ABSTRACT
According to the widespread mobile devices and wearable devices, various mobile video applications are emerging. Some of those applications contain sensitive data such as military information so that they need to be protected from anonymous intruders. Thus, several video encryption techniques have been proposed. Accordingly, it has become essential to evaluate the visual security of encrypted videos. Several techniques have attempted to evaluate the visual security in the spatial domain but failed to capture it in the temporal domain. Thus, we present a temporal visual security metric and consequently propose a spatio-temporal visual security metric by combining ours with an existing metric which evaluates the spatial visual security. Our experimental results demonstrate that our proposed metrics appropriately evaluate temporal distortion as well as spatial distortion of encrypted videos while ensuring high correlation with subjective evaluation scores. Further we examine the tradeoff between the energy consumption for mobile video encryption techniques and visual security of encrypted videos. This tradeoff study is useful in determining a right encryption technique which satisfies the energy budget for secure mobile video applications.
- H.264 jm reference software: http://iphome.hhi.de/suehring/tml.Google Scholar
- Agi, I., and Gong, L. An empirical study of secure mpeg video transmissions. In SNDSS (1996). Google ScholarDigital Library
- Bhargava, B., Shi, C., and Wang, S.-Y. Mpeg video encryption algorithms. Multimedia Tools and Applications (2004). Google ScholarDigital Library
- Binkert, N., Beckmann, B., Black, G., Reinhardt, S. K., Saidi, A., Basu, A., Hestness, J., Hower, D. R., Krishna, T., Sardashti, S., et al. The gem5 simulator. ACM SIGARCH Computer Architecture News (2011). Google ScholarDigital Library
- Chen, G.-H., Yang, C.-L., and Xie, S.-L. Gradient-based structural similarity for image quality assessment. In ICIP (2006).Google ScholarCross Ref
- FIPS, P. 46-3: Data encryption standard (des). National Institute of Standards and Technology (1999).Google Scholar
- Grangetto, M., Magli, E., and Olmo, G. Multimedia selective encryption by means of randomized arithmetic coding. Multimedia, IEEE Transactions on (2006). Google ScholarDigital Library
- Im, C., Kim, H., and Ha, S. Dynamic voltage scheduling technique for low-power multimedia applications using buffers. In ISLPED (2001). Google ScholarDigital Library
- Jana, S., Pande, A., Chan, A., and Mohapatra, P. Mobile video chat: issues and challenges. Communications Magazine, IEEE (2013).Google Scholar
- Jun, L., LingLing, Z., Changsheng, X., and Hao, H. A two-way selective encryption algorithm for mpeg video. In IWNAS (2006).Google Scholar
- Li, S., Ahn, J. H., Strong, R. D., Brockman, J. B., Tullsen, D. M., and Jouppi, N. P. Mcpat: an integrated power, area, and timing modeling framework for multicore and manycore architectures. In MICRO (2009). Google ScholarDigital Library
- Li, S., Chen, G., Cheung, A., Bhargava, B., and Lo, K.-T. On the design of perceptual mpeg-video encryption algorithms. Circuits and Systems for Video Technology, IEEE Transactions on (2007). Google ScholarDigital Library
- Li, Y., Liang, L., Su, Z., and Jiang, J. A new video encryption algorithm for h. 264. In ICICS (2005).Google Scholar
- Lian, S., Sun, J., Liu, G., and Wang, Z. Efficient video encryption scheme based on advanced video coding. Multimedia Tools and Applications (2008). Google ScholarDigital Library
- Lin, W., and Jay Kuo, C.-C. Perceptual visual quality metrics: A survey. Journal of Visual Communication and Image Representation (2011). Google ScholarDigital Library
- Liu, F., and Koenig, H. A survey of video encryption algorithms. Computers & Security (2010). Google ScholarDigital Library
- Liu, Z., and Li, X. Motion vector encryption in multimedia streaming. In MMM (2004). Google ScholarDigital Library
- Ma, Z., Hu, H., and Wang, Y. On complexity modeling of h. 264/avc video decoding and its application for energy efficient decoding. Multimedia, IEEE Transactions on (2011). Google ScholarDigital Library
- Mao, Y., and Wu, M. A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on (2006). Google ScholarDigital Library
- Pazarci, M., and Dipçin, V. A mpeg2-transparent scrambling technique. Consumer Electronics, IEEE Transactions on (2002). Google ScholarDigital Library
- Pub, N. F. 197: Advanced encryption standard (aes). Federal Information Processing Standards Publication (2001).Google Scholar
- Qiao, L., and Nahrstedt, K. A new algorithm for mpeg video encryption. In CISST (1997).Google Scholar
- Qiao, L., and Nahrstedt, K. Comparison of mpeg encryption algorithms. Computers & Graphics (1998).Google Scholar
- Raju, C. N., Umadevi, G., Srinathan, K., and Jawahar, C. Fast and secure real-time video encryption. In ICVGIP (2008). Google ScholarDigital Library
- Spanos, G. A., and Maples, T. B. Security for real-time mpeg compressed video in distributed multimedia applications. In PCCC (1996).Google ScholarCross Ref
- Tong, L., Dai, F., Zhang, Y., and Li, J. Visual security evaluation for video encryption. In MM (2010). Google ScholarDigital Library
- Wang, Y., O'Neill, M., and Kurugollu, F. The improved sign bit encryption of motion vectors for h. 264/avc. In EUSIPCO (2012).Google Scholar
- Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P. Image quality assessment: from error visibility to structural similarity. Image Processing, IEEE Transactions on (2004). Google ScholarDigital Library
- Zeng, W., and Lei, S. Efficient frequency domain video scrambling for content access control. In MM (1999). Google ScholarDigital Library
- Zhou, J., Liang, Z., Chen, Y., and Au, O. C. Security analysis of multimedia encryption schemes based on multiple huffman table. Signal Processing Letters, IEEE (2007).Google Scholar
Index Terms
- Spatio-temporal visual security metric for secure mobile video applications
Recommendations
Visual security evaluation for video encryption
MM '10: Proceedings of the 18th ACM international conference on MultimediaVideo encryption plays an important role in data security guarantee, which is increasingly important with the development of multimedia technology. A great deal of effort has been made in recent years to develop video encryption methods. However, few ...
An objective visual security assessment for cipher-images based on local entropy
In recent years, many practical algorithms have been put forward for images and videos encryption. Security analysis on these encryption algorithms focuses research on cryptographic security, and few work relate to visual security. Visual security means ...
Sencogi Spatio-Temporal Saliency: A New Metric for Predicting Subjective Video Quality on Mobile Devices
Human-Computer Interaction. Interaction in ContextAbstractObjective Video Quality Assessment (VQA) is often used to predict users visual perception of video quality. In the literature, the performance evaluation of objective measures is based on benchmark subjective scores of perceived quality. This ...
Comments