skip to main content
10.1145/2727040.2727047acmconferencesArticle/Chapter ViewAbstractPublication PagesmmsysConference Proceedingsconference-collections
research-article

Spatio-temporal visual security metric for secure mobile video applications

Published:18 March 2015Publication History

ABSTRACT

According to the widespread mobile devices and wearable devices, various mobile video applications are emerging. Some of those applications contain sensitive data such as military information so that they need to be protected from anonymous intruders. Thus, several video encryption techniques have been proposed. Accordingly, it has become essential to evaluate the visual security of encrypted videos. Several techniques have attempted to evaluate the visual security in the spatial domain but failed to capture it in the temporal domain. Thus, we present a temporal visual security metric and consequently propose a spatio-temporal visual security metric by combining ours with an existing metric which evaluates the spatial visual security. Our experimental results demonstrate that our proposed metrics appropriately evaluate temporal distortion as well as spatial distortion of encrypted videos while ensuring high correlation with subjective evaluation scores. Further we examine the tradeoff between the energy consumption for mobile video encryption techniques and visual security of encrypted videos. This tradeoff study is useful in determining a right encryption technique which satisfies the energy budget for secure mobile video applications.

References

  1. H.264 jm reference software: http://iphome.hhi.de/suehring/tml.Google ScholarGoogle Scholar
  2. Agi, I., and Gong, L. An empirical study of secure mpeg video transmissions. In SNDSS (1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bhargava, B., Shi, C., and Wang, S.-Y. Mpeg video encryption algorithms. Multimedia Tools and Applications (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Binkert, N., Beckmann, B., Black, G., Reinhardt, S. K., Saidi, A., Basu, A., Hestness, J., Hower, D. R., Krishna, T., Sardashti, S., et al. The gem5 simulator. ACM SIGARCH Computer Architecture News (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chen, G.-H., Yang, C.-L., and Xie, S.-L. Gradient-based structural similarity for image quality assessment. In ICIP (2006).Google ScholarGoogle ScholarCross RefCross Ref
  6. FIPS, P. 46-3: Data encryption standard (des). National Institute of Standards and Technology (1999).Google ScholarGoogle Scholar
  7. Grangetto, M., Magli, E., and Olmo, G. Multimedia selective encryption by means of randomized arithmetic coding. Multimedia, IEEE Transactions on (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Im, C., Kim, H., and Ha, S. Dynamic voltage scheduling technique for low-power multimedia applications using buffers. In ISLPED (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jana, S., Pande, A., Chan, A., and Mohapatra, P. Mobile video chat: issues and challenges. Communications Magazine, IEEE (2013).Google ScholarGoogle Scholar
  10. Jun, L., LingLing, Z., Changsheng, X., and Hao, H. A two-way selective encryption algorithm for mpeg video. In IWNAS (2006).Google ScholarGoogle Scholar
  11. Li, S., Ahn, J. H., Strong, R. D., Brockman, J. B., Tullsen, D. M., and Jouppi, N. P. Mcpat: an integrated power, area, and timing modeling framework for multicore and manycore architectures. In MICRO (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Li, S., Chen, G., Cheung, A., Bhargava, B., and Lo, K.-T. On the design of perceptual mpeg-video encryption algorithms. Circuits and Systems for Video Technology, IEEE Transactions on (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Li, Y., Liang, L., Su, Z., and Jiang, J. A new video encryption algorithm for h. 264. In ICICS (2005).Google ScholarGoogle Scholar
  14. Lian, S., Sun, J., Liu, G., and Wang, Z. Efficient video encryption scheme based on advanced video coding. Multimedia Tools and Applications (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lin, W., and Jay Kuo, C.-C. Perceptual visual quality metrics: A survey. Journal of Visual Communication and Image Representation (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Liu, F., and Koenig, H. A survey of video encryption algorithms. Computers & Security (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Liu, Z., and Li, X. Motion vector encryption in multimedia streaming. In MMM (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ma, Z., Hu, H., and Wang, Y. On complexity modeling of h. 264/avc video decoding and its application for energy efficient decoding. Multimedia, IEEE Transactions on (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Mao, Y., and Wu, M. A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Pazarci, M., and Dipçin, V. A mpeg2-transparent scrambling technique. Consumer Electronics, IEEE Transactions on (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Pub, N. F. 197: Advanced encryption standard (aes). Federal Information Processing Standards Publication (2001).Google ScholarGoogle Scholar
  22. Qiao, L., and Nahrstedt, K. A new algorithm for mpeg video encryption. In CISST (1997).Google ScholarGoogle Scholar
  23. Qiao, L., and Nahrstedt, K. Comparison of mpeg encryption algorithms. Computers & Graphics (1998).Google ScholarGoogle Scholar
  24. Raju, C. N., Umadevi, G., Srinathan, K., and Jawahar, C. Fast and secure real-time video encryption. In ICVGIP (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Spanos, G. A., and Maples, T. B. Security for real-time mpeg compressed video in distributed multimedia applications. In PCCC (1996).Google ScholarGoogle ScholarCross RefCross Ref
  26. Tong, L., Dai, F., Zhang, Y., and Li, J. Visual security evaluation for video encryption. In MM (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Wang, Y., O'Neill, M., and Kurugollu, F. The improved sign bit encryption of motion vectors for h. 264/avc. In EUSIPCO (2012).Google ScholarGoogle Scholar
  28. Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P. Image quality assessment: from error visibility to structural similarity. Image Processing, IEEE Transactions on (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Zeng, W., and Lei, S. Efficient frequency domain video scrambling for content access control. In MM (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Zhou, J., Liang, Z., Chen, Y., and Au, O. C. Security analysis of multimedia encryption schemes based on multiple huffman table. Signal Processing Letters, IEEE (2007).Google ScholarGoogle Scholar

Index Terms

  1. Spatio-temporal visual security metric for secure mobile video applications

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  MoVid '15: Proceedings of the 7th ACM International Workshop on Mobile Video
                  March 2015
                  38 pages
                  ISBN:9781450333535
                  DOI:10.1145/2727040
                  • Conference Chairs:
                  • Pål Halvorsen,
                  • Nikil Dutt

                  Copyright © 2015 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 18 March 2015

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  MoVid '15 Paper Acceptance Rate7of14submissions,50%Overall Acceptance Rate18of32submissions,56%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader