

Karthik. Thiyagarajan, Kamal El-Sankary, Yongsheng Wang, Issam Hammad,"Low Complexity Multimedia Encryption", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.4, pp.1-13, 2016.DOI: 10.5815/ijcnis.2016.04.01

Reference

[1]ITU-T. Rec. (ISO/IEC 14496-10): 2010, Advanced Video Coding for Generic Audio Visual Services.

[2]Y. Shi and H. Sun, Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards. Boca Raton. FL: CRC Press, 2000.

[3]T. Stutz and A.Uhl, "A survey of H.264 AVC/SVC encryption", IEEE Trans. Circuits syst. Video techno., vol, 22, no. 3, pp. 325-339, ju. 2011.

[4]Shiguo Lian, Zhongxuan Liu, Zhen Ren and Haila Wang, "Secure Advanced Video Coding Based on Selective Encryption Algorithms," IEEE Transaction on Consumer Electronics, Vol. 52, No. 2 ,2006, pp.621-629, 2006.

[5]Yongsheng Wang, Maire O'Neill, Fatih Kurugollu, "A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC", IEEE Trans. Circuits syst. Video techno., Vol 23, No. 9, pp. 1476-1490, 2013.

[6]Y. Zhao, L. Zhuo , N. Mao, J. Zhang and X. Li "An object-based unequal encryption method for H.264 compressed surveillance videos", Proc. 2012 IEEE Int. Conf. Signal Processing, Communication and Computing (ICSPCC), pp.419 -424 2012. 

[7]Haojie Shen; Li Zhuo; Yingdi Zhao, "An efficient motion reference structure based selective encryption algorithm for H.264 videos," Information Security, IET, vol.8, no.3, pp.199, 206, May 2014. doi: 10.1049/iet-ifs.2012.0349.

[8]W. Wang, M. Hempel, D. Peng, H. Wang, H. Sharif, and H.-H. Chen, "On energy efficient encryption for video streaming in wireless sensor networks," IEEE Trans. Multimedia, vol. 12, no. 5, pp. 417–426, Aug. 2010.

[9]Yingdi Zhao; Li Zhuo, "A content-based encryption scheme for wireless H.264 compressed videos," Wireless Communications & Signal Processing (WCSP), 2012 International Conference on , vol., no., pp.1,6, 25-27 Oct. 2012 doi: 10.1109/WCSP.2012.6543022.

[10]Misra et al.: A survey of Multimedia Streaming in wireless sensor networks, IEEE Communications Survey & tutorial, Vol. 10 No.4 Fourth Quarter 2008. 

[11]Z. He, Y. Liang, L. Chen, I. Ahmad, and D. Wu. Power-rate-distortion analysis for wireless video communication under energy constraints. IEEE Trans. Circuits Syst. Video Technol., 15(5):645–658, May 2005.

[12]J. Lee, I. Shin, and H. Park, "Adaptive intra-frame assignment and bitrate estimation for variable GOP length in H.264," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1271–1279, Oct. 2006.

[13]Zhenyu Yu; Zhiping Lin, "Scene change detection using motion vectors and dc components of prediction residual in H.264 compressed videos," Industrial Electronics and Applications (ICIEA), 2012 7th IEEE Conference on, vol., no., pp.990, 995, 18-20 July 2012.

[14] Bohyun Hong; Minyoung Eom; Yoonsik Choe, "Scene Change Detection using Edge Direction based on Intra Prediction Mode in H.264/AVC Compression Domain," TENCON 2006. 2006 IEEE Region 10 Conference vol., no., pp.1, 4, 14-17 Nov. 2006.

[15]J.-R. Ding and J.-F. Yang, "Adaptive group-of-picture and scene change detection methods based on existing H.264 advanced video coding information", IET Image Processing, Vol. 2, No. 2, pp. 85-94, 2008.

[16]S. Youm and W. Kim, "Dynamic threshold method for scene change detection", In Proc. ICME2003, Vol. 2, pp. 337-340, July. 2003.

[17]H. Li, G. Liu, Z. Zhang and Y. Li, "Adaptive scene-detection algorithm or VBR video stream", In IEEE Trans. Multimedia, Vol. 6, No. 4, pp.624-633, Aug. 2004. 

[18]Wiegand, T.; Sullivan, G.J.; Bjontegaard, G.; Luthra, A., "Overview of the H.264/AVC video coding standard," Circuits and Systems for Video Technology, IEEE Transactions on, vol.13, no.7, pp.560, 576, July 2003.

[19]Marpe, D.; Schwarz, H.; Wiegand, T., "Context-based adaptive binary Arithmetic coding in the H.264/AVC video compression standard," Circuits and Systems for Video Technology, IEEE Transactions on, vol.13, no.7, pp.620, 636, July 2003.

[20]FIPS 197 (Advanced Encryption Standard), NIST Publications, 2001.

[21]Multimedia over IP and Wireless Networks: Compression, Networking, and Systems by Mihaela van der Schaar, Philip A Chou. Academic press, 2011.

[22]A Massoudi, F Lefebvre, C De Vleeschouwer, B Macq and J-J Quisquater, "Overview on Selective Encryption of Image and Video: Challenges and Perspectives", Eurasip Journal on information security 2008:179290.

[23]Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Trans. Image Process, vol. 13, no. 4, pp. 600– 612, 2004.

[24]Z. Wang, A.Bovik, "Mean Squared error: Love it or leave it? A new look at signal fidelity measures," IEEE Signal Processing. Mag., vol., 26, no.1, pp. 98-117, Jan. 2009.

[25]JM Reference ver 18.5 (2012) http://iphome.hhi.de/suehring/tml.

[26]NIST Special Publication 800-57, Recommendation for Key Management, 2012.

[27]M. Podesser, H.Schmidt and Uhl, "Selective bitplane encryption for secure transmission of image data in mobile environments", in Proc. 5th IEEE Nordiac signal Process. Symp. oct. 2002, pp. 4-6.