+ All Categories
Home > Documents > 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption Special application of general...

1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption Special application of general...

Date post: 26-Dec-2015
Category:
Upload: ethelbert-stevens
View: 223 times
Download: 0 times
Share this document with a friend
Popular Tags:
31
1 Multimedia Encryption Sistem Multimedia
Transcript
Page 1: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

1

Multimedia Encryption

Sistem Multimedia

Page 2: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

2

Multimedia Encryption Special application of general encryption

to multimedia such that the content cannot be rendered intelligibly or to an acceptable perceptual quality.

Have a number of unique requirements and desirable features that a general cryptosystem lacks.

Different applications may have a different list of requirements and a different order of priorities. Trade-off may be necessary

Page 3: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

3

Applications Confidential videoconferences Confidential facsimile transmissions Medical image transmission and storage Streaming media DVD content protection Pay-TV Digital transmission through IEEE 1394

interface

Page 4: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

4

Characteristics of Multimedia Applications Characteristics High data rate Power hungry Real-time constraint Continuous Synchronous Loss-tolerant Prioritized components Different values of content

Different security requirements Different distribution channels

DVD, Satellite TV, Internet, wireless

Page 5: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

5

Box Office Revenues vsTime

Page 6: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

6

Major Requirements and Desirable Features Complexity is an important consideration

Real-time applications, low-power device Content leakage (or perceptibility)

Content degradation vs. secrecy Compression efficiency overhead

Due to change of compression parameters/procedure, change of data statistics, additional header etc.

Error resilience. Error confinement in lossynetwork, synchronization

Adaptability and scalability Dynamic bandwidth/resources, Encryption be

transparent to an adaptation process

Page 7: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

7

Major Requirements and Desirable Features(cont.) Multi-level Encryption

Enable multiple accesses: resolution, quality, size, frame rate

“what you see is what you pay “ Syntax compliance

Transparent , “backward”compatibility, inherit other nice properties of compression standards.

Content agnostic Encryption does not depend on content types or the

specific coding technology E.g., Windows Media Rights Manager , OMA’sDRM

Random access, transparency, scene change detection without decryption

Page 8: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

8

Encryption and Compression

Page 9: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

9

Security Break of Multimedia Encryption Complete break

Recover full plain bitstreamby finding the key etc, Perceptual break

Render acceptable perceptual quality or recover certain content information without a key

Local break Deduce a local plain bitstream/content information

Information deduction Gain certain information, less severe break

Page 10: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

10

Attacks on Multimedia Encryption Traditional attacks Additional attacks that exploit the unique

features of multimedia data Statistical attack

Exploit correlation between different portions of multimedia data

Especially for selective encryption Compression makes the attack difficult, fortunately

Error-concealment based attack Perceptual redundancy exists in compressed media Perceptual break is possible, i.e. conceal encrypted

data

Page 11: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

11

Multimedia Encryption Approaches Conventional/Naïve approach

Encrypt a compressed codestreamas a whole Full Encryption Selective Encryption Joint Compression and Encryption Syntax-Compliant Encryption Scalable Encryption and Multi-Access

Encryption

Page 12: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

12

Conventional Approaches Directly distort visual data in spatial domain

Difficult to compress, potentially high complexity Vulnerable to correlation attacks

Encrypt compressed data using DES etc. Significant processing overhead

Difficulty in some real-time application with low-power device

Plain text attack using known syntax Not secure for adaptation at intermediate nodes

require key to decompress/decrypt/re-code/re-encrypt Little transparency

Page 13: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

13

Fast Encryption Encrypt half of the compressed

bitstream( Qiao& Nahrstedt’97 ) Using XOR + DES

Encrypt (A, B) as (DES(A), (A XOR B) ) Secure, speedup by a factor of two

Page 14: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

14

Full Encryption Approach

Partition and packetizecompressed bitstreaminto structured data packets with header and data field

Apply encryption to the data field and leave headers unencrypted

Decryption info inserted into headers Usually works with a multimedia format that supports

encryption,e.g., Microsoft’s ASF Strength

Allow parsing and extracting basic info without decryption

Highest security, small overhead for decryption info Content agnostic

Limitation: complexity, limited flexibility

Page 15: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

15

Selective Encryption Only I-frame/blocks encrypted (Maples &

Spanos’95, Meyer & Gadegast’95 ) Reduce processing overhead/delay Not sufficient security Plain text attack using known syntax Not very secure for trans-coding Little transparency

Sign bits, MVs(Shi & Bhargava’98, Zeng & Lei’99, Wen et al’01)

Privacy/security low due to information leakage Useful for apps focusing on introducing quality

degradation

Page 16: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

16

Joint Scrambling and Compression Shuffle DCT coefficients within 8x8 block (Tang

96) Randomize 8x8 DCT coefficient scan order

Simple Some level of security

Local scrambling -> spatial energy distribution unchanged -> less effective scrambling

Significantly reduce compression efficiency (up to 50%) –destroy run-length statistics

Shuffle lines of wavelet coefficients ( Macq& Quisquater’94 ) Change 2-D statistical property, Reduce compression efficiency

Page 17: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

17

Joint Scrambling and Compression Selective scrambling in transform domain, prior

to compression (Zeng & Lei’99) Advantages

Simple and efficient. Provides different levels of security, Allows more flexible selective encryption

easier for locating what data to be selected Limited adverse impact on compression efficiency, Allow transparency Allow trans-coding without decryption Allow other useful features without decryption

Page 18: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

18

Overview

Page 19: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

19

Wavelet Based Systems

A 3-level subbanddecomposition

• Allow some level of transparency•e.g, free access to low resolution•require key for high definition TV

Page 20: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

20

Wavelet Based Systems Goal:

Scrambling/shuffling that does not destroy statistical properties of each subband

Selective bit scrambling Sign encryption

sign bits: “uncompressible”, but critical to image quality

Block shuffling Divide each subandinto kblocks Shuffle the blocks within a subband

retain local2-D statistics Different shuffling tables for different subbands

Page 21: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

21

Wavelet Based Systems Block rotation

Rotate each block Special case of shuffling coefficients

within block

Page 22: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

22

Security Analysis Sign encryption

M: # of non zero coefficients 2Mtrials (including inverse transform) for complete

recovery example: M=256 ------> 1075trials

Block shuffling kblocks, nzero blocks # of different permutation: k!/n! example: k=64, n=48 ----> K!/n!=1028

each permutation requires an inverse wavelet transform Block rotation (+shuffling)

# of configuration: (8*k)!/(8*n)! >>K!/n! Other attacks? Your exercises!

Page 23: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

23

Wavelet-based System

Page 24: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

24

Wavelet-based SystemPSNR

Table 1: Impact of different scrambling techniques on compression efficiency. Image sizes are 512x512, 5-level decomposition, 64 blocks each band.

Page 25: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

25

DCT Based Systems JPEG/MPEG/H.26x Video compression

GOP (I BBPBBP…) I: intra-frame P, Bpredictive-coded frames

block: 8x8, for DCT coding, zigzagordering of DCT coefficients

Macroblock(MB): 4 lum. blocks + 2 chrom Blocks unit for motion compensation intra-coded vs. predictive coded

Slice: a horizontal strip of MBs

Page 26: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

26

DCT Based Systems DCT coefficient scrambling

Sign encryption Coefficient shuffling within each slice

shuffle coefficients of sameband little impact on compression efficiency each band has a different shuffling tables

Motion vector scrambling for P, B frames Sign flipping MV shuffling within each slice Important for distorting motion information

Dynamic-keys for more secure video transmission

Page 27: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

27

I-Frames of DCT-based System

Page 28: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

28

I-Frames of DCT-based System

Table 2: Impact of different scrambling techniques on compression efficiency for one I frame of “carphone”sequence.

Page 29: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

29

DCT-based System (Sequence)

Table 3: Impact of different scrambling techniques on compression efficiency for 41 (one I frame followed by 40 P frames) frames of “carphone”sequence

Page 30: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

30

Video Demo

Page 31: 1 Multimedia Encryption Sistem Multimedia. 2 Multimedia Encryption  Special application of general encryption to multimedia such that the content cannot.

31

References T. Maples and G. Spanos, “Performance study of a selective encryption

scheme for the security of networked, real-time video," Proc. 4th Inter. Conf. Computer Communications and Networks, Las Vegas, Nevada, Sept. 1995.

J. Meyer and F. Gadegast, “Security mechanisms for multimedia data with the example MPEG-1 video,”http://www.cs.tuberlin.de/phade/phade/secmpeg.html, 1995.

C. Shi and B. Bhargava, “A fast MPEG video encryption algorithm,”Proc. ACM Multimedia, pp. 81-88, 1998.

L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently,”Proc. ACM Multimedia, 1996.

W. Zeng and S. Lei, “Efficient frequency domain selective scrambling of digital video”, IEEE Tran. Multimedia,vol. 5, no. 1, pp. 118-129, March 2003. A preliminary version also in Proc. ACM Multimedia, Nov. 1999.

Bin Zhu, “Multimedia encryption, “book chapter in Zeng, Yu, and Lin (Eds), Multimedia Security Technologies for Digital Rights Management, ISBN: 0-12-369476-0, Elsevier, July 2006.


Recommended