Multimedia Tools and Applications

, Volume 44, Issue 2, pp 249–278 | Cite as

Video JET: packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data

  • Jian-Ru Chen
  • Shih-Wei Sun
  • Chun-Shien Lu
  • Pao-Chi Chang
Article

Abstract

Media encryption technologies actively play the first line of defense in securing the access of multimedia data. Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped creating packet loss. In order to achieve robust media encryption, the requirement of error resilience can be achieved with error-resilient media transmission. This study proposes a video joint encryption and transmission (video JET) scheme by exploiting media hash-embedded residual data to achieve motion estimation and compensation for recovering lost packets, while maintaining format compliance and cryptographic provable security. Interestingly, since video block hash preserves the condensed content to facilitate search of similar blocks, motion estimation is implicitly performed through robust media hash matching – which is the unique characteristic of our method. We analyze and compare the performance of resilience to (bursty) packet loss between the proposed method and forward error correction (FEC), which has been extensively employed to protect video packets over error-prone networks. The feasibility of our packet loss-resilient video JET approach is further demonstrated through experimental results.

Keywords

(Selective) Encryption Embedding Error concealment Error resilience Media hashing Motion estimation/compensation Packet loss 

Notes

Acknowledgements

This research was supported by the National Science Council, Taiwan, ROC, under NSC grants 94-2213-E-001-027 and NSC 95-2422-H-001-008.

References

  1. 1.
    Aaron A, Rane S, Girod B (2004) Wyner-Ziv video coding with hash-based motion compensation at the receiver. In: Proc IEEE int conf on image processing, vol 5, pp 3097–3100Google Scholar
  2. 2.
    Ayanoglu E, Pancha R, Reibman AR, Talwar S (1996) Forward error control for MPEG-2 video transport in a wireless ATM LAN. ACM/Baltzer Mob Netw Appl 1(3):245–258CrossRefGoogle Scholar
  3. 3.
    Chen M, He Y, Landgelijk RL (2005) A fragile watermark error detection scheme for wireless video communications. IEEE Trans Multimedia 7(2):201–211CrossRefGoogle Scholar
  4. 4.
    Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264/ISO/IEC 14 496-10 AVC (2003) In: Joint video team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVTG050Google Scholar
  5. 5.
    Fridrich J (2000) Visual hash for oblivious watermarking. In: Proc SPIE: security and watermarking of multimedia contents II, vol 3971, pp 286–294Google Scholar
  6. 6.
    IEEE (2002) IEEE Int Workshop on Multimedia Signal Processing. Special session on media recognitionGoogle Scholar
  7. 7.
    IEEE (2004) IEEE Int Conf on Multimedia and Expo. Special session on media identificationGoogle Scholar
  8. 8.
    Kang LW, Lu CS (2006) Low-complexity wyner-ziv video coding based on robust media hashing. In: Proc IEEE int workshop on multimedia signal processing, CanadaGoogle Scholar
  9. 9.
    Kang LW, Lu CS (2006) Wyner-ziv video coding with coding mode hiding-based motion compensation. In: Proc IEEE int conf on image processing, USAGoogle Scholar
  10. 10.
    Lee M, Nepal S, Srinivasan U (2003) Role of edge detection in video semantics. In: Proc ACS conferences in research and practice in information technology, vol 22, pp 59–68Google Scholar
  11. 11.
    Li B, Chang E, Wu CT (2002) DPF—a perceptual distance function for image retrieval. In: Proc IEEE int conf on image processing, vol 2, pp II-597–II-600Google Scholar
  12. 12.
    Liang YJ, Apostolopoulos JG, Girod B (2003) Analysis of packet loss for compressed video: does burst-length matter? In: Proc IEEE int conf on acoustics, speech, and signal processingGoogle Scholar
  13. 13.
    Lin CY, Chang SF (2001) A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153–168CrossRefMathSciNetGoogle Scholar
  14. 14.
    Lin CY, Sow D, Chang SF (2001) Using self-authentication-and-recovery images for error concealment in wireless environments. In: SPIE ITCom/OptiComm, vol 4518, pp 267–274Google Scholar
  15. 15.
    Lu CS (2002) Wireless multimedia error resilience via a data hiding technique. In: Proc 5th IEEE int workshop on multimedia signal processing, pp 316–319Google Scholar
  16. 16.
    Lu CS, Hsu CY (2005) Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. ACM Multimedia Syst J Spec Issue Multimedia Secur 11(2):159–173Google Scholar
  17. 17.
    Lu CS, Mark Liao HY (2003) Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimedia 5(2):161–173CrossRefGoogle Scholar
  18. 18.
    Moccagatta I, Soudagar A, Liang J, Chen H (2000) Error-resilient coding in JPEG-2000 and MPEG-4. IEEE J Sel Areas Commun 18(6):899–914CrossRefGoogle Scholar
  19. 19.
    Ortega A, Ramchandran K (1998) Rate-distortion methods for image and video compression. IEEE Signal Process Mag 15:23–50CrossRefGoogle Scholar
  20. 20.
    Pongpadpinit W, Pearmain A (2006) Recovery of motion vectors for error concealment based on an edge-detection approach. IEEE Proc Vis Image Signal Process 153(1):63–69CrossRefGoogle Scholar
  21. 21.
    Puri R, Ramchandran K, Lee KW, Bharghavan V (2001) Forward error correction (FEC) codes based multiple description coding for internet video streaming and multicast. Signal Process Image Commun 16:745–762CrossRefGoogle Scholar
  22. 22.
    Roh KC, Seoa KD, Kim JK (2002) Data partitioning and coding of DCT coefficients based on requantization for error-resilient transmission of video. Signal Process Image Commun 17:573–585CrossRefGoogle Scholar
  23. 23.
    Sehgal A, Jagmohan A, Ahuja N (2004) Wyner-Ziv coding of video: an error-resilient compression framework. IEEE Trans Multimedia 6(2):249–258CrossRefGoogle Scholar
  24. 24.
    Shanableh T, Ghanbari M (2003) Loss concealment uing B-pictures motion information. IEEE Trans Multimedia 5(2):249–258CrossRefGoogle Scholar
  25. 25.
    Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Conference on Multimedia ’98. ACM, New York, pp 81–88CrossRefGoogle Scholar
  26. 26.
    Shirani S, Kossentini F, Ward R (2000) A concealment method for video communications in an error-prone environment. IEEE J Sel Areas Commun 18(6):1122–1128CrossRefGoogle Scholar
  27. 27.
    Song J, Liu KJR (2001) A data embedded video coding scheme for error-prone channels. IEEE Trans Multimedia 3(4):415–423CrossRefGoogle Scholar
  28. 28.
    Sun SW, Chen JR, Lu CS, Chang PC, Fan KC (2006) Motion-embedded residual error for packet loss recovery of video transmission and encryption. In: Proc IS&T/SPIE: visual communications and image processing (EI127), vol 6077, pp 452–465Google Scholar
  29. 29.
    Tosun A, Feng WC (2001) On error preserving encryption algorithms for wireless video transmission. In: Proc ACM conf on multimedia, pp 302–308Google Scholar
  30. 30.
    Tsekeridou S, Pitas I (2000) MPEG-2 error concealment based on block-matching principles. IEEE Trans Circuits Syst Video Technol 10(4):646–658CrossRefGoogle Scholar
  31. 31.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  32. 32.
    Wen J, Severa M, Zeng W, Luttrell MH, Jin W (2002) A format-compliant configurable encryption framework for access control of video. IEEE Trans Circuits Syst Video Technol 12(6):545–557CrossRefGoogle Scholar
  33. 33.
    Xu X, Dexter S, Eskicioglu AM (2004) A hybrid scheme of encryption and watermarking. In: IS&T/SPIE symposium on electronic imaging 2004, security, steganography, and watermarking of multimedia contents VI conference, vol 5306, pp 725–736Google Scholar
  34. 34.
    Yin P, Wu M, Liu B (2002) A robust error resilient approach for mpeg video transmission over internet. In: Proc SPIE: visual communication and image processing, vol 4671, pp 103–111Google Scholar
  35. 35.
    Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimedia 5(1):118–129CrossRefGoogle Scholar
  36. 36.
    Zeng W, Zhuang X, Lan J (2004) Network friendly media security: rationales, solutions, and open issues. In: Proc IEEE int conf on image processing, vol 1, pp 565–568Google Scholar
  37. 37.
    Zhu BB, Yuan C, Wang Y, Li S (2005) Scalable protection for MPEG-4 fine granularity scalability. IEEE Trans Multimedia 7(2):222–233CrossRefGoogle Scholar
  38. 38.
    Ziviani A, Wolfinger BE, Rezende JF, Duarte OCMB, Fdida S (2005) Joint adoption of qos schemes for mpeg streams. Multimedia Tools Appl 26(1):59–80CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Jian-Ru Chen
    • 1
  • Shih-Wei Sun
    • 1
  • Chun-Shien Lu
    • 1
  • Pao-Chi Chang
    • 2
  1. 1.Institute of Information ScienceAcademia SinicaTaipeiRepublic of China
  2. 2.Department Communication EngineeringNational Central Univ.Chung-LiRepublic of China

Personalised recommendations