An Attack on Wavelet Tree Shuffling Encryption Schemes

  • Samuel Assegie
  • Paul Salama
  • Brian King
Part of the Communications in Computer and Information Science book series (CCIS, volume 78)

Abstract

With the ubiquity of the internet and advances in technology, especially digital consumer electronics, demand for online multimedia services is ever increasing. While it’s possible to achieve a great reduction in bandwidth utilization of multimedia data such as image and video through compression, security still remains a great concern. Traditional cryptographic algorithms/systems for data security are often not fast enough to process the vast amounts of data generated by the multimedia applications to meet the realtime constraints. Selective encryption is a new scheme for multimedia content protection. It involves encrypting only a portion of the data to reduce computational complexity(the amount of data to encrypt)while preserving a sufficient level of security. To achieve this, many selective encryption schemes are presented in different literatures. One of them is Wavelet Tree Shuffling. In this paper we assess the security of a wavelet tree shuffling encryption scheme.

Keywords

Encryption Scheme Wavelet Decomposition Granularity Scalability Enhancement Layer Bandwidth Utilization 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Recommendation for Key Management, Special Publication 800-57 Part 1, NIST, 03/2007Google Scholar
  2. 2.
    Keylength - Cryptographic Key Length Recommendation, http://www.keylength.com
  3. 3.
    Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2004)Google Scholar
  4. 4.
    Kwon, G., Lee, T., Kim, K., Jin, J., Ko, S.: Multimedia digital right management using selective scrambling for mobile handset. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 1098–1103. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Li, W.: Overview of Fine Granularity Scalability in MPEG-4 Video Standard. IEEE Trans. on Circuits & Systems for Video Technology 11(3), 301–317 (2001)CrossRefGoogle Scholar
  6. 6.
    Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Security, 1–18 (2008)Google Scholar
  7. 7.
    Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Proceedings of the 22nd Annual Symposium on Theory of Computing. ACM, New York (1990)Google Scholar
  8. 8.
    Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Processing 15(7), 2061–2075 (2006)CrossRefGoogle Scholar
  9. 9.
    Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing (ICIPŠ 2004), Singapore. IEEE Signal Processing Society (October 2004)Google Scholar
  10. 10.
    Podesser, M., Schmidt, H., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th Nordic Signal Processing Symposium, NORSIG 2002 (2002)Google Scholar
  11. 11.
    Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 9(3), 279–287 (2003)CrossRefGoogle Scholar
  12. 12.
    Said, A., Pearlman, W.A.: A new, fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. Circuits and Systems for Video Technology 6(3), 243–250 (1996)CrossRefGoogle Scholar
  13. 13.
    Salama, P., King, B.: Efficient secure image transmission: compression integrated with encryption. In: Proc. SPIE, vol. SPIE-5681, pp. 47–58 (2005)Google Scholar
  14. 14.
    Shapiro, M.: Embedded Image Coding using Zerotrees of Wavelet Coefficients. IEEE Trans. Signal Processing 41, 3445–3462 (1993)CrossRefMATHGoogle Scholar
  15. 15.
    Shamir, A.: How to share a secret. Comm. of ACM 22(11), 612–613 (1979)MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Stinson, D.: Cryptography: theory and practice, 2nd edn. CRC Press, Boca Raton (2002)MATHGoogle Scholar
  17. 17.
    Uehara, T., Safavi-Naini, R., Ogunbona, P.: Securing wavelet compression with random permutations. In: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, pp. 332–335. IEEE Signal Processing Society (December 2000)Google Scholar
  18. 18.
    Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Boston (2005)MATHGoogle Scholar
  19. 19.
  20. 20.
    Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia 5(1), 118–129 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Samuel Assegie
    • 1
  • Paul Salama
    • 1
  • Brian King
    • 1
  1. 1.Purdue School of Engineering & Tech.Indiana University - Purdue University IndianapolisUSA

Personalised recommendations