首页> 外文学位 >Perceptual Video Encryption System: A Multiple Transforms Approach.
【24h】

Perceptual Video Encryption System: A Multiple Transforms Approach.

机译:感知视频加密系统:多种转换方法。

获取原文
获取原文并翻译 | 示例

摘要

With the increase of multimedia applications on the internets, security in digital video information has become more important. For instance, in commercial Video-On-Demand (VoD), PayTV, and Pay-Per View applications, it is very critical that only the customers who have paid for the service can enjoy the high-quality video. Since video data are transmitted through public internet, it is thus possible that one un-authorized person somehow obtains the data during the transmission. On the other hand, it would also be a good idea to provide a down-grade version of videos to potential customers as preview before they decide whether they want to subscribe to the service or not. As such, the idea of Perceptual Video Encryption has been introduced in the past few years. Different from traditional fully confidential video encryption, perceptual video encryption does not require the encrypted video signal to be robust to all the complicated and time consuming security attacks. The main aim is to introduce a fast and efficient algorithm which provides a certain level of protection to the video signal. In addition, as the encrypted signal will also be used as the preview, quality assessment of this downgrade video signal is also another important issue to consider.;In this thesis, we propose that the perceptual encryption can be performed at a stage within the video encoding process that had never been considered before: the transformation stage. To this end, we first design a number of new unitary transforms based on some plane-based rotations in the flow graph structure of the well-known discrete cosine transform (DCT). We demonstrate that these new transforms are performing as efficiently as the DCT does in the coding of predicted residual signals. Then, our new perceptual encryption is constructed by using these new transforms together with the DCT but alternately, i.e., we select one out of multiple transforms in each video block according to the encryption key. This algorithm is tested extensively with the H.264 and MPEG-4 codec. Both the PSNR-based and SSIM-based results are presented to demonstrate the effectiveness of our new encryption algorithm. In order to evaluate the proposed scheme fairly, a full analysis of various assessment schemes is performed. In addition, several improved extensions on the proposed scheme are presented. Finally, security analysis is also performed to test the resistance of our algorithm to different types of attacks.
机译:随着互联网上多媒体应用的增加,数字视频信息的安全性变得越来越重要。例如,在商业视频点播(VoD),PayTV和按次付费观看应用程序中,至关重要的是,只有为该服务付费的客户才能享受高质量的视频。由于视频数据是通过公共互联网传输的,因此,一个未经授权的人有可能在传输过程中以某种方式获取数据。另一方面,在潜在客户决定是否要订阅该服务之前,向他们提供降级版本的视频作为预览也是一个好主意。因此,在过去几年中引入了感知视频加密的思想。与传统的完全机密视频加密不同,感知视频加密不需要加密的视频信号对所有复杂且耗时的安全攻击具有鲁棒性。主要目的是介绍一种快速有效的算法,为视频信号提供一定程度的保护。另外,由于加密信号也将用作预览,因此对降级视频信号的质量评估也是需要考虑的另一个重要问题。本文提出了可以在视频内的某个阶段进行感知加密的方法。之前从未考虑过的编码过程:转换阶段。为此,我们首先基于众所周知的离散余弦变换(DCT)的流程图结构中的一些基于平面的旋转,设计了许多新的unit变换。我们证明了这些新的变换在预测残差信号的编码中与DCT一样有效。然后,通过将这些新的变换与DCT一起使用来构造我们的新感知加密,但也可以交替使用,即,我们根据加密密钥从每个视频块的多个变换中选择一个。该算法已使用H.264和MPEG-4编解码器进行了广泛的测试。提出了基于PSNR和基于SSIM的结果,以证明我们新加密算法的有效性。为了公平地评估所提出的方案,对各种评估方案进行了全面分析。另外,提出了对所提议方案的一些改进的扩展。最后,还进行了安全性分析,以测试我们的算法对不同类型攻击的抵抗力。

著录项

  • 作者

    Au Yeung, Siu Kei.;

  • 作者单位

    Hong Kong University of Science and Technology (Hong Kong).;

  • 授予单位 Hong Kong University of Science and Technology (Hong Kong).;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 119 p.
  • 总页数 119
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号