Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.



Similar documents
Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet


Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

THE EMERGING JVT/H.26L VIDEO CODING STANDARD

White paper. H.264 video compression standard. New possibilities within video surveillance.

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Video compression: Performance of available codec software

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur

Image Compression through DCT and Huffman Coding Technique

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Coding Standards. Yao Wang Polytechnic University, Brooklyn, NY11201

TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger

Introduction to image coding

We are presenting a wavelet based video conferencing system. Openphone. Dirac Wavelet based video codec

Standard encoding protocols for image and video coding

Compression techniques

Multidimensional Transcoding for Adaptive Video Streaming

For Articulation Purpose Only

How To Improve Performance Of The H264 Video Codec On A Video Card With A Motion Estimation Algorithm

Fast Hybrid Simulation for Accurate Decoded Video Quality Assessment on MPSoC Platforms with Resource Constraints

Transmission of low-motion JPEG2000 image sequences using client-driven conditional replenishment

Digital Video Coding Standards and Their Role in Video Communications

Parametric Comparison of H.264 with Existing Video Standards

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

REIHE INFORMATIK 7/98 Efficient Video Transport over Lossy Networks Christoph Kuhmünch and Gerald Kühne Universität Mannheim Praktische Informatik IV

White paper. An explanation of video compression techniques.

Understanding Compression Technologies for HD and Megapixel Surveillance

Figure 1: Relation between codec, data containers and compression algorithms.

Case Study: Real-Time Video Quality Monitoring Explored

Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization

Digital Audio and Video Data

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

CHAPTER 2 LITERATURE REVIEW

Understanding Megapixel Camera Technology for Network Video Surveillance Systems. Glenn Adair

MPEG-1 and MPEG-2 Digital Video Coding Standards

Understanding Network Video Security Systems

TECHNICAL OVERVIEW OF VP8, AN OPEN SOURCE VIDEO CODEC FOR THE WEB

Efficient Motion Estimation by Fast Three Step Search Algorithms

Transform-domain Wyner-Ziv Codec for Video

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

Classes of multimedia Applications

Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding

Multi-Hypothesis based Distributed Video Coding using LDPC Codes

CM0340 SOLNS. Do not turn this page over until instructed to do so by the Senior Invigilator.

Design of Efficient Algorithms for Image Compression with Application to Medical Images

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

The New Enhanced Multiframe CT and MR DICOM Objects

How To Compare Video Resolution To Video On A Computer Or Tablet Or Ipad Or Ipa Or Ipo Or Ipom Or Iporom Or A Tv Or Ipro Or Ipot Or A Computer (Or A Tv) Or A Webcam Or

A comprehensive survey on various ETC techniques for secure Data transmission

Chapter 3 Data Warehouse - technological growth

Overview: Video Coding Standards

Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference

Multimedia Data Transmission over Wired/Wireless Networks

MPEG-4 Natural Video Coding - An overview

encoding compression encryption

Introduction to Medical Image Compression Using Wavelet Transform

Application Note. Low Bandwidth Media Configuration V7.0

X264: A HIGH PERFORMANCE H.264/AVC ENCODER. Loren Merritt and Rahul Vanam*

IMPACT OF COMPRESSION ON THE VIDEO QUALITY

WHITE PAPER. H.264/AVC Encode Technology V0.8.0

Video codecs in multimedia communication

Hybrid Compression of Medical Images Based on Huffman and LPC For Telemedicine Application

REDUCED COMPUTATION USING ADAPTIVE SEARCH WINDOW SIZE FOR H.264 MULTI-FRAME MOTION ESTIMATION

MMGD0203 Multimedia Design MMGD0203 MULTIMEDIA DESIGN. Chapter 3 Graphics and Animations


H.264/MPEG-4 AVC Video Compression Tutorial

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

Application Note. Introduction. Video Basics. Contents. IP Video Encoding Explained Series Understanding IP Video Performance.

Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia

Jpeg2000 Encryption and Its Advantages

CHAPTER 7 CONCLUSION AND FUTURE WORK

Video Codec Requirements and Evaluation Methodology

MPEG-4 AVC/H.264 Video Codecs Comparison

How to Send Video Images Through Internet

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

FCE: A Fast Content Expression for Server-based Computing

ChitChat: Making Video Chat Robust to Packet Loss

Transcription:

Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University

Outline Basic Idea: Arrange Visual Data in Non-standard Way and Apply Classical Techniques (Compression & Encryption) to improve results. Introduction - Video Coding Non-Standard Frame Structure Video Encryption The Proposed Encryption Technique Experimental Settings Experimental Results Conclusions Andreas Uhl 2 Carinthia Tech Institute & Salzburg University

Introduction The majority of lossy video coding algorithms is based on motion compensated hybrid coding techniques like MPEG-1, MPEG-2, MPEG-4, and H.261 H.264. These video codecs exploit the temporal redundancies present in video data (i.e. the similarity of frames over time) by applying algorithms for motion estimation and compensation. Medical imaging is the main application field for lossless video coding. In these applications, most techniques employ lossless image coding techniques like lossless JPEG, JPEG-LS, or lossless JPEG2000 on a per-frame basis. Of course, temporal redundancy is ignored in such schemes which results in limited compression performance. On the other hand, three dimensional transforms (e.g. 3D DWT) are used to decorrelate the video data but these techniques suffer from high complexity and high memory requirements. Motion compensation techniques as employed in lossy schemes are seldom used in lossless environments. Andreas Uhl 3 Carinthia Tech Institute & Salzburg University

Video Data: Classical View Consecutive frames in time time delay y - axis y - axis x - axis Sequence of Frames time - axis x - axis 3D Block time - axis Andreas Uhl 4 Carinthia Tech Institute & Salzburg University

Non Standard Frame Structure y - axis x - axis 3D Block time - axis Different Scans Andreas Uhl 5 Carinthia Tech Institute & Salzburg University

Example: Horizontal Frames - Carphone Horizontal frames provide a sideview of the video Frames close to the edge of the video consist mostly of background pixels which hardly change over time (left frame) The right frame consists of columns at the center of the original frames which change frequently over time. Andreas Uhl 6 Carinthia Tech Institute & Salzburg University

Example: Vertical Frames Akiyo Vertical frames provide a top-view of the video Frames close to the top of the video consist mostly of background pixels which hardly change over time (left frame) The right frame consists of columns at the center of the original frames which change frequently over time. Andreas Uhl 7 Carinthia Tech Institute & Salzburg University

Example Application: JPEG2000 Compression mode \\ video Carphone Claire normal 1,877 2,727 vertical 2,122 3,908 horizontal 2,046 4,080 Compression is significantly improved, especially for low-motion video! Andreas Uhl 8 Carinthia Tech Institute & Salzburg University

Image & Video Encryption Image and video encryption schemes have been mostly discussed in the context of digital rights management (DRM) systems where the emphasis lies on lossy compression schemes. In this field, different strategies apply partial encryption either on a per frame basis (where selected coefficients or VLC codewords are protected only) or on a per group of picture (GOP) basis (where selected frames I-frames or selected macroblocks I-blocks are protected only). Obviously, medical imaging is also an application field where privacy and confidentiality are important aims. We discuss privacy schemes for lossless video. Since our underlying coding scheme does not use GOPs, we employ a frame based encryption scheme in our approach. Andreas Uhl 9 Carinthia Tech Institute & Salzburg University

Our Approach The aim is to exploit the alternative perspectives of video data as discussed for lossless video compression and encryption. The classical technique ( normal view ) which we compare our results to corresponds to Motion JPEG2000 (MJPEG2000) encryption on a per frame basis (which is in fact JPEG2000 encryption). We apply classical JPEG2000 encryption on a per frame basis to frames in horizontal and vertical perspective, respectively. We encrypt a certain percentage of the original amount packet data, reconstruct the video data and measure the visual quality in terms of PSNR and edge similarity score (ESS) besides subjective visual inspection. In order to additionally assess the security of the scheme, we exploit a built-in error resilience functionality in JJ2000 in order to conduct an error concealment attack. Andreas Uhl 10 Carinthia Tech Institute & Salzburg University

Experimental Settings Carphone (176 x 144 x 383) and Claire (176 x 144 x 494) are used as testvideos, which represent sequences with high motion content and low motion content, respectively. All displayed result show the 18th ( normal ) frame of the corresponding test videos, numerical values represent average ESS and/or PSNR values for the entire sequence (in normal view) considered. Error concealment attack: An error resilience segmentation symbol is inserted at the end of each bit-plane. Decoders can use this information to detect and conceal errors encrypted data is treated as being errorness. This method is invoked in JJ2000 encoding using the option -Cseg_symbol on. Andreas Uhl 11 Carinthia Tech Institute & Salzburg University

Results: Claire 3% encrypted, no attack normal: ESS 0.54, 10.63 db vertical: ESS 0.55, 10.67 db Andreas Uhl 12 Carinthia Tech Institute & Salzburg University

Results: Claire ESS vs. Encryption Amount (attacked) Andreas Uhl 13 Carinthia Tech Institute & Salzburg University

Results: Claire 10% encrypted, attacked normal: ESS 0.56, 9.81 db vertical: ESS 0.50, 11.43 db Andreas Uhl 14 Carinthia Tech Institute & Salzburg University

Results: Claire 10% transparently encrypted, attacked normal: ESS 0.78, 22.28 db vertical: ESS 0.80, 22.21 db Andreas Uhl 15 Carinthia Tech Institute & Salzburg University

Results: Carphone Quality vs. Encryption Amount ESS PSNR Andreas Uhl 16 Carinthia Tech Institute & Salzburg University

Results: Carphone 15% encrypted, attacked ESS 0.46, 12.45 db ESS 0.45, 11.48 db Andreas Uhl 17 Carinthia Tech Institute & Salzburg University

Conclusions 1. We have found that the advances with respect to compression performance caused by alternative interpretation and scan order of video data do carry over to the encryption of JPEG2000 based corresponding frames. 2. Privacy focused applications require a significantly lower amount of encryption effort when applying alternative scan orders as compared to classical MJPEG2000 video. 3. This findings do npt apply for transparent encryption scenarios. Andreas Uhl 18 Carinthia Tech Institute & Salzburg University

Thank you for your attention! Questions? Andreas Uhl 19 Carinthia Tech Institute & Salzburg University