Skip to main content

2013 | OriginalPaper | Buchkapitel

5. The Secure Wavelet Transform

verfasst von : Amit Pande, Joseph Zambreno

Erschienen in: Embedded Multimedia Security Systems

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

There has been an increasing concern for the security of multimedia transactions over real-time embedded systems. Partial and selective encryption schemes have been proposed in the research literature, but these schemes significantly increase the computation cost leading to tradeoffs in system latency, throughput, hardware requirements and power usage. In this work, we propose a light-weight multimedia encryption strategy based on a modified Discrete Wavelet Transform (DWT) which we refer to as the Secure Wavelet Transform (SWT). The SWT provides joint multimedia encryption and compression by two modifications over the traditional DWT implementations: (a) parameterized construction of the DWT and (b) subband re-orientation for the wavelet decomposition. The SWT has rational coefficients which allow us to build a high throughput hardware implementation on fixed point arithmetic. We obtain a zero-overhead implementation on custom hardware. Furthermore, a Look-up table-based reconfigurable implementation allows us to allocate the encryption key to the hardware at run-time. Direct implementation on Xilinx Virtex FPGA gave a clock frequency of 60 MHz, while a reconfigurable multiplier-based design gave an improved clock frequency of 114 MHz. The pipelined implementation of the SWT achieved a clock frequency of 240 MHz on a Xilinx Virtex-4 FPGA and met the timing constraint of 500 MHz on a standard cell realization using 45 nm CMOS technology. SWT introduces parametrization of a video compression operation for video encryption by generating a parametric key for encryption. Implementations over FPGA and VLSI technology are both presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahmed, E., Rose, J.: The effect of LUT and cluster size on deep-submicron FPGA performance and density. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 12(3), 288–298 (2004) CrossRef Ahmed, E., Rose, J.: The effect of LUT and cluster size on deep-submicron FPGA performance and density. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 12(3), 288–298 (2004) CrossRef
2.
Zurück zum Zitat Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time transport protocol (SRTP) (2004) Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time transport protocol (SRTP) (2004)
3.
Zurück zum Zitat Brachtl, M., Uhl, A., Dietl, W.: Key-dependency for a wavelet-based blind watermarking algorithm. In: Proc. ACM Workshop on Multimedia and Security (MM&Sec), pp. 175–179. ACM Press, New York (2004). doi:10.1145/1022431.1022462 Brachtl, M., Uhl, A., Dietl, W.: Key-dependency for a wavelet-based blind watermarking algorithm. In: Proc. ACM Workshop on Multimedia and Security (MM&Sec), pp. 175–179. ACM Press, New York (2004). doi:10.​1145/​1022431.​1022462
4.
Zurück zum Zitat Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL/TLS channel. In: The 23rd Annual International Cryptology Conference, CRYPTO’03, vol. 2729, pp. 583–599 (2003) Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL/TLS channel. In: The 23rd Annual International Cryptology Conference, CRYPTO’03, vol. 2729, pp. 583–599 (2003)
5.
7.
Zurück zum Zitat Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: an overview. IEEE Trans. Consum. Electron. 46(4), 1103–1127 (2000) CrossRef Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: an overview. IEEE Trans. Consum. Electron. 46(4), 1103–1127 (2000) CrossRef
8.
Zurück zum Zitat Daubechies, I., Sweldens, W.: Factoring wavelet transforms into lifting steps. Technical report (1998) Daubechies, I., Sweldens, W.: Factoring wavelet transforms into lifting steps. Technical report (1998)
9.
Zurück zum Zitat Engel, D., Uhl, A.: Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption. In: Proc. ACM Workshop on Multimedia and Security (MM&Sec), pp. 63–70. ACM Press, New York (2005). doi:10.1145/1073170.1073183 CrossRef Engel, D., Uhl, A.: Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption. In: Proc. ACM Workshop on Multimedia and Security (MM&Sec), pp. 63–70. ACM Press, New York (2005). doi:10.​1145/​1073170.​1073183 CrossRef
10.
Zurück zum Zitat FIPS 197: Announcing the Advanced Encryption Standard (2001) FIPS 197: Announcing the Advanced Encryption Standard (2001)
11.
Zurück zum Zitat FIPS 46-2: Announcing the standard for Data Encryption Standard (1993) FIPS 46-2: Announcing the standard for Data Encryption Standard (1993)
12.
Zurück zum Zitat Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans. Multimed. 8(5), 905–917 (2006) CrossRef Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans. Multimed. 8(5), 905–917 (2006) CrossRef
13.
Zurück zum Zitat Guangjun, Z., Lizhi, C., Huowang, C.: A simple 9/7-tap wavelet filter based on lifting scheme. In: Proceedings of 2001 International Conference on Image Processing, vol. 2, pp. 249–252. IEEE Press, New York (2001) Guangjun, Z., Lizhi, C., Huowang, C.: A simple 9/7-tap wavelet filter based on lifting scheme. In: Proceedings of 2001 International Conference on Image Processing, vol. 2, pp. 249–252. IEEE Press, New York (2001)
14.
Zurück zum Zitat Hodjat, A., Verbauwhede, I.: A 21.54 Gbit/s fully pipelined AES processor on FPGA. In: Proc. IEEE Symp. Field-Programmable Custom Computing Machines (FCCM), pp. 308–309 (2004). doi:10.1109/FCCM.2004.1 CrossRef Hodjat, A., Verbauwhede, I.: A 21.54 Gbit/s fully pipelined AES processor on FPGA. In: Proc. IEEE Symp. Field-Programmable Custom Computing Machines (FCCM), pp. 308–309 (2004). doi:10.​1109/​FCCM.​2004.​1 CrossRef
15.
Zurück zum Zitat Huang, C., Tseng, P., Chen, L.: Flipping structure: an efficient VLSI architecture for lifting-based discrete wavelet transform. IEEE Trans. Signal Process. 52(4), 1080–1089 (2004) MathSciNetCrossRef Huang, C., Tseng, P., Chen, L.: Flipping structure: an efficient VLSI architecture for lifting-based discrete wavelet transform. IEEE Trans. Signal Process. 52(4), 1080–1089 (2004) MathSciNetCrossRef
16.
Zurück zum Zitat Jou, J.M., Shiau, Y.-H., Liu, C.-C.: Efficient VLSI architectures for the biorthogonal wavelet transform by filter bank and lifting scheme. In: IEEE Intl. Symp. Circuits and Systems (ISCAS 2001), vol. 2, pp. 529–532 (2001). doi:10.1109/ISCAS.2001.921124 Jou, J.M., Shiau, Y.-H., Liu, C.-C.: Efficient VLSI architectures for the biorthogonal wavelet transform by filter bank and lifting scheme. In: IEEE Intl. Symp. Circuits and Systems (ISCAS 2001), vol. 2, pp. 529–532 (2001). doi:10.​1109/​ISCAS.​2001.​921124
18.
Zurück zum Zitat Lai, X., Massey, J.L.: A proposal for a new Block Encryption Standard. In: EUROCRYPT’90, pp. 389–404. Springer, New York (1991) Lai, X., Massey, J.L.: A proposal for a new Block Encryption Standard. In: EUROCRYPT’90, pp. 389–404. Springer, New York (1991)
19.
Zurück zum Zitat Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007) CrossRef Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007) CrossRef
20.
Zurück zum Zitat Lian, S., Wang, Z.: Comparison of several wavelet coefficient confusion methods applied in multimedia encryption. In: Intl. Conf. Computer Networks and Mobile Computing, pp. 372–376 (2003) Lian, S., Wang, Z.: Comparison of several wavelet coefficient confusion methods applied in multimedia encryption. In: Intl. Conf. Computer Networks and Mobile Computing, pp. 372–376 (2003)
21.
Zurück zum Zitat Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: challenges and new directions. In: Communications, Internet, and Information Technology (CIIT 2003), pp. 276–285 (2003) Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: challenges and new directions. In: Communications, Internet, and Information Technology (CIIT 2003), pp. 276–285 (2003)
22.
Zurück zum Zitat Liu, Z., Zheng, N.: Parametrization construction of biorthogonal wavelet filter banks for image coding. Signal Image Video Process. 1(1), 63–76 (2007) CrossRef Liu, Z., Zheng, N.: Parametrization construction of biorthogonal wavelet filter banks for image coding. Signal Image Video Process. 1(1), 63–76 (2007) CrossRef
23.
Zurück zum Zitat Mano, M.M., Ciletti, M.D.: Digital Design, 4th edn. Prentice-Hall, Upper Saddle River (2006) Mano, M.M., Ciletti, M.D.: Digital Design, 4th edn. Prentice-Hall, Upper Saddle River (2006)
24.
Zurück zum Zitat Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061–2075 (2006) CrossRef Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061–2075 (2006) CrossRef
25.
26.
Zurück zum Zitat Martin, K., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1152–1162 (2008) CrossRef Martin, K., Plataniotis, K.N.: Privacy protected surveillance using secure visual object coding. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1152–1162 (2008) CrossRef
27.
Zurück zum Zitat Martina, M., Masera, G.: Multiplierless, folded 9/7–5/3 wavelet VLSI architecture. IEEE Trans. Circuits Syst. II 54(9), 770–774 (2007) CrossRef Martina, M., Masera, G.: Multiplierless, folded 9/7–5/3 wavelet VLSI architecture. IEEE Trans. Circuits Syst. II 54(9), 770–774 (2007) CrossRef
28.
Zurück zum Zitat Pande, A., Zambreno, J.: Poly-dwt: polymorphic wavelet hardware support for dynamic image compression. ACM Trans. Embed. Comput. Syst. 11(1), 6 (2010) Pande, A., Zambreno, J.: Poly-dwt: polymorphic wavelet hardware support for dynamic image compression. ACM Trans. Embed. Comput. Syst. 11(1), 6 (2010)
30.
Zurück zum Zitat Pande, A., Zambreno, J.: An efficient hardware architecture for multimedia encryption and authentication using discrete wavelet transform. In: IEEE CS Intl. Symp. VLSI, pp. 85–90 (2009) Pande, A., Zambreno, J.: An efficient hardware architecture for multimedia encryption and authentication using discrete wavelet transform. In: IEEE CS Intl. Symp. VLSI, pp. 85–90 (2009)
31.
Zurück zum Zitat Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949) MathSciNetMATH Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949) MathSciNetMATH
32.
Zurück zum Zitat Stine, J., Castellanos, I., Wood, M., Henson, J., Love, F., Davis, W.R., Franzon, P.D., Bucher, M., Basavarajaiah, S., Oh, J., Jenkal, R.: FreePDK: an open-source variation-aware design kit. In: IEEE Int. Conf. on Microelectronic Systems Education, MSE 2007, pp. 173–174 (2007). doi:10.1109/MSE.2007.3 CrossRef Stine, J., Castellanos, I., Wood, M., Henson, J., Love, F., Davis, W.R., Franzon, P.D., Bucher, M., Basavarajaiah, S., Oh, J., Jenkal, R.: FreePDK: an open-source variation-aware design kit. In: IEEE Int. Conf. on Microelectronic Systems Education, MSE 2007, pp. 173–174 (2007). doi:10.​1109/​MSE.​2007.​3 CrossRef
33.
Zurück zum Zitat Strang, G., Nguyen, T.: Wavelets and Filter Bank. Wellesley/Cambridge University Press, Cambridge (1996) Strang, G., Nguyen, T.: Wavelets and Filter Bank. Wellesley/Cambridge University Press, Cambridge (1996)
35.
Zurück zum Zitat Vishwanath, M., Owens, R.M., Irwin, M.J.: VLSI architectures for the Discrete Wavelet Transform. IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process. 42(5), 305–316 (1995). doi:10.1109/82.386170 MATHCrossRef Vishwanath, M., Owens, R.M., Irwin, M.J.: VLSI architectures for the Discrete Wavelet Transform. IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process. 42(5), 305–316 (1995). doi:10.​1109/​82.​386170 MATHCrossRef
36.
Zurück zum Zitat Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: Proc. Second UNIX Workshop on Electronic Commerce, pp. 29–40. USENIX Association, Berkeley (1996) Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: Proc. Second UNIX Workshop on Electronic Commerce, pp. 29–40. USENIX Association, Berkeley (1996)
37.
Zurück zum Zitat Wang, S.-J., Chen, H.-H., Chen, P.-Y., Tsai, Y.-R.: Security cryptanalysis in high-order improved fast encryption algorithm for multimedia. In: Future Generation Communication and Networking (FGCN 2007), vol. 1, pp. 328–331 (2007). doi:10.1109/FGCN.2007.199 CrossRef Wang, S.-J., Chen, H.-H., Chen, P.-Y., Tsai, Y.-R.: Security cryptanalysis in high-order improved fast encryption algorithm for multimedia. In: Future Generation Communication and Networking (FGCN 2007), vol. 1, pp. 328–331 (2007). doi:10.​1109/​FGCN.​2007.​199 CrossRef
38.
Metadaten
Titel
The Secure Wavelet Transform
verfasst von
Amit Pande
Joseph Zambreno
Copyright-Jahr
2013
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-4459-5_5