Top Banner
1 Commutative Encryption and Watermarking in Video Compression Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007 Shiguo Lian, Member, IEEE, Zhongxuan Liu, Member, IEEE, Zhen Ren, and Haila Wang Adviser: Chih-Hung Lin Speaker:Tzu-Hsun Liao
29

Commutative Encryption and Watermarking in Video Compression

Jan 05, 2016

Download

Documents

domani

Commutative Encryption and Watermarking in Video Compression. Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007 Shiguo Lian, Member, IEEE, Zhongxuan Liu, Member, IEEE, Zhen Ren, and Haila Wang Adviser: Chih-Hung Lin Speaker:Tzu-Hsun Liao. Author. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Commutative Encryption and Watermarking in Video Compression

1

Commutative Encryption and Watermarking in Video

Compression

Ieee Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 6, June 2007

Shiguo Lian, Member, IEEE, Zhongxuan Liu, Member, IEEE, Zhen Ren, and Haila Wang

Adviser: Chih-Hung LinSpeaker:Tzu-Hsun Liao

Page 2: Commutative Encryption and Watermarking in Video Compression

Author Shiguo Lian

In 2004, he was a research assistant in City University of Hong Kong

Shiguo Lian got his Ph.D degree in multimedia security from Nanjing University of Science and Technology in July 2005

He has been with France Telecom R&D Beijing since July 2005.

2

Page 3: Commutative Encryption and Watermarking in Video Compression

Author

Zhongxuan Liu Current : Researcher at Orange Education : Shandong University

2007-2008

3

Page 4: Commutative Encryption and Watermarking in Video Compression

Author

Zhen Ren From 1983 to 1986 and 1989 to 1995, she worked as

a Design Engineer at Beijing Institute of Radio Measurement in China.

rom 1995 to 1997, she worked at Glocom Inc, USA, where she was a Design Engineer and involved in several projects that were related to satellite communication terminals

Since 1997, she has been with Intelligent Automation, Inc (IAI), USA, where she is currently a Senior Electronic Engineer

4

Page 5: Commutative Encryption and Watermarking in Video Compression

Author

Haila Wang Current :CEO France Telecom R&D

Beijing Education: Ecole polytechnique 1980-

1983

5

Page 6: Commutative Encryption and Watermarking in Video Compression

6

Outline

1. Introduction2. Proposed watermarking and

encryption scheme3. Performance analysis4. Conclusions and future work

Page 7: Commutative Encryption and Watermarking in Video Compression

7

1. Introduction Video encryption and watermarking scheme

based on H.264/AVC codec

Intra-prediction mode(IPM), Motion vector difference(MVD) and residue coefficient’s sign are encrypted

Amplitude of dc or ac is watermarked(4*4 DCT Block)

Page 8: Commutative Encryption and Watermarking in Video Compression

8

2 .Proposed watermarking and encryption scheme

Y:encrypted Y’: are the encrypted copy of

YE():encryption algorithm Ke: encryption key

Z:watermarkedZ’: watermarked copy of ZW():watermark algorithmB: watermarkKw:watermark key

Page 9: Commutative Encryption and Watermarking in Video Compression

9

2 .Proposed watermarking and encryption scheme

Page 10: Commutative Encryption and Watermarking in Video Compression

10

2 .Proposed watermarking and encryption scheme

Proposed Encryption Process• MVD Encryption

• IPM Encryption

• Residue Encryption

Page 11: Commutative Encryption and Watermarking in Video Compression

11

2 .Proposed watermarking and encryption scheme

MVD Encryption

X:For each Macroblock the sign is 0-positiveY:For each Macroblock the sign is 1-nonpositiveX’ & Y’:are the encrypted copy of X & Y

Page 12: Commutative Encryption and Watermarking in Video Compression

12

2 .Proposed watermarking and encryption scheme

IPM Encryption

0 0 0 1101

M Zero Mbits

Page 13: Commutative Encryption and Watermarking in Video Compression

13

2 .Proposed watermarking and encryption scheme

Residue Encryption For each non-zero residue macroblock,DCT

coefficients are encrypted partially For each 4*4 DCT block is only first 8

coefficients are encrypted

Page 14: Commutative Encryption and Watermarking in Video Compression

14

2 .Proposed watermarking and encryption scheme

Proposed Watermarking Process• Block Selection

• Coefficient Selection

• Watermark Embedding

Page 15: Commutative Encryption and Watermarking in Video Compression

15

2 .Proposed watermarking and encryption scheme

Block Selection The residue block is nonzero

For I/P-frame, the residue DCT block is composed of only ac’s

For B-frame, the residue DCT block is composed of either dc’s or ac’s

Page 16: Commutative Encryption and Watermarking in Video Compression

16

2 .Proposed watermarking and encryption scheme

Coefficient Selection In middle frequency, M coefficients

are selected randomly from the 8 ones proposed in residue encryption

0<M≤8

middle frequency(4*4DCT Block)

Page 17: Commutative Encryption and Watermarking in Video Compression

17

2 .Proposed watermarking and encryption scheme

Watermark Embedding

W:watermark Z: original coefficientZ’: watermarked coefficientq: quantization stepSign:+ or -

Page 18: Commutative Encryption and Watermarking in Video Compression

18

2 .Proposed watermarking and encryption scheme

Watermark Embedding

W:watermark Z: original coefficientZ’: watermarked coefficientq: quantization stepSign:+ or -

Page 19: Commutative Encryption and Watermarking in Video Compression

2 .Proposed watermarking and encryption scheme

19

Page 20: Commutative Encryption and Watermarking in Video Compression

20

2 .Proposed watermarking and encryption scheme

Watermark Extraction

W:watermark Z: coefficientq: quantization step

Page 21: Commutative Encryption and Watermarking in Video Compression

21

3. Performance analysis

Security• Cryptographic Security

• Perception Security

Page 22: Commutative Encryption and Watermarking in Video Compression

22

3. Performance analysis

Cryptographic Security 128-bit AES cipher is used to encrypt

the selected parameters

Page 23: Commutative Encryption and Watermarking in Video Compression

23

3. Performance analysis

Perception Security(a). Original

(b). IPM

(c). MVD

(d). Encrypted with the proposed method

Page 24: Commutative Encryption and Watermarking in Video Compression

24

3. Performance analysis

Perception Security

Page 25: Commutative Encryption and Watermarking in Video Compression

25

3. Performance analysis

Robustness and Imperceptibility

Page 26: Commutative Encryption and Watermarking in Video Compression

26

3. Performance analysis

Robustness and Imperceptibility

Salesman-QCIF/30 fps

Page 27: Commutative Encryption and Watermarking in Video Compression

27

3. Performance analysis

Commutation

Page 28: Commutative Encryption and Watermarking in Video Compression

28

3. Performance analysis

Commutation

Page 29: Commutative Encryption and Watermarking in Video Compression

29

Conclusions and future work

The modified watermarking algorithm makes the watermarking operation and encryption operation commutative

The scheme keeps secure against present attacks, is efficient in implementation, keeps imperceptible, and is robust against recompression in some extent