Skip to main content

2016 | OriginalPaper | Buchkapitel

Encryption of Motion Vector Based Compressed Video Data

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Enormous size of video data for natural scene and objects is a burden, threat for practical applications and thus there is a strong requirement of compression and encryption of video data. The proposed encryption technique considers motion vector components of the compressed video data and conceals them for their protection. Since the motion vectors exhibit redundancies, further reduction of these redundancies are removed through run-length coding prior to the application of encryption operation. For this, the motion vectors are represented in terms of ordered pair (val, run) corresponding to the motion components along the row and column dimensions, where ‘val’ represents value of the motion vector while ‘run’ represents the length of repetition of ‘val’. However, an adjustment for having maximal run is made by merging the smaller run value. Eventually we encrypted the ‘val’ components using knapsack algorithm before sending them to the receiver. The method has been formulated, implemented and executed on real video data. The proposed method has also been evaluated on the basis of some performance measures namely PSNR, MSE, SSIM and the results are found to be satisfactory.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mishra, M.K., Mukhopadhyay, S., Biswas, G.P.: Architecture and secure implementation for video conferencing technique. In: Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1–6. IEEE (2015) Mishra, M.K., Mukhopadhyay, S., Biswas, G.P.: Architecture and secure implementation for video conferencing technique. In: Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1–6. IEEE (2015)
2.
Zurück zum Zitat Hong, G.M., Yuan, C., Wang, Y., Zhong, Y.Z.: A quality-controllable encryption for H. 264/AVC video coding. In: Advances in Multimedia Information Processing-PCM, pp. 510–517. Springer, Berlin (2006) Hong, G.M., Yuan, C., Wang, Y., Zhong, Y.Z.: A quality-controllable encryption for H. 264/AVC video coding. In: Advances in Multimedia Information Processing-PCM, pp. 510–517. Springer, Berlin (2006)
3.
Zurück zum Zitat Qian, Z., Jin-mu, W., Hai-xia, Z.: Efficiency video encryption scheme based on H. 264 coding standard and permutation code algorithm. In: 2009 WRI World Congress on Computer Science and Information Engineering, vol. 1, pp. 674–678. IEEE, Mar 2009 Qian, Z., Jin-mu, W., Hai-xia, Z.: Efficiency video encryption scheme based on H. 264 coding standard and permutation code algorithm. In: 2009 WRI World Congress on Computer Science and Information Engineering, vol. 1, pp. 674–678. IEEE, Mar 2009
4.
Zurück zum Zitat Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans. Circuits Syst. Video Technol. 21(5), 565–576 (2011)CrossRef Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans. Circuits Syst. Video Technol. 21(5), 565–576 (2011)CrossRef
5.
Zurück zum Zitat Agi, I., Gong, L.: An empirical study of secure MPEG video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE, Feb 1996 Agi, I., Gong, L.: An empirical study of secure MPEG video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE, Feb 1996
6.
Zurück zum Zitat Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. Comput. Graph. 22(4), 437–448 (1998)CrossRef Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. Comput. Graph. 22(4), 437–448 (1998)CrossRef
7.
Zurück zum Zitat Shi, C., Wang, S.Y., Bhargava, B.: MPEG video encryption in real-time using secret key cryptography. In: Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (1999) Shi, C., Wang, S.Y., Bhargava, B.: MPEG video encryption in real-time using secret key cryptography. In: Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (1999)
8.
Zurück zum Zitat Mishra, M.K., Mukhopadhyay, S.: Scheme for compressing video data employing wavelets and 2D-PCA. In: Information Systems Design and Intelligent Applications, pp. 409–417. Springer, India (2015) Mishra, M.K., Mukhopadhyay, S.: Scheme for compressing video data employing wavelets and 2D-PCA. In: Information Systems Design and Intelligent Applications, pp. 409–417. Springer, India (2015)
9.
Zurück zum Zitat Ouni, T., Ayedi, W., Abid, M.: New low complexity DCT based video compression method. In: International Conference on Telecommunications, ICT’09, pp. 202–207. IEEE May 2009 Ouni, T., Ayedi, W., Abid, M.: New low complexity DCT based video compression method. In: International Conference on Telecommunications, ICT’09, pp. 202–207. IEEE May 2009
10.
Zurück zum Zitat Merkle, R.C., Hellman, M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inf. Theory 24(5), 525–530 (1978)CrossRef Merkle, R.C., Hellman, M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inf. Theory 24(5), 525–530 (1978)CrossRef
11.
Zurück zum Zitat Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996) Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
12.
Zurück zum Zitat Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef
Metadaten
Titel
Encryption of Motion Vector Based Compressed Video Data
verfasst von
Manoj K Mishra
Susanta Mukhopadhyay
G. P. Biswas
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-30927-9_34