8/17/2019 First Follow up.pptx
1/14
Analysis of the tradeo betweecompression ratio and security lein real-time video communicatio
Supervisor:DR. Ahmad FADLALLADR !ohamad RAAD
8/17/2019 First Follow up.pptx
2/14
"lan
"ro#ect outline
$ideo compression%ncryption scheme
Review of related wor&
Future wor&
'(A
8/17/2019 First Follow up.pptx
3/14
"ro#ect outline
).* %+ permonth ,/01 ).2 %+ permonth ,1
u3e data consumption
*4 of tra5c is video
"ossible solution:6se video compression techni7ue to minimi8e the load
+69 9his is not the only concernS%6R;9
8/17/2019 First Follow up.pptx
4/14
"ro#ect outline
• $ideo compression
• Security scheme
• 9radeo between video compression and security level
8/17/2019 First Follow up.pptx
5/14
$ideo compression
• Reduce data si8e by eliminatin3 redundancy• ombinin3 ima3e compression and motion
vector compression• lossy or lossless• an be seen as possibility to send better
7uality while concervin3 the same networ&
capacity
8/17/2019 First Follow up.pptx
6/14
ideo compression
8/17/2019 First Follow up.pptx
7/14
%ncryption
%ncryption is the process of encodin3 messa3es or informatsuch a way that only authori8ed parties can read it.
Several encryption schemes e=ist:• Full encryption where the whole data is encrypted it is secomple=> re7uire hu3e memory and slow
• "ermutation is the fact of interchan3in3 byte location> it?ssimple and fast scheme but 3enerally with low security
• Selective encryption it is considered as li3ht wei3ht encry
that encrypt data and ma&e it secure with a reasonablecomple=ity and time consumption• "erceptual encryption a low 7uality of data used in specia
li&e $oD and "ay per $ideo
8/17/2019 First Follow up.pptx
8/14
eview of related wor&
Meyer and Gadegast
%ncryptin3 !"%@ video stream usin3 RSA and D%S in + mode
Dierent level of security ,eader> eader and D and A component> ; frame> FullSpecial encoder and decoder must be implemented leadin3 to non format complianDemonstrated reduced e5cient demonstrated by Qiao and Naharestedt
Aegis mechanism
• %ncrypt ; frame and eader of !"%@ stream usin3 D%S in + mode• Show the importance of selective encryption• Agi and Gong demonstrated that this mechanism has a low security due
inter correlation between + and " frame and ; Frame• eader encryption un-useful as they are predictable
8/17/2019 First Follow up.pptx
9/14
eview of related wor&
Changgui Shi and Bharat Bhargava
• $ideo %ncryption Al3orithm ,$%A1 for !"%@ stream• %ncryption of D9 coe5cient by BRin3 with secret &ey• %nhanced $%A by encryptin3 D coe5cient and si3n of motion vector• $ulnerable to chosen plain-te=t attac&
iguo Lian, Zhongxuan Liu, Zhen Ren, and Haia !ang
"roposed for .2CA$ video streamSensitive data as intra prediction mode> residue data and motion vector are encryp
8/17/2019 First Follow up.pptx
10/14
eview of related wor&
Bergeron and Lamy Bergot
• %ncrypt .2C $ideo stream usin3 A%S•
Format compliant scheme with possibility of insertin3 encryption in encode• %ncryption bit that have no or ne3li3ible eect on compression ration• Lac& of crypto3raphic security
A"omhara and a
• %ncryptin3 .2CA$ ; frame usin3 /E-bit A%S•
Reduced computational comple=ity and simple to implement• !ust ta&e in consideration + and " frame
8/17/2019 First Follow up.pptx
11/14
Future wor&
+riey tal&in3 we can resume previous wor& as:
/. ; frame encryption. D9 coe5cient encryption
).!$ encryption
C.Ghole encryption
8/17/2019 First Follow up.pptx
12/14
Future wor&
;n our pro#ect $"E is used as video compressiontechni7ue:• Bpen source techni7ue• Gidely implemented and supported ,
hrome> !o8illa> Bpera H1• !ature techni7ue and recently a mandatory encoder
to implement in G%+R9• 9he frame by frame processin3
Simulation will ta&e in consideration one> more or acombination of selective encryption scheme.;n order to analy8e the tradeo between compressionratio an security level in a real time videocommunication.
8/17/2019 First Follow up.pptx
13/14
Discussion
8/17/2019 First Follow up.pptx
14/14
References
• isco $isual Ietwor&in3 inde=: @lobal !obile Data 9ra5c Forecast 6p/0-
• L.'iao and J. Iahrstedt >KAnew Al3orithm for !"%@ $ideo %ncryption•
M.!eyer and F.@ade3ast >KSecurity mechanism for multimedia-data we=ample !"%@-;-$ideo• ;.A3i and L.@on3> An %mpirical study of secure !"%@ $ideo 9ransmis• @.Spanos and 9.!aples K"erformance of a selective encryption schem
security of networ&ed> Real-9ime $ideo• .Shi and +.+har3ava> KAn e5cient !"%@ $ideo %ncryption Al3orithm• M.Gen and al.> K A format-compliant conN3urable encryption framewo
access control of multimedia• G.Oen3 and S. Lei> K%5cirnt Fre7uency domain selective scramblin3
video• .+er3eron and . +er3ot> Kompliant Selective encryption for .2C
$ideo Streams• S.Lian and al.>Secure Advanced $ideo codin3 +ased on selective enc
al3orithms•
!.Abomhara and al> K%nhancin3 selective encryption for .2CA$ 6advanced %ncryption Standard