1 Commutative Encryption and Water marking in Video Compression 交交交交交交交交交交交交交交交交交 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17, NO. 6, June 2007 Author : Shiguo Lian, Zhongxuan Liu, Zhen Ren,Haila Wa ng Adviser :鄭鄭鄭 , 鄭鄭鄭 鄭鄭 Reporter :鄭鄭鄭
22
Embed
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
Commutative Encryption and Watermarking in Video Compression
交換式加密及浮水印法應用在視頻壓縮IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17, NO. 6, June 2007
Author : Shiguo Lian, Zhongxuan Liu, Zhen Ren,Haila Wang
Adviser :鄭錦楸 ,郭文中 教授 Reporter :林彥宏
2
Outline
Introduction
Research Method • Watermarking and Encryption Scheme • Proposed Encryption Process • Proposed Watermarking Process • Watermark Extraction
Performance Analysis • Security • Robustness and Imperceptibility • Commutation
Residue Encryption : • each non-zero residue macroblock DCT coefficients
are encrypted partially • first 8 coefficients’ signs in each 4×4 DCT block are encrypted
13
Proposed Watermarking Process
watermark embedding is composed of three steps : • Block Selection : 1) residue block is nonzero
2) for I/P-frame, residue DCT block is composed of
only ac
3) for B-frame, residue DCT block is composed of
either dc or ac
14
Proposed Watermarking Process
• Coefficient Selection : coefficient in middle frequency are preferred • Watermark Embedding : if
is watermark is original coefficient is quantization step
1w
02 % / if , .Sign 1 /
12 % / if ,
qzzqqz
qzzz
wzq
15
Proposed Watermarking Process
if otherwise
ex:
qzzq
qand zqzzqqz
qzz
z
- if , Sign2
- 1%2 / if , Sign 1-/
02 % / if ,
w
-2)Sign(12 -
1q , -1 , 0
zzqz
zw
16
Proposed Watermarking Process
17
Watermark Extraction
Watermark Extraction:
1 2 % / if 1,
0 2 % / if 0,
qz
qzw
18
Performance Analysis
Security: 128-bit AES (Advanced Encryption Standard )
19
Robustness and Imperceptibility
20
Commutation
21
Commutation
22
Conclusions
The modified watermarking algorithm makes the watermarking operation and encryption operation commutative.
The scheme keeps secure against present attacks, is efficient in implementation, keeps imperceptible, and is robust against recompression in some extent.