This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Motivation Mobile multimedia applications are vulnerable to security attacks in wireless networks Significant computation for video encryption is expected on battery-operated mobile devices
▶ Evaluate symmetric video encryption schemes from the perspective of energy consumption both analytically and experimentally
2. Video Encryption Algorithms- 3) Zig-Zag Permutation Algorithm
Two levels of security to digital image obscured image incomprehensible image
Basic Idea use a random permutation list to map the individual 8x8 block to a 1x64 vector
① Generate a random permutation list② Split DC coefficient and one of them is saved at the least AC coefficient③ Apply the permutation list to the split block
Tang (CMU)① DC coefficient is mapped to the first element in the 1x64 vector and the rest of the elements are permuted.
Obscured image ② DC coefficient of every bock is set to zero or a fixed value between 0 and 255 and rest of the elements are
permuted. Obscured image③ DC coefficient is mapped to any other position other than the first position in the 1x64 vector, and the rest of the
elements are randomly permuted Incomprehensible image④ AC63 coefficient is set to 0 Degradation is negligible⑤ Split the DC coefficient into two parts, first part remain in the same position, the second part is substituted for
AC63 and randomly permute the list Incomprehensible image Vulnerable to the cyphertext attack: Statical analysis(Qiao and Nahrstedt)
binary coin flipping sequence together with two different permutation lists Subject to the plain text attack
Not satisfying security Plaintext attack Cyphertext attack
2. Video Encryption Algorithms- 4) Video Encryption Algorithm
Qiao and Nahrstedt (UIUC) Based on statistical properties of MPEG stream : Uniform distribution of streams faster(47%) than DES because DES is used on partial bit stream Immune to plain-text attack & cypher-text attack
Algorithm1) Choose odd-numbered bytes and even numbered bytes.2) XOR the two streams a1,a2… a2n-1 XOR a2,a4… a2n c1,c2… cn3) Choose an encryption function E (DES ) to encrypt a2,a4… a2n resulting cipher-text has the form
c1,c2… cn E(a2,a4… a2n) If a2a4…a2n has no repeated pattern, then the secrecy depends on function E because a2a4…a2n is
2. Video Encryption Algorithms-5)Sign-Bit Encryption Algorithm
Shi & Bhargava (Purdue) selective encryption scheme which operates on the sign bits of DCT coefficient of a MPEG compressed
video much more efficient than DES because it selectively encrypts the MPEG stream Light-weight and cost-effective Encryption function
Ek(S)=…(b1 XOR s1) …(bm XOR sm)(b1 XOR sm+1)…(bm XOR s2m)… Where s1s2…smsm+1…s2m…are all of the sign bits of DC and AC coefficients and the key k=b1b2….bm is a
randomly generated bit stream of length m A more effective modification
use a secret key randomly changing the sign bits of differential values of DC coefficients of I frames and the sign bits of differential values of motion vectors
very efficient in terms of computational complexity because it omits the encryption of AC coefficients altogether because DC coefficients and AC coefficients are related DC coefficients may be derived from AC coefficients for
an attack Secure Level
1) Encrypting all motion vectors of P frames and B frames2) Encrypting all DC coefficients of I frames3) Encrypting all DC coefficients of I frames and all motion vectors of P frames & B frames
Definition of the Size ST size of total encoded bit stream in Byte SI size of I frames in total encoded bit stream in Byte SP size of P frames in total encoded bit stream in Byte Sib_size of I blocks in SP in Byte SH size of Headers in total encoded bit stream in Byte ST = SI + SP + SH
Definition of amount of Energy Consumption eDES amount of energy consumption to encrypt 1 Byte plaintex using DES(Data Encryption
Standard) Ealgorithm amount of energy consumption to total bit stream using algorithm Eencoding amount of energy consumption to encode the video file
EZZ_basic = 0 * ENaive + α where α is the energy consumption for split & permutation However Eencoding increases (similar to decrease Quantization value, ex: Q=10 Q=4)
Encryption of DC coefficients group EZZ_DC = EZZ_basic + {(# of blocks per frame)*(# of frames in an encoded stream)*eDES}
Coin Flipping Sequence EZZ_CFS = EZZ_basic + β where β is almost zero
Individual Application(S1) Video Encoder (H.263)- FOREMAN.qcif w/ 300 framesof 11MB- 1:10 (IP ratio), 10 (Quant), FullSearch(S2) Video Decoder (H.263)- Variable encoded bit streams- 233 KB with default(S3) Crypto Application (DES)- 233 KB of encoded bit stream
Integrated Application(I1) Encoder with Full Encryption- Integrate (S1) and (S3)- Variable Quant & fixed others(I2) Encoder with Partial Encryption- Integrate (S1) and (S3) to encrypt only Intra-blocks with the same parameters (I3) Decoder with Full Decryption- Integrate (S2) and (S3)
Definitions Total Execution Time (second): total time to execute encoding, decoding or encryption on Zaurus Measured Total Energy (Joule): Total Execution Time * Measured Power[= Pactive-Pidle] Energy Consumption per byte (uJoule): Measured Total Energy / size of input file Energy Consumption per second (Watt): Power = Measured Total Energy / Total Execution Time =
Measured Power Ratio(%): Encryption Energy Overhead = 100 * (Energy Consumption for Encoding with
⑤ High quality Encoding (eg: quantization) [low compression) Increase energy consumption for encryption ( usually high quality video encoding ∵
increases the file size) Increase energy consumption for decoding
⑥ IP ratio (Naïve Video Encryption vs Selective) Decrease IP ratio in Encoding (assumption: only encrypting I-frames) Possible to decrease energy consumption
But we have to consider increase of energy in encoding & decoding and compare it with decrease of energy in encryption & decryption)
② Ideas (cont’)II. Key Chain using One-Way Hash function
1. Can I make a key chain using SHA-1 with one seed key?(one seed key is less than 264
bits and then 160 bits)2. SHA-1 is one-way hash function. How secure is SHA-1?3. Which one is more secure, sequential key chain or reverse key chain?4. Offline download from TTP server to MD is good in terms of security?5. How about making key chain using AES?
(reference shows that AES is more energy efficient than SHA-1)6. Overall this method, One-time pad with hashed key chain, seems secure?
1) A Fast MPEG Video Encryption Algorithm :http://www.acm.org/sigmm/MM98/electronic_proceedings/shi/#Related2) Critical Analysis of MPEG Encryption Schemes :http://www.uow.edu.au/~ck12/Critical.doc3) http://www.cs.ualberta.ca/~anup/Courses/414/notes_part1.pdf4) T.B Maples and G.A.Spanos. Performance Study of a Selective Encryption Scheme for the Security of Networked Real-time Video. In Proceedings of 4th
International Conference on Computer Communications and Networks, Las Vegas, Nevada, September 1995.5) L.Agi and L.Gong. An Emprical Study of MPEG Video Transmissions. In Proceedings of the Internet Society Symposium on Network and Distributed System
Security, pages 137-144, San Diego, CA, Feb. 19966) L.Tang Method for Encrypting and Decrypting MPEG Video Data Efficiently. In Proceedings of the Fourth ACM International Multimedia Conference (ACM
Multimedia ’96), pages 219-230, Bosten, MA, November 1996.7) Qiao and Nahrstedt Comparison of MPEG Encryption Algorithms. International Journal of Computers and Graphics, special issue: “Data Security in Image
Communication and Network” vol.22 January 1998.8) Shi and Bhargava An Efficient MPEG Video Encryption Algorithm. Proceedings of the IEEE Symposium on Reliable Distributed Systems 1998, IEEE Comp. Soc.
Los Almitos, CA, USA 98CB36281 P381-386.9) Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha, “Analyzing the Energy Consumption of Security Protocols”