1 / 29

Commutative Encryption and Watermarking in Video Compression

Commutative Encryption and Watermarking in Video Compression. Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007 Shiguo Lian, Member, IEEE, Zhongxuan Liu, Member, IEEE, Zhen Ren, and Haila Wang Adviser: Chih-Hung Lin Speaker:Tzu-Hsun Liao. Author.

domani
Download Presentation

Commutative Encryption and Watermarking in Video Compression

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Commutative Encryption and Watermarking in Video Compression Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007 Shiguo Lian, Member, IEEE, Zhongxuan Liu, Member, IEEE, Zhen Ren, and Haila Wang Adviser: Chih-Hung Lin Speaker:Tzu-Hsun Liao

  2. Author • Shiguo Lian • In 2004, he was a research assistant in City University of Hong Kong • Shiguo Lian got his Ph.D degree in multimedia security from Nanjing University of Science and Technology in July 2005 • He has been with France Telecom R&D Beijing since July 2005.

  3. Author • Zhongxuan Liu • Current : Researcher at Orange • Education : Shandong University2007-2008

  4. Author • Zhen Ren • From 1983 to 1986 and 1989 to 1995, she worked as a Design Engineer at Beijing Institute of Radio Measurement in China. • rom 1995 to 1997, she worked at Glocom Inc, USA, where she was a Design Engineer and involved in several projects that were related to satellite communication terminals • Since 1997, she has been with Intelligent Automation, Inc (IAI), USA, where she is currently a Senior Electronic Engineer

  5. Author • Haila Wang • Current :CEO France Telecom R&D Beijing • Education: Ecole polytechnique 1980-1983

  6. Outline • Introduction • Proposed watermarking and encryption scheme • Performance analysis • Conclusions and future work

  7. 1. Introduction • Video encryption and watermarking scheme based on H.264/AVC codec • Intra-prediction mode(IPM), Motion vector difference(MVD) and residue coefficient’s sign are encrypted • Amplitude of dc or ac is watermarked(4*4 DCT Block)

  8. 2 .Proposed watermarking and encryption scheme Y:encrypted Y’: are the encrypted copy of Y E():encryption algorithm Ke: encryption key Z:watermarked Z’: watermarked copy of Z W():watermark algorithm B: watermark Kw:watermark key

  9. 2 .Proposed watermarking and encryption scheme

  10. 2 .Proposed watermarking and encryption scheme • Proposed Encryption Process • MVD Encryption • IPM Encryption • Residue Encryption

  11. 2 .Proposed watermarking and encryption scheme • MVD Encryption X:For each Macroblock the sign is 0-positive Y:For each Macroblock the sign is 1-nonpositive X’ & Y’:are the encrypted copy of X & Y

  12. 2 .Proposed watermarking and encryption scheme • IPM Encryption 0 0 0 1 0 1 1 MZero Mbits

  13. 2 .Proposed watermarking and encryption scheme • Residue Encryption • For each non-zero residue macroblock,DCT coefficients are encrypted partially • For each 4*4 DCT block is only first 8 coefficients are encrypted

  14. 2 .Proposed watermarking and encryption scheme • Proposed Watermarking Process • Block Selection • Coefficient Selection • Watermark Embedding

  15. 2 .Proposed watermarking and encryption scheme • Block Selection • The residue block is nonzero • For I/P-frame, the residue DCT block is composed of onlyac’s • For B-frame, the residue DCT block is composed of eitherdc’s or ac’s

  16. 2 .Proposed watermarking and encryption scheme • Coefficient Selection • In middle frequency,Mcoefficients areselected randomly from the 8 onesproposed in residue encryption 0<M≤8 middle frequency (4*4DCTBlock)

  17. 2 .Proposed watermarking and encryption scheme • Watermark Embedding W:watermark Z: original coefficient Z’: watermarked coefficient q: quantization step Sign:+ or -

  18. 2 .Proposed watermarking and encryption scheme • Watermark Embedding W:watermark Z: original coefficient Z’: watermarked coefficient q: quantization step Sign:+ or -

  19. 2 .Proposed watermarking and encryption scheme

  20. 2 .Proposed watermarking and encryption scheme • Watermark Extraction W:watermark Z: coefficient q: quantization step

  21. 3. Performance analysis • Security • Cryptographic Security • Perception Security

  22. 3. Performance analysis • Cryptographic Security • 128-bit AES cipher is usedto encrypt the selected parameters

  23. 3. Performance analysis • Perception Security (a). Original (b). IPM (c). MVD (d). Encryptedwith theproposed method

  24. 3. Performance analysis • Perception Security

  25. 3. Performance analysis • Robustness and Imperceptibility

  26. 3. Performance analysis • Robustness and Imperceptibility Salesman-QCIF/30 fps

  27. 3. Performance analysis • Commutation

  28. 3. Performance analysis • Commutation

  29. Conclusions and future work • The modified watermarking algorithm makes the watermarking operation and encryption operation commutative • The scheme keeps secure against present attacks, is efficient in implementation, keeps imperceptible, and is robust against recompression in some extent

More Related