(18.232.55.103) 您好!臺灣時間:2021/04/23 01:50
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:李琪霖
研究生(外文):Ci-Lin Li
論文名稱:具有高效率且結合視訊編碼與加密技術的H.264/SVC不可視覺加密法
論文名稱(外文):Efficient Compression-Jointed Non-perceptual Encryption Method for the H.264/SVC
指導教授:陳宗和陳宗和引用關係
指導教授(外文):Tzung-Her Chen
學位類別:碩士
校院名稱:國立嘉義大學
系所名稱:資訊工程學系研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:59
中文關鍵詞:視訊加密H.264/SVC部分加密法不可視覺加密視訊編碼完整性
外文關鍵詞:Video encryptionH.264/Scalable video coding (SVC)Compression-jointed encryptionformat-compliant
相關次數:
  • 被引用被引用:0
  • 點閱點閱:214
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:20
  • 收藏至我的研究室書目清單書目收藏:0
H.264/Scalable video coding (SVC)是目前正在蓬勃發展的視訊編碼技術。H.264/SVC 是H.264/AVC的延伸標準,它是由ITU-T Video Coding Experts Group (VCEG)和ISO/IEC Moving Picture Experts Group (MPEG)所一起制訂的標準。H.264/SVC最主要的優點是提供使用者在異質的網路環境中或是時變頻寬網路中進行傳輸,針對不同的使用者的需求或是傳輸頻寬傳送不同品質的視訊串流,不同於H.264/AVC只能針對個別的頻寬大小來編碼,因為H.264/SVC中包含三種可調性功能包括空間可調性、時間可調性和品質可調性,因此只要編碼一次就可以依不同的頻寬大小來給予相當的品質,這個方法是利用階層的概念,頻寬大的給予較高的階層,品質相對的也較高,頻寬較小的就給予較低的階層,但品質會較低,所以會有更有效率的傳輸能力。因此本研究主要是發展基於H.264/SVC的加密方案來保護多媒體資訊,在這個研究中會挑選出在編碼過程中最重要的資訊或語意格式來進行加密,而且要符合高安全性,低運算複雜度,不使得壓縮效能降低,甚至增加壓縮率,保持視訊編碼格式並且仍然可以給予不同階層的視訊。在此研究中提出將基礎層與加強層分開加密以更適用於商業模式的加密方法。
H.264/Scalable video coding (SVC) is an ongoing standard that supports the quality adaptation for the heterogeneous network by spatial, temporal, and quality scalability. In the literature, there are rare researches related to H.264/SVC encryption while H.264/SVC has drawn much attention in the academia and industry. In this study, the imperceptible encryption scheme integrated video compression is proposed for H.264/SVC, in which the H.264/SVC compression processes are skillfully encrypted. In addition, the proposed scheme shows that the computation and compression overheads are negligible and the compression rate is enhanced. In order to achieve the advantages, the proposed scheme encrypts the sensitive data including motion vector difference, the intra prediction mode and the residual coefficients. The experimental results demonstrate the feasibility of the proposed scheme by testing the efficiency with the security, format compliance maintenance and assurance enhancement in low bit rates and time overhead.
中文摘要 i
Abstract ii
誌 謝 iii
List of Figures vi
Table of Figures viii
1 Introduction 1
1.1 Video Encryption 1
1.2 Motivation 3
1.3 Contribution 4
1.4 Organization of This Thesis 5
2 Background 6
2.1 Overview of H.264/AVC 6
2.1.1 Eliminate Spatial Redundancy Technology 11
2.1.2 Eliminate Temporal Redundancy Technology 13
2.1.3 Transform and Quantization 14
2.1.4 Eliminate Coding Redundancy Technology 15
2.2 Overview of H.264/SVC 17
2.2.1 Spatial Scalability 19
2.2.2 Temporal Scalability 19
2.2.3 SNR Scalability 20
2.2.4 Combined Scalability 21
2.3 Literature Review 22
2.3.1 The Survey of the Compression-Jointed Encryption Method for H.264/AVC 23
2.3.2 The Survey of Compression-Jointed Encryption Method for H.264/SVC 27
3 The Proposed Video Encryption Scheme 31
3.1 Layered Encryption Method 31
3.1.1 Base layer encryption 31
3.1.2 Enhancement layer encryption 37
4 Experimental Results and Discussion 38
5 Conclusions and Future Work 45
References 46
[1] CCIIT Recommendation H.261, "Video Coding for audiovisual services at px64 kbits/s," Geneva, Aug. 1990.
[2] Information technology—Coding of audio-visual objects: Visual ISO/IEC 14496-2 committee drafts,” ISO/IEC 14496-2, Nov. 1997.
[3] Draft Recommendation H.263, ITU Telecommunication Union, Telecommunications Standardization Sector SG 15, Dec, 1995.
[4] T. Wiegand, G. J. Sullivan, G. Bjontegaard and A. Luthra, ”Overview of the H.264/AVC Video Coding Standard,” IEEE Transactions, on Circuits and System for Video Technology, Vol. 13, No. 7, 2003.
[5] Soon-kak Kwon, A. Tamhankar, K. R. Rao,”Overview of H.264/MPEG-4 part 10,” Journal of Visual Communication and Image Representation, Vol. 17, No. 2, pp. 186-216, 2006
[6] H. Schwarz, D. Marpe and T. Wiegand, “Overview of the Scalable Video Coding Extension of the H.264/AVC Standard,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, No. 9, 2007.
[7] National Institute of Standards and Technology (U.S.). Data Encryption Standard (DES). FIPS Publication 46-3, NIST, 1977.
[8] National Institute of Standards and Technology (U.S.).Advanced Encryption Standard (AES). FIPS Publication 197, 2001.
[9] S. Lian, J. Sun, G. Liu and Z. Wang, “Efficient Video Encryption Scheme Based on Advanced Video Coding,” Multimedia Tool Application, Vol. 38, pp. 75-89, 2008
[10] F. Liu and H. Koenig, ”A survey of video encryption algorithms,” Computers & Security, Vol. 29, pp. 3-15, 2010.
[11] M. Pzazrci and V. Dipqin, “A MPEG2-Transparent Scrambling Technique,” IEEE Transactions on Consumer Electronics, Vol. 48, no. 2, pp. 345-355, 2002.
[12] C. Wang, H. B. Yu and M. “A DCT-based MPEG-2 Transparent Scrambling Algorithm,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, pp. 1208-1213, 2003.
[13] E. Magli, M. Grangetto and G. Olmo,”Transparent Encryption Techniques for H.264/AVC and H.264/SVC Compressed Video”, Signal Processing, Vol. 91, pp. 1103-1114, 2011.
[14] S. Li, G. Chen, A. Cheung, B. Bhargave and K. T. Lo, “On the Design of Perceptual MPEG-Video Encryption Algorithms,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, No. 2, pp. 214-223, 2007.
[15] ISO/IEC JTC 1/SC 29/WG 11, “Joint Scalable Video Model (JSVM) 6.0 Reference Encoding Algorithm Description,” N 8015, 2006.
[16] ITU-T and IOS/IEC JTC 1, “Generic Coding of Moving Pictures and Associated audio information-Part 2: Video,” ITU-T Recommendation H.262 and ISO/IEC 13818-2 (MPEG-2 Video), 1994.
[17] ITU-T, ”Video Coding for Low Bit Rate Communication,” ITU-T Recommendation H.263, Version 1: 1995, Version 2: 1998, Version 3: 2000.
[18] IOS/IEC JTC 1,”Coding of Audio-Visual Objects-Part 2: Visual,” IOS/IEC 14492-2 (MPEG-4 Visual), Version 1: 1999, Version 2: 2000, Version 3: 2003.
[19] H. Schwarz, D. Marpe and T. Wiegand, “Hierarchical B pictures,” Joint Video Team, doc. JVT-P014, 2005.
[20] F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni and M. Reginelli, “A New Chaotic Algorithm for Video Encryption,” IEEE Transactions on Consumer Electronics, Vol. 48, Issue 4, pp. 838-844, November 2002.
[21] L. S. Choon, A. Samsudin and R. Budiarto, “Lightweight and Cost-Effective MPEG Video Encryption,” Proceedings of International Conference on Information and Communication Technologies: From Theory to Applications, pp. 525-526, April 2004.
[22] M. S. Kiaei, S. Ghaemmaghami and S. Khazaei, “Efficient Fully Format Compliant Selective Scrambling Methods for Compressed Video Streams,” Proceedings of International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications, pp. 42-42, February 2006.
[23] Z. Liu and X. Li, “Motion Vector Encryption in Multimedia Streaming,” Proceedings of the 10th International Multimedia Modeling Conference, pp. 64-71, January 2004.
[24] S. Lian, Z. Wang and J. Sun, “A Fast Video Encryption Scheme Suitable for Network Applications,” Proceedings of International Conference on Communications, Circuits and Systems, Vol. 1, pp. 566-570, June 2004.
[25] W. Li, Z. Xu and Y. Yao, “An efficient scheme to secure VLC codeword concatenations for video encryption,” Proceedings of SPIE on Visual Communications and Image Processing, Vol. 5960, pp. 953-960, 2005.
[26] S. Lian, Z. Liu, Z. Ren and H. Wang, ”Secure Advanced Video Coding Based on Selective Encryption Algorithm,” IEEE Transactions on Consumer Electronics, Vol. 52, Issue 2, pp. 621-629, May 2006.
[27] J.-R. J. Shieh, “On the Security of Multimedia Video Information,” Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, pp. 51-56, October 2003.
[28] C. Shi and B. Bhargava, “An Efficient MPEG Video Encryption Algorithm,” Proceedings of 17th IEEE Symposium on Reliable Distributed Systems, pp. 381-386, October 1998.
[29] H. Yin, C. Lin, F. Qiu, J. Liu, G. Min and B. Li, “CASM: A Content-Aware Protocol for Secure Video Multicast,” IEEE Transactions on Multimedia, Vol. 8, Issue 2, pp. 270-277, April 2006.
[30] W. Zeng, S. Lei, “Efficient Frequency Domain Video Scrambling for Content Access Control,” Proceedings of the seventh ACM international conference on Multimedia, pp. 285-294, 1999.
[31] J.Ahn, H. J. Shim, B. Jeon and I. Choi, “Digital video scramble method using intra prediction mode,” Lecture Notes in Computer Science, Vol. 3333, pp. 386-393, 2005.
[32] Y. Li, L. Liang, Z. Su and J. Jiang, “A New Video Encryption Algorithm for H.264,” Proceedings of Communications and Signal Processing, pp. 1121-1124, Dec. 2005.
[33] G. M. Hong, C. Yuan, Y. Wang and Y. Z. Zhong, “A Quality-Controllable Encryption for H.264/AVC Video Coding,” Lecture Notes in Computer Science, Vol. 4261, pp. 510-517, Nov. 2006.
[34] S. Lian, Z. Liu, Z. Ren and H. Wang, “Secure Advanced Video Coding Based on Selective Encryption Algorithm,” IEEE Transactions on Consumer Electronics, Vol. 52, Issue 2, pp. 612-629, May 2006.
[35] J. Wang, Y. Fan, T. Ikenaga and S. Goto, “A partial Scramble Scheme for H.264 Video,” ASIC, 2007. ASICON '07. 7th International Conference on, pp. 802-805, Oct. 2007.
[36] Y. Wang, M Cai and F. Tang, “Design of a New Selective Video Encryption Scheme Based on H.264,” Proceedings of Computational Intelligence and Security, pp. 882-883, Dec. 2007.
[37] Y. Liu, C. Yuan and Y. Zhong, “A New Digital Rights Management System In Mobile Applications Using H.264 Encryption,” Proceedings of Advanced Communication Technology, Vol. 1, pp. 583-586, Feb. 2007.
[38] M. Cai, J. Jia and L.Yan , “An H.264 Video Encryption Algorithm Based On Entropy Coding,” Proceedings of Intelligent Information Hiding and Multimedia Signal Processing, Vol. 2, pp. 41-44, Nov 2007.
[39] X. Wang, N. Zheng and L. Tian, “Hash Key Based Video Encryption Scheme for H.264AVC,” Signal Processing, Vol. 25, No.6, pp. 427-437, 2010
[40] J. Wang, Y. Fan, T. Ikenaga and S. Goto, “A partial Scramble Scheme for H.264 Video,” ASIC, 2007. ASICON '07. 7th International Conference on, pp. 802-805, Oct. 2007.
[41] Y. Wang, M Cai and F. Tang, “Design of a New Selective Video Encryption Scheme Based on H.264,” Proceedings of Computational Intelligence and Security, pp. 882-883, Dec. 2007.
[42] S. S. Maniccam and N. G. Bourbakis, “Image and Video Encryption Using SCAN Patterns,” Pattern Recognition, Vol. 37, pp. 725-737, 2004.
[43] D. Socek, S. Magliveras, D. Culibrk, O. Marques, H. Kalva and B. Furt, “Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations,” EURASIP Journal on Information Security, 2007.
[44] L. Qiao and K. Nahrsedt, “Comparison of MPEG Video Encryption Algorithm,” Computer and Graphics, Vol. 22, No. 4, pp. 437-448, 1998.
[45] Y. Fan, J. Wang, T. Ikenage, Y. Tsunoo and S. Goto, “An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 1, 2008.
[46] S. Park and S. U. Shin, “Efficient Selective Encryption Scheme for the H.264/Scalable Video Coding (SVC),” Fourth International Conference on Networked Computing and Advanced Information Management, pp. 371-376, 2008.
[47] C. Li, C. Yuan and Y. Zhong, “Layered Encryption for Scalable Video Coding,” Image and Signal Processing, 2009. CISP '09. 2nd International Congress on. 2009.
[48] E. Magli, M. Grangtto and G. Olmo, “Transparent encryption techniques for H.264/AVC and H.264/SVC compressed video,” Signal Processing, Vol. 91, No.5, pp.1103-1114, 2010.
[49] ftp://ftp.tnt.uni-hannover.de/pub/svc/testsequences/
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔