On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.

Slides:



Advertisements
Similar presentations
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Advertisements

T.Sharon-A.Frank 1 Multimedia Compression Basics.
Data Compression CS 147 Minh Nguyen.
Michael Alves, Patrick Dugan, Robert Daniels, Carlos Vicuna
Basics of MPEG Picture sizes: up to 4095 x 4095 Most algorithms are for the CCIR 601 format for video frames Y-Cb-Cr color space NTSC: 525 lines per frame.
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
SWE 423: Multimedia Systems
EE442—Multimedia Networking Jane Dong California State University, Los Angeles.
SWE 423: Multimedia Systems
Spatial and Temporal Data Mining
Computer Science 335 Data Compression.
Losslessy Compression of Multimedia Data Hao Jiang Computer Science Department Sept. 25, 2007.
CS :: Fall 2003 MPEG-1 Video (Part 1) Ketan Mayer-Patel.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
T.Sharon-A.Frank 1 Multimedia Image Compression 2 T.Sharon-A.Frank Coding Techniques – Hybrid.
Using Redundancy and Interleaving to Ameliorate the Effects of Packet Loss in a Video Stream Yali Zhu, Mark Claypool and Yanlin Liu Department of Computer.
Unequal Loss Protection: Graceful Degradation of Image Quality over Packet Erasure Channels Through Forward Error Correction Alexander E. Mohr, Eva A.
Lossless Compression in Multimedia Data Representation Hao Jiang Computer Science Department Sept. 20, 2007.
Using Interleaving to Ameliorate the Effects of Packet Loss in a Video Stream Mark Claypool and Yali Zhu Computer Science Department Worcester Polytechnic.
5. 1 JPEG “ JPEG ” is Joint Photographic Experts Group. compresses pictures which don't have sharp changes e.g. landscape pictures. May lose some of the.
Why Compress? To reduce the volume of data to be transmitted (text, fax, images) To reduce the bandwidth required for transmission and to reduce storage.
CSE679: MPEG r MPEG-1 r MPEG-2. MPEG r MPEG: Motion Pictures Experts Group r Standard for encoding videos/movies/motion pictures r Evolving set of standards.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Image Compression - JPEG. Video Compression MPEG –Audio compression Lossy / perceptually lossless / lossless 3 layers Models based on speech generation.
CS559-Computer Graphics Copyright Stephen Chenney Image File Formats How big is the image? –All files in some way store width and height How is the image.
Compression is the reduction in size of data in order to save space or transmission time. And its used just about everywhere. All the images you get on.
ECE472/572 - Lecture 12 Image Compression – Lossy Compression Techniques 11/10/11.
 Coding efficiency/Compression ratio:  The loss of information or distortion measure:
M P E G A Presentation by Sebastian Graf and Thomas Winterscheid.
MPEG: (Moving Pictures Expert Group) A Video Compression Standard for Multimedia Applications Seo Yeong Geon Dept. of Computer Science in GNU.
Video Compression Techniques By David Ridgway.
MPEG Motion Picture Expert Group Moving Picture Encoded Group Prateek raj gautam(725/09)
Image compression using Hybrid DWT & DCT Presented by: Suchitra Shrestha Department of Electrical and Computer Engineering Date: 2008/10/09.
Abhik Majumdar, Rohit Puri, Kannan Ramchandran, and Jim Chou /24 1 Distributed Video Coding and Its Application Presented by Lei Sun.
Multimedia Specification Design and Production 2012 / Semester 1 / L3 Lecturer: Dr. Nikos Gazepidis
Image Processing and Computer Vision: 91. Image and Video Coding Compressing data to a smaller volume without losing (too much) information.
Data Compression. Compression? Compression refers to the ways in which the amount of data needed to store an image or other file can be reduced. This.
CIS679: Multimedia Basics r Multimedia data type r Basic compression techniques.
Group No 5 1.Muhammad Talha Islam 2.Karim Akhter 3.Muhammad Arif 4.Muhammad Umer Khalid.
Image Compression Supervised By: Mr.Nael Alian Student: Anwaar Ahmed Abu-AlQomboz ID: IT College “Multimedia”
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
Addressing Image Compression Techniques on current Internet Technologies By: Eduardo J. Moreira & Onyeka Ezenwoye CIS-6931 Term Paper.
Digital Image Processing Image Compression
Compression video overview 演講者:林崇元. Outline Introduction Fundamentals of video compression Picture type Signal quality measure Video encoder and decoder.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Marwan Al-Namari 1 Digital Representations. Bits and Bytes Devices can only be in one of two states 0 or 1, yes or no, on or off, … Bit: a unit of data.
COMP135/COMP535 Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 2 Lecture 2 – Digital Representations.
JPEG.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
Multi-media Data compression
JPEG. Introduction JPEG (Joint Photographic Experts Group) Basic Concept Data compression is performed in the frequency domain. Low frequency components.
MPEG CODING PROCESS. Contents  What is MPEG Encoding?  Why MPEG Encoding?  Types of frames in MPEG 1  Layer of MPEG1 Video  MPEG 1 Intra frame Encoding.
IMAGE/VIDEO COMPRESSION STANDARD JPEG-2000/JasPer/Motion JPEG/Wireless JPEG/Kakadu Jan T. Bialasiewicz.
PRESENTED BY: MOHAMAD HAMMAM ALSAFRJALANI UFL ECE Dept. 3/31/2010 UFL ECE Dept 1 CACHE OPTIMIZATION FOR AN EMBEDDED MPEG-4 VIDEO DECODER.
H. 261 Video Compression Techniques 1. H.261  H.261: An earlier digital video compression standard, its principle of MC-based compression is retained.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
JPEG Compression What is JPEG? Motivation
Data Compression.
DCT IMAGE COMPRESSION.
JPEG Image Coding Standard
Data Compression.
Video Compression - MPEG
Data Compression CS 147 Minh Nguyen.
Overview What is Multimedia? Characteristics of multimedia
Standards Presentation ECE 8873 – Data Compression and Modeling
Information Redundancy Fault Tolerant Computing
Judith Molka-Danielsen, Oct. 02, 2000
Image Coding and Compression
Kyoungwoo Lee, Minyoung Kim, Nikil Dutt, and Nalini Venkatasubramanian
Presentation transcript:

On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer and Information Science ACM Multimedia 2001

Presentation outline Introduction Applications Objectives of this project MPEG encoding and decoding Video security Forward error correction Error preserving encryption functions Conclusion

Introduction The distribution of multimedia information, including video, to wireless devices present significant hurdles to both high quality content delivery as well as the preservation of digital rights management Video data has unique characteristics: large size, large storage space, time requirements to present it in a continuous manner. Current wireless devices have limited processor resources (limited CPU processing capacity, limited memory, etc.) and limited power.

Because MPEG encoding and decoding is a computationally intensive process, solutions is needed to add minimal complexity for encryption and decryption. By taking advantage of the special properties of video coding, several techniques have been proposed to minimize the amount of overhead required to secure a video stream. However, they do not work well when used in wireless networks. These methods do not preserve bit errors from the wireless transmission, resulting in streams that cannot survive the decryption process without significant error processing step.

Applications Use of wireless devices for multimedia retrieval Video Video-on-demand

Objectives of this project To understand permutation-complementation based encryption algorithms that take advantage of the fact that compressed multimedia data is already random in byte distribution. Several formal properties of such systems are presented Application of these properties in securing video data is also described.

MPEG encoding and decoding Compression procedure: 1.Transform the image into a suitable color space: the RGB space is usually transform into the luminance/chrominance color space (YCbCr) 2.Discrete Cosine Transform (DCT) 3.Group the pixel values for each component into 8x8 blocks, then map each 8x8 block into another 8x8 block through DCT. 4.Quantization 5.Zig-zag scan 6.Entropy coding (e.g. Run Length Encoding)

MPEG Motion Compensation Exploits the fact that a frame is likely to be similar to its predecessor, so it can be nearly constructed from it. 1.I frame (intra coded) frame: coded without any reference to other frames 2.P (predictive coded) frame: coded using motion- compensated prediction from the last I or P frame, which happens to be closest. 3.B (bi-directionally predicted coded) frame: coded using motion-compensated prediction from the most recent P or I frame and the closest future P or I frame.

Video Security Algorithms Historically, the straight forward applications of standard encryption algorithms (e.g. DES) to the entire video streams adds too much computational overhead. New algorithms include: –Zig-zag permutation algorithm –Selective coding of I-frames –Secure MPEG encryption algorithm using DES, but encodes only half of the data in a stream using DES.

Forward Error Correction (FEC) FEC is a common technique used to decrease losses when data is transmitted over noisy channels (e.g. wireless network). This comes with additional overhead, which is linear in the number of errors it can correct. We can design FEC code to correct k bits of errors. If the number of bit errors is more than k, the FEC code may not be able to correct the errors. Bit errors left in data after decoding are left to the application.

Example to show intolerance of encrypted streams to bit errors A text file is created and encrypted with PGP software. A single bit error is introduced into the encrypted file. For the decryption, a key phrase is entered by the user, which substitutes the key. After the bit error is introduced, the file is not able to be decrypted. PGP return an bad pass phrase error, did not decrypt the file and no text is returned.

Definition of Error Preserving Function Let f be a function of the form f: (0, 1) n -> (0, 1) n, which means that f maps binary strings of length n to binary strings of length n. A function is called error preserving if d(x,y)=d(f(x),f(y)) for all x, y. In fact, a unction is error preserving if it preserves the shape of the hypercube. In algebra, a transformation that preserve shape is called an isometry. So, the number of error-preserving functions is equal to the number of of isometries of n dimensional hypercube.

Examples of Error Preserving Functions

Sample Isometries

Theoretical Results on Error Preserving Encryption Functions Lemma 2: All error-preserving functions can be generated using permutation and complementation. Permutation permutes the positions of bits and complementation complements a subset of the bits. Lemma 1: The Number of error preserving functions (0, 1) n -> (0, 1) n is n! * 2n

(Continue) Lemma 3: (P 1 C 1 )(P 2 C 2 ) = (P 3 C 3 ) Proof: Let f = (P 1 C 1 ) and g = (P 2 C 2 ) Since f and g are both error preserving, we have d( g(f(x)), g(f(y))) = d(f(x), f(y)) = d(x,y) Hence g.f is error preserving and it can be written as (P 3 C 3 ) by Lemma 2.

(Continue) Lemma 4: (P 1 C 1 ) -1 (P 2 C 2 ) = (P 3 C 3 ) Lemma 5: (P 1 C 1 ) (P 2 C 2 ) -1 (P 3 C 3 ) = (P 4 C 4 ) Lemma 6: Number of permutations which map none of the bits to their original position is given by D, = n!(l - l/(1!) + l/(2!) - l/(3!) + … + (-l) n.1/(n!)). Such permutation is known as derangement. Lemma 7: Using the random Derangement Complementation (D-C) algorithm. The probability that k users will all have distinct (D-C) is, which is larger than

APPLICATIONS OF ERROR PRESERVING ENCRYPTION FUNCTIONS Lemma 1 gives the expression for the number of error preserving functions. Lemma 2 shows that all the error preserving functions can be enumerated using a permutation followed by complementation of a subset of bits. Lemma 3 shows that for error preserving encryption double encryption does not help since there is a (P-C) that is equivalent to it.

(Continue) Lemma 4 can be used for secure wireless video multicast in an ad-hoc network where users can be expelled from the group. Lemma 5 shows that triple encryption is equivalent to a single encryption and therefore does not improve security. Lemma 6 gives the expression for number of derangements. Lemma 7 gives the probability that no collision occurs for k users. For n= 10 and k = 1000 second expression gives which means that probability of collision is very low.

Conclusion A theory is developed to build error preserving video encryption algorithms. The scheme presented in this paper takes advantage of the fact that most multimedia applications are somewhat tolerable to bit errors. All error preserving encryption algorithms can be implemented by permuting bits and complementing a subset of the bits, double and triple encryption do not improve security of the system. The algorithm is very efficient (9-10 times faster than PGP).