Video JET: packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data
Abstract
Media encryption technologies actively play the first line of defense in securing the access of multimedia data. Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped creating packet loss. In order to achieve robust media encryption, the requirement of error resilience can be achieved with error-resilient media transmission. This study proposes a video joint encryption and transmission (video JET) scheme by exploiting media hash-embedded residual data to achieve motion estimation and compensation for recovering lost packets, while maintaining format compliance and cryptographic provable security. Interestingly, since video block hash preserves the condensed content to facilitate search of similar blocks, motion estimation is implicitly performed through robust media hash matching – which is the unique characteristic of our method. We analyze and compare the performance of resilience to (bursty) packet loss between the proposed method and forward error correction (FEC), which has been extensively employed to protect video packets over error-prone networks. The feasibility of our packet loss-resilient video JET approach is further demonstrated through experimental results.
Keywords
(Selective) Encryption Embedding Error concealment Error resilience Media hashing Motion estimation/compensation Packet lossNotes
Acknowledgements
This research was supported by the National Science Council, Taiwan, ROC, under NSC grants 94-2213-E-001-027 and NSC 95-2422-H-001-008.
References
- 1.Aaron A, Rane S, Girod B (2004) Wyner-Ziv video coding with hash-based motion compensation at the receiver. In: Proc IEEE int conf on image processing, vol 5, pp 3097–3100Google Scholar
- 2.Ayanoglu E, Pancha R, Reibman AR, Talwar S (1996) Forward error control for MPEG-2 video transport in a wireless ATM LAN. ACM/Baltzer Mob Netw Appl 1(3):245–258CrossRefGoogle Scholar
- 3.Chen M, He Y, Landgelijk RL (2005) A fragile watermark error detection scheme for wireless video communications. IEEE Trans Multimedia 7(2):201–211CrossRefGoogle Scholar
- 4.Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264/ISO/IEC 14 496-10 AVC (2003) In: Joint video team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVTG050Google Scholar
- 5.Fridrich J (2000) Visual hash for oblivious watermarking. In: Proc SPIE: security and watermarking of multimedia contents II, vol 3971, pp 286–294Google Scholar
- 6.IEEE (2002) IEEE Int Workshop on Multimedia Signal Processing. Special session on media recognitionGoogle Scholar
- 7.IEEE (2004) IEEE Int Conf on Multimedia and Expo. Special session on media identificationGoogle Scholar
- 8.Kang LW, Lu CS (2006) Low-complexity wyner-ziv video coding based on robust media hashing. In: Proc IEEE int workshop on multimedia signal processing, CanadaGoogle Scholar
- 9.Kang LW, Lu CS (2006) Wyner-ziv video coding with coding mode hiding-based motion compensation. In: Proc IEEE int conf on image processing, USAGoogle Scholar
- 10.Lee M, Nepal S, Srinivasan U (2003) Role of edge detection in video semantics. In: Proc ACS conferences in research and practice in information technology, vol 22, pp 59–68Google Scholar
- 11.Li B, Chang E, Wu CT (2002) DPF—a perceptual distance function for image retrieval. In: Proc IEEE int conf on image processing, vol 2, pp II-597–II-600Google Scholar
- 12.Liang YJ, Apostolopoulos JG, Girod B (2003) Analysis of packet loss for compressed video: does burst-length matter? In: Proc IEEE int conf on acoustics, speech, and signal processingGoogle Scholar
- 13.Lin CY, Chang SF (2001) A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153–168CrossRefMathSciNetGoogle Scholar
- 14.Lin CY, Sow D, Chang SF (2001) Using self-authentication-and-recovery images for error concealment in wireless environments. In: SPIE ITCom/OptiComm, vol 4518, pp 267–274Google Scholar
- 15.Lu CS (2002) Wireless multimedia error resilience via a data hiding technique. In: Proc 5th IEEE int workshop on multimedia signal processing, pp 316–319Google Scholar
- 16.Lu CS, Hsu CY (2005) Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. ACM Multimedia Syst J Spec Issue Multimedia Secur 11(2):159–173Google Scholar
- 17.Lu CS, Mark Liao HY (2003) Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimedia 5(2):161–173CrossRefGoogle Scholar
- 18.Moccagatta I, Soudagar A, Liang J, Chen H (2000) Error-resilient coding in JPEG-2000 and MPEG-4. IEEE J Sel Areas Commun 18(6):899–914CrossRefGoogle Scholar
- 19.Ortega A, Ramchandran K (1998) Rate-distortion methods for image and video compression. IEEE Signal Process Mag 15:23–50CrossRefGoogle Scholar
- 20.Pongpadpinit W, Pearmain A (2006) Recovery of motion vectors for error concealment based on an edge-detection approach. IEEE Proc Vis Image Signal Process 153(1):63–69CrossRefGoogle Scholar
- 21.Puri R, Ramchandran K, Lee KW, Bharghavan V (2001) Forward error correction (FEC) codes based multiple description coding for internet video streaming and multicast. Signal Process Image Commun 16:745–762CrossRefGoogle Scholar
- 22.Roh KC, Seoa KD, Kim JK (2002) Data partitioning and coding of DCT coefficients based on requantization for error-resilient transmission of video. Signal Process Image Commun 17:573–585CrossRefGoogle Scholar
- 23.Sehgal A, Jagmohan A, Ahuja N (2004) Wyner-Ziv coding of video: an error-resilient compression framework. IEEE Trans Multimedia 6(2):249–258CrossRefGoogle Scholar
- 24.Shanableh T, Ghanbari M (2003) Loss concealment uing B-pictures motion information. IEEE Trans Multimedia 5(2):249–258CrossRefGoogle Scholar
- 25.Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Conference on Multimedia ’98. ACM, New York, pp 81–88CrossRefGoogle Scholar
- 26.Shirani S, Kossentini F, Ward R (2000) A concealment method for video communications in an error-prone environment. IEEE J Sel Areas Commun 18(6):1122–1128CrossRefGoogle Scholar
- 27.Song J, Liu KJR (2001) A data embedded video coding scheme for error-prone channels. IEEE Trans Multimedia 3(4):415–423CrossRefGoogle Scholar
- 28.Sun SW, Chen JR, Lu CS, Chang PC, Fan KC (2006) Motion-embedded residual error for packet loss recovery of video transmission and encryption. In: Proc IS&T/SPIE: visual communications and image processing (EI127), vol 6077, pp 452–465Google Scholar
- 29.Tosun A, Feng WC (2001) On error preserving encryption algorithms for wireless video transmission. In: Proc ACM conf on multimedia, pp 302–308Google Scholar
- 30.Tsekeridou S, Pitas I (2000) MPEG-2 error concealment based on block-matching principles. IEEE Trans Circuits Syst Video Technol 10(4):646–658CrossRefGoogle Scholar
- 31.Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
- 32.Wen J, Severa M, Zeng W, Luttrell MH, Jin W (2002) A format-compliant configurable encryption framework for access control of video. IEEE Trans Circuits Syst Video Technol 12(6):545–557CrossRefGoogle Scholar
- 33.Xu X, Dexter S, Eskicioglu AM (2004) A hybrid scheme of encryption and watermarking. In: IS&T/SPIE symposium on electronic imaging 2004, security, steganography, and watermarking of multimedia contents VI conference, vol 5306, pp 725–736Google Scholar
- 34.Yin P, Wu M, Liu B (2002) A robust error resilient approach for mpeg video transmission over internet. In: Proc SPIE: visual communication and image processing, vol 4671, pp 103–111Google Scholar
- 35.Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimedia 5(1):118–129CrossRefGoogle Scholar
- 36.Zeng W, Zhuang X, Lan J (2004) Network friendly media security: rationales, solutions, and open issues. In: Proc IEEE int conf on image processing, vol 1, pp 565–568Google Scholar
- 37.Zhu BB, Yuan C, Wang Y, Li S (2005) Scalable protection for MPEG-4 fine granularity scalability. IEEE Trans Multimedia 7(2):222–233CrossRefGoogle Scholar
- 38.Ziviani A, Wolfinger BE, Rezende JF, Duarte OCMB, Fdida S (2005) Joint adoption of qos schemes for mpeg streams. Multimedia Tools Appl 26(1):59–80CrossRefGoogle Scholar