(3.236.222.124) 您好!臺灣時間:2021/05/19 10:27
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:連健翔
研究生(外文):Lien, Chien-Hsiang
論文名稱:適用於H.264/AVC視訊加密技術之研究
論文名稱(外文):Study of the H.264/AVC Video Encryption Scheme
指導教授:劉江龍劉江龍引用關係
指導教授(外文):Liu, Chiang-Lung
口試委員:尹德龍張克勤劉江龍
口試委員(外文):Yin, De LongChang, Ko-ChinLiu, Chiang-Lung
口試日期:2011-05-12
學位類別:碩士
校院名稱:國防大學理工學院
系所名稱:電子工程碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:72
中文關鍵詞:視訊加密
外文關鍵詞:H.264/AVC
相關次數:
  • 被引用被引用:1
  • 點閱點閱:192
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:0
由於網際網路是沒有保護的空間,如果重要資料(例如軍事情資)在網路傳遞的過程中被不當的擷取,進而加以竄改或利用,對個人、企業或國家的損失是無法估計的。因此,如何保護重要視訊資料傳輸的安全,已成為當今熱門的研究議題。
H.264/AVC為最新的視訊壓縮標準,其是為增加視訊資料的壓縮率與強化在不同運用環境中的容錯機制而發展。由於H.264/AVC的壓縮率高及壓縮後的影像品質優越,已成為目前最熱門的視訊壓縮技術。一般認為,一個好的視訊加密技術至少需滿足四項基本需求,即壓縮等效(Compressibility Equivalent)、複雜等效(Complexity Equivalent)、格式相容(Format Compliant)、及視覺安全(Perceptually Secure)。基於視訊保護的需求,目前已有許多針對H.264/AVC的選擇加密演算法被提出。而大部分加密技術只專注於其本身加密技術的說明,對於上述衡量視訊加密的基本需求,則缺乏系統與客觀的探討,無法提供產業或個人在發展相關加密產品完整的參考。
本文提出一高安全性的H.264/AVC選擇加密技術。本研究首先對H.264/AVC壓縮編碼過程中所產生的眾多資料進行分析,並識別出具視覺影響的主要加密資料與輔助加密資料,並藉由對這兩部分資料進行加密以達到高視覺安全性之目的。實驗結果顯示,本文所提出的H.264/AVC選擇加密演算法,可在滿足壓縮等效、複雜性等效與格式相容等條件之下,提供比其他H.264/AVC選擇加密演算法更好的視覺安全。

Because the Internet is an unprotected space, if important data (e.g., military intelligent information) is illegally accessed while transmitting on the net, possibly being further modified and used, the damage to the personnel, enterprise, or country is uncounted. Therefore, how to protect the transmission security of video data has become a hot research topic nowadays.
H.264/AVC is the newest video compression standard which is developed for improving compression rate and strengthening fault tolerance in various applications. Because of the high compression rate and good visual quality, H.264/AVC has become the hot video compression technique. Generally speaking, a good video encryption technique needs to meet four basic requirements: compressibility equivalent, complexity equivalent, format compliant, and perceptually secure. Based on the requirement of video protection, several H.264/AVC dedicated encryption schemes have been proposed. Unfortunately, most encryption schemes are focused on explaining how they can work well while ignoring systematic and objective discussions of the basic requirements. As a result, individuals or enterprises cannot get complete references from the existing H.264/AVC encryption techniques.
The thesis is aimed to propose a high-performance H.264/AVC selective encryption scheme. We first identify the major and auxiliary data which is generated during H.264/AVC compression process and can influence the visual quality of H.264 compressed video. The two-part data is encrypted in the proposed encryption sheme to achieve the purpose of high visual security. Experimental results show that the proposed encryption scheme can provide higher level of visual security than the other H.264/AVC selective encryption methods under the constraints of compressibility equivalent, complexity equivalent, and format compliant.

誌謝
摘要
ABSTRACT
目錄
表目錄
圖目錄
第一章緒論
1.1研究背景
1.2研究動機
1.3研究目的
1.4論文架構
第二章H.264/AVC視訊壓縮技術
2.1技術沿革
2.2技術框架
2.3編/解碼流程
2.4核心技術介紹
2.4.1畫面內預測模式
2.4.2畫面間預測模式
2.4.3轉換
2.4.4量化
2.4.5Exp-Golomb編碼
2.4.6熵編碼
第三章文獻探討
3.1編碼中選擇加密演算法
3.1.1Ahn等學者的方法
3.1.2Li等學者的方法
3.1.3Lian等學者2006的方法
3.1.4Wang等學者的方法
3.1.5Cai等學者的方法
3.1.6Lian等學者2007的方法
3.1.7Lian等學者2008的方法
3.1.8Wang等學者2008的方法
3.1.9Chen等學者的方法
3.1.10Jiang等學者的方法
3.1.11Qian等學者的方法
3.1.12Wang等學者2010的方法
3.2編碼後選擇加密演算法
3.3混合型選擇加密演算法
3.3.1Shi等學者的方法
3.3.2Chattopadhyay等學者的方法
3.4綜合分析
3.4.1預測模式加密作法
3.4.2MVD加密作法
3.4.3冗餘資料加密作法
3.4.4其它資料加密作法
第四章適用於H.264/AVC選擇性加密技術
4.1加密演算法
4.1.1MVD加密演算法
4.1.2CAVLC_Levels加密演算法
4.1.3CAVLC_Sign_of_TrailingOnes加密演算法
4.1.4Intra_4×4_Pred_Mod加密演算法
4.1.5Intra_16×16_Pred_Mod加密演算法
4.2解密演算法
4.2.1MVD解密演算法
4.2.2CAVLC_Levels解密演算法
4.2.3CAVLC_Sign_of_TrailingOnes解密演算法
4.2.4Intra_4×4_Pred_Mod解密演算法
4.2.5Intra_16×16_Pred_Mod解密演算法
第五章實驗結果與討論
5.1實驗環境
5.2壓縮等效測試
5.3複雜性等效測試
5.4格式相容測試
5.5視覺上安全測試
第六章結論及未來展望
6.1結論
6.2未來展望
參考文獻
論文發表
自傳

[1]http://www.youtube.com/
[2]Khalid Saywood, Introduction to Data Compression, Elsevier, Singapore, 2006.
[3]ITU-T, Recommendation ITU-T H.264, Advanced Video Coding for Generic Audiovisual Services, Mar. 2009.
[4]Lian, S., Sun, J., Wang, Z., and Dai, Y., “A Fast Video Encryption Scheme Based-on Chaos,” Proceedings of the 8th International Conference on Control, Automation, Robotics and Vision, Vol. 1, pp. 126-131, Dec. 2004.
[5]Qiao, L. and Nahrstedt, K., “A New Algorithm for MPEG Video Encryption,” Proceedings of the First International Conference on Imaging Science, Systems, and Technology (CISST’97), pp. 21-29, July 1997.
[6]Romeo, A., Romolotti, G., Muttuvelli, M., and Mlyrzek, D., “Cryptosystem Architectures for Very High Throughput Multimedia Encryption: the RPK Solution,” Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems(ICECS’99), Vol. 1, pp. 261-264, 1999.
[7]Wu, C. P. and Kuo Jay, C. C., “Fast Encryption Methods for Audiovisual Data Confidentiality,” Proceedings of SPIE, the International Society for Optical Engineering, Vol. 4209, pp. 284-295, 2001.
[8]Wu, C. P. and Kuo Jay, C. C., “Efficient Multimedia Encryption via Entropy Codec Design,” Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, Vol. 4314, pp. 128-138, Jan. 2001.
[9]Shi, C., Wang, S. Y., and Bhargava, B., “MPEG Video Encryption in Real-Time Using Secret Key Cryptography,” Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, pp. 2822-2828, 1999.
[10]Yen, J. C. and Guo, J. I., “A New Image Encryption System and Its VLSI Architecture,” Proceedings of the IEEE Workshop on Signal Processing Systems, pp. 430-437, 1999.
[11]Tosun, A. S. and Feng, W. C., “Efficient Multi-Layer Coding and Encryption of MPEG Video Streams,” Proceedings of the IEEE International Conference on Multimedia and Expo, Vol. 1, pp. 119-122, 2000.
[12]Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, First Edition, John Wiley & Sons, America, 1994.
[13]Wiegand, T., Sullivan, G. J., Bjøntegaard, G., and Luthra, A., “Overview of the H.264/AVC Video Coding Standard,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 7, pp. 560-576, July 2003.
[14]Kwon, S. K., Tamhankar, A., and Rao, K. R., “Overview of H.264/MPEG-4 Part 10,” Journal of Visual Communication and Image Representation, Vol. 17, No. 2, pp. 186-216, Apr. 2006.
[15]Sullivan, G. J., Topiwala, P., and Luthra, A., “The H.264/AVC Advanced Video Coding Standard: Overview and Introduction to the Fidelity Range Extensions,” Proceedings of the SPIE Conference on Application of Digital Image Processing XXVII, Vol. 5558, pp. 454-474, Aug. 2004.
[16]Iain E. G. Richardson, H.264 and MPEG-4 Video Compression Video Coding for Nest-generation Multimedia, John Wiley & Sons, Chichester, UK, 2003.
[17]Puri, A., Chen, X., and Luthra, A., “Video Coding Using the H.264/MPEG-4 AVC Compression Standard,” Signal Processing: Image Communication, Vol. 19, No. 9, pp. 793-849, Oct. 2004.
[18]http://www.vcodex.com/h264.html
[19]Ahn, J., Shim, H. J., Jeon, B., and Choi, I., “Digital Video Scrambling Method Using Intra Prediction Mode,” PCM 2004, LNCS 3333, Springer-Verlag, Berlin, Germany, pp. 386-393, 2004.
[20]Li, Y., Liang, L., Su, Z., and Jiang, J., “A New Video Encryption Algorithm for H.264,” Proceedings of the Fifth International Conference on Information, Communications and Signal Processing, pp. 1121-1124, 2005.
[21]Lian, S., Liu, Z., Ren, Z., and Wang, Z., Selective Video Encryption Based on Advanced Video Coding, PCM 2005, Part II, LNCS 3768, Springer-Verlag, Berlin, Germany, pp. 281-290, 2005.
[22]Lian, S., Liu, Z., Ren, Z., and Wang, Z., “Secure Advanced Video Coding Based on Selective Encryption algorithms,” IEEE Transactions on Consumer Electronics, Vol. 52, No. 2, pp. 621-629, May 2006.
[23]Wang, Y., Cai, M., and Tang, F., “Design of a New Selective Video Encryption Scheme Based on H.264,” Proceedings of the International Conference on Computational Intelligence and Security, pp. 883-887, Dec. 2007.
[24]Cai, M., Jia, J., and Yan, L., “An H.264 Video Encryption Algorithm Based on Entropy Coding,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Vol. 2, pp. 41-44, Nov. 2007.
[25]Lian, S., Liu, Z., Ren, Z., and Wang, H., “Commutative Encryption and Watermarking in Video Compression,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, No. 6, pp. 774-778, June 2007.
[26]Lian, S., Sun, J., Liu, G., and Wang, Z., “Efficient Video Encryption Scheme Based on Advanced Video Coding,” Multimedia Tools and Applications, Vol. 38, No. 1, pp. 75-89, May 2008.
[27]Wang, L. F., Wang, W. D., Ma, J., Xiao, C., and Wang, K. Q., “Perceptual Video Encryption Scheme for Mobile Application Based on H.264,” The Journal of China Universities of Posts and Telecommunications, Vol. 15, pp. 73-78, Sept. 2008.
[28]Chen, T. H., Wu, Y. T., and Lin, Y. R., “Medical Video Encryption Based on H.264/AVC with Near-Lossless Compression,” Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 889-892, Sept. 2009.
[29]Jiang, J., Xing, S., and Qi, M., “An Intra Prediction Mode-based Video Encryption Algorithm in H.264,” Proceedings of the International Conference on Multimedia Information Networking and Security, Vol. 1, pp. 478-482, Nov. 2009.
[30]Zhang, Q., Wu, J. M., and Zhao, H. X., “Efficiency Video Encryption Scheme Based on H.264 Coding Standard and Permutation Code Algorithm,” Proceedings of the WRI World Congress on Computer Science and Information Engineering, Vol. 1, pp. 674-678, Mar. 2009.
[31]Wang, X., Zheng N., and Tian, L., “Hash Key-based Video Encryption Scheme for H.264/AVC,” Signal Processing: Image Communication, Vol. 25, No. 6, pp. 427-437, July 2010.
[32]Zou, Y., Hang, T., Gao, W., and Huo, L., “H.264 Video Encryption Scheme Adaptive to DRM,” IEEE Transactions on Consumer Electronics, Vol. 52, No. 4, pp. 1289-1297, Nov. 2006.
[33]Shi, T., King, B., and Salama, P., “Selective Encryption for H.264/AVC Video Coding,” Proceedings of SPIE on Security, Steganography, and Watermarking of Multimedia Contents VIII, Vol. 6072, pp. 461-469, 2006.
[34]Chattopadhyay, T. and Pal, A. “Two Fold Video Encryption Technique Applicable to H.264 AVC,” Proceedings of the IEEE International Advanced Computing Conference, pp. 785-789, Mar. 2009.
[35]http://iphome.hhi.de/suehring/tml/

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top