The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - Oct.-Dec. (2013 vol.20)
pp: 50-61
Amit Pande , University of California, Davis
Prasant Mohapatra , University of California, Davis
Joseph Zambreno , Iowa State University
ABSTRACT
Algorithmic parameterization and hardware architectures can ensure secure transmission of multimedia data in resource-constrained environments such as wireless video surveillance networks, telemedicine frameworks for distant health care support in rural areas, and Internet video streaming. Joint multimedia compression and encryption techniques can significantly reduce the computational requirements of video processing systems. The authors present an approach to reduce the computational cost of multimedia encryption while also preserving the properties of compressed video. A hardware-amenable design of the proposed algorithms makes them suitable for real-time embedded multimedia systems. This approach alleviates the need for additional hardware for encryption in resource-constrained scenarios and can be otherwise used to augment existing encryption methods used for content delivery on the Internet or in other applications. This work shows how two compression blocks for video coding--a modified frequency transform (called a secure wavelet transform or SWT) and a modified entropy coding scheme (called a chaotic arithmetic coding or CAC)--can be used for video encryption. Experimental results are shown for selective encryption using the proposed schemes.
INDEX TERMS
Encryption, Content analysis, Discrete wavelet transforms, Streaming media, Multimedia communication, Encoding,arithmetic coding, multimedia, video encryption, joint coding and encryption, embedded systems, discrete wavelet transform
CITATION
Amit Pande, Prasant Mohapatra, Joseph Zambreno, "Securing Multimedia Content Using Joint Compression and Encryption", IEEE MultiMedia, vol.20, no. 4, pp. 50-61, Oct.-Dec. 2013, doi:10.1109/MMUL.2012.29
REFERENCES
1. O. Oyman et al., “Toward Enhanced Mobile Video Services over Wimax and LTE [Wimax/LTE Update],” IEEE Comm. Magazine, vol. 48, no. 8, 2010, pp. 68-76.
2. C.E. Shannon, “Communication Theory of Secrecy Systems,” Bell Systems Technical J., vol. 28, 1949, pp. 656-715.
3. A. Cohen, I. Daubechies, and J.-C. Feauveau, “Biorthogonal Bases of Compactly Supported Wavelets,” Comm. Pure Appl. Math., vol. 45, 1992, pp. 485-560.
4. D. Tay, “Rationalizing the Coefficients of Popular Biorthogonal Wavelet Filters,” IEEE Trans. Circuits and Systems for Video Technology, vol. 10, no. 6, 2000, pp. 998-1005.
5. A. Pande and J. Zambreno, “Poly-DWT: Polymorphic Wavelet Hardware Support for Dynamic Image Compression,” ACM Trans. Embedded Computing Systems, vol. 11, no. 1, 2012, article no. 6.
6. D. Engel and A. Uhl, “Parameterized Biorthogonal Wavelet Lifting for Lightweight JPEG 2000 Transparent Encryption,” Proc. ACM 7th Workshop Multimedia and Security (MM&Sec), ACM, 2005, pp. 63-70.
7. Z. Liu and N. Zheng, “Parametrization Construction of Biorthogonal Wavelet Filter Banks for Image Coding,” Signal, Image and Video Processing, vol. 1, no. 1, 2007, pp. 63-76.
8. A. Pande and J. Zambreno, “The Secure Wavelet Transform,” J. Real-Time Image Processing, vol. 7, no. 2, 2012, pp. 131-142.
9. R. Bose and S. Pathak, “A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System,” IEEE Trans. Circuits and Systems I, vol. 53, no. 4, 2006, pp. 848-857.
10. G. Jakimoski and K. Subbalakshmi, “Cryptanalysis of Some Multimedia Encryption Schemes,” IEEE Trans. Multimedia, vol. 10, no. 3, 2008, pp. 330-338.
11. M. Grangetto, E. Magli, and G. Olmo, “Multimedia Selective Encryption by Means of Randomized Arithmetic Coding,” IEEE Trans. Multimedia, vol. 8, no. 5, 2006, pp. 905-917.
12. H. Kim, J. Wen, and J. Villasenor, “Secure Arithmetic Coding,” IEEE Trans. Signal Processing, vol. 55, no. 5, 2007, pp. 2263-2272.
13. N. Nagaraj and P.G. Vaidya, “One-Time Pad, Arithmetic Coding and Logic Gates: An Unifying Theme Using Dynamical Systems,” Computing Research Repository, vol. 803, 2008.
14. A. Pande, P. Mohapatra, and J. Zambreno, “Using Chaotic Maps for Encrypting Image and Video Content,” Proc. IEEE Int'l Symp. of Multimedia, IEEE CS, 2011, pp. 171-178.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool