簡易檢索 / 詳目顯示

研究生: 李佳橙
Lee, Chia-Chen
論文名稱: 使用進階加密標準之一H.264/AVC碼流相容選擇性加密方法
A Stream-Compliant Selective Encryption Method for H.264/AVC Using Advanced Encryption Standard
指導教授: 陳進興
Chen, Chin-Hsing
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 英文
論文頁數: 49
中文關鍵詞: H.264/AVC適應性變動長度編碼移動向量量化參數AES選擇性加密
外文關鍵詞: H.264/AVC, CAVLC, motion vector difference, delta quantization parameter, AES algorithm, selective encryption
相關次數: 點閱:102下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • H.264/AVC視訊標準已被廣泛應用於多媒體資料傳輸。為了顧及資訊的保密性,以避免影像內容被未經授權的人觀看,提供H.264充分加密的技術變成十分重要。
    在本篇論文中,我們提出一改良的加密方法。此法選擇性加密位元碼流上的移動向量差值(MVD)、量化參數(delta quantization parameter)以及適應性變動長度編碼(CAVLC)三部分。根據我們設計的方法,在接收端我們須使經加密的碼流於解密前能夠先被正確地解碼,因此我們採取完全相容於原本碼流結構的加密方法。除此之外,為了維持加密後與加密前具有相同的位元率,維持碼流長度不變是我們加密方法的特性之一。因為加密後不會增加位元數量,因此適合在異質網路上進行即時傳輸。我們以進階加密標準(AES)演算法產生加密所需的金鑰(key),而金鑰號碼與每張畫面的序號之間擁有一致性。因此,安全性獲得更大提升,另一方面則確保解碼過程的同步性。
    論文以四種具不同畫面特性的基準影片做實驗測試。在SSIM指標分析部分,所提方法得到的平均值為0.202,此值低於Shahid等人所提方法的0.233,因此我們提出的方法更能降低視覺品質。金鑰敏感度的測試部分,實驗結果顯示以改變1位元的金鑰解密得到的畫面依然保有良好的保密效果。在執行時間部分,我們的演算法對整體H.264增加的時間低於0.5%,因此可使用於即時傳輸。以上測試結果顯示本論文提出的分法適合於實際應用。

    The H.264 video coding standard has been widely applied to multimedia data transmission. To prevent the contents of video from being recognized by someone unauthorized, providing sufficient security to H.264 has become more and more important.
    In this thesis, an improved H.264/AVC video encryption method is proposed. As compared with the Shahid’s method, more data are encrypted. And this makes the outcome more desirable. In the proposed scheme, selective encryption (SE) is performed in the motion vector difference (MVD), delta quantization parameter (delta QP), and the context-based adaptive variable length coding (CAVLC) modules. Owing that the encrypted stream should be decoded correctly before decryption, a format-compliant method is presented. Furthermore, in order to keep the bitrate unchanged, keeping the same stream length is another important characteristic of our proposed scheme. Since there is no escalation in bitrate, the proposed encryption algorithm is suitable for real-time multimedia streaming over heterogeneous networks. The encrypting key is generated by using the advanced encryption standard (AES) algorithm, and every frame has its own unique key.
    Four benchmark video sequences with different combinations of motion, texture and objects were used for experimental evaluation of the proposed scheme. The structural similarity (SSIM) index, a reference value to image quality, of the proposed scheme is 0.202 which is lower than 0.233 of the Shahid’s scheme. The key security is shown reliable under the test of only 1 bit change. The extra computation needed by our scheme is less than 0.5%, so it is feasible for real-time transmission. The above performance on security and sensitivity demonstrates that our proposed scheme is a good candidate for practical applications.

    摘要 I Abstract III 誌謝 V Contents VI List of Tables VIII List of Figures IX Chapter 1 Introduction 1 Chapter 2 H.264/AVC and H.264/AVC-Based Encryption System 5 2.1 Overview of H.264/AVC 5 2.2 CAVLC 10 2.3 Motion Vector Difference (MVD) 14 2.4 Delta Quantization Parameter (Delta QP) 16 2.5 Overview of SE on Video Coding System 18 2.5.1 Encryption Algorithms before Compression 18 2.5.2 Joint Compression and Encryption 19 2.5.3 Encryption Algorithms after Compression 20 2.6 Shahid’s Algorithm 22 Chapter 3 Proposed Scheme 25 3.1 LKE-CAVLC 28 3.2 LKE-MVD and LKE-dQP 30 3.3 Hierarchical Key Generation Scheme 32 3.4 Comparison Between Shahid’s Scheme and Ours 34 Chapter 4 Experimental Results 36 4.1 Privacy Protection 36 4.2 Security Analysis 40 4.2.1 Analysis of Entropy 40 4.2.2 Correlation of Adjacent Pixels 41 4.2.3 Key Sensitivity Test 42 4.3 Computation Time Analysis 43 4.4 Comparative Evaluation 44 Chapter 5 Conclusion 46 References 47

    [1] M. Abomhara, O. Zakaria, O. Khalifa, A. Zaiden and B. Zaiden, “Enhancing selective encryption for H.264/AVC using advanced encryption standard,” Int. J. Comput. Electric. Eng., vol. 2, no. 2, pp. 223–229, April 2010.
    [2] M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers, “Format preserving encryption,” in Proc. 16th Annu. Int. Workshop Selected Areas Cryptography, pp. 295–312, 2009.
    [3] H. Cheng and X. Li, “Partial encryption of compressed images and videos,” IEEE Trans. Signal Processing, vol. 48, no. 8, pp. 2439–2445, Aug. 2000.
    [4] P. Carrillo, H. Kalva, and S. Magliveras, “Compression independent reversible encryption for privacy in video surveillance,” EURASIP J. Inform. Security, vol. 2009, no. 5, Jan, 2009.
    [5] F. Dufaux and T. Ebrahimi, “Scrambling for privacy protection in video surveillance systems,” IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 8, pp. 1168–1174, Aug. 2008.
    [6] Y. Fan, J. Wang, T. Ikenaga, Y. Tsunoo and S. Goto, “A new video encryption scheme for H.264/AVC,” in Proc. Adv. Multimedia Information Process., pp. 246–255, 2007.
    [7] M. Grangetto, E. Magli and G. Olmo, “Multimedia selective encryption by means of randomized arithmetic coding,” IEEE Trans. Multimedia, vol. 8, no. 5, pp. 905–917, Oct. 2006.
    [8] H. Hellwagner, R. Kuschnig, T. Stütz, and A. Uhl, “Efficient in-network adaptation of encrypted H.264/SVC content,” Elsevier J. Signal Process. Image Commun., vol. 24, no. 9, pp. 740–758, Jul. 2009.
    [9] W. Jiangtao, K. Hyungjin and J. Villasenor, “Binary arithmetic coding with key-based interval splitting,” IEEE Signal Process. Lett., vol. 13, no. 2, pp. 69–72, Feb. 2006.
    [10] S. Lian, Z. Liu, Z. Ren and Z. Wang, “Selective video encryption based on advanced video coding,” in Proc. PCM 2005, Part II, vol. 3768, pp. 281–290, 2005.
    [11] S. Lian, J. Sun, G. Liu and Z. Wang, “Efficient video encryption scheme based on advanced video coding,” Multimedia Tools and Applications, vol. 38, no. 1, pp. 75–89, May. 2008.
    [12] C. Li, X. Zhou, and Y. Zong, “NAL level encryption for scalable video coding,” in Proc. PCM, no. 5353, pp. 496–505, Dec. 2008.
    [13] D. Marpe, H. Schwarz and T. Wiegand, “Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard,” IEEE Transactions on Circuits and Systems For Video Technology, vol. 13, no. 7, pp. 620-636, July 2003.
    [14] Iain E. G. Richardson, H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia, Wiley, 1st Edition, 2003.
    [15] Douglas R. Stinson, “Cryptography theory and practice,” 3rd Ed. Chapman & Hall/CRC, 2006
    [16] Z. Shahid, M. Chaumont and W. Puech, “Fast protection of H.264/AVC by selective encryption of CABAC,” in Proc. IEEE ICME, pp. 1038–1041, Jun. 2009.
    [17] P. C. Su, C. W. Hsu and C. Y. Wu, “A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting,” Multimedia Tools Applicat., vol. 52, nos. 2–3, pp. 529–549, Jan. 2010.
    [18] Z. Shahid, M. Chaumont and W. Puech, “Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and B frames,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 5, pp. 565–576, May 2011.
    [19] T. Stütz and A. Uhl, “A survey of H.264 AVC/SVC encryption,” IEEE Transactions on Circuits and Systems For Video Technology, vol. 22, no. 3, pp. 325-339, March 2012.
    [20] L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently,” in Proc. ACM Multimedia, vol. 3, pp. 219–229, 1996.
    [21] A. Uhl and A. Pommer. “Image and video encryption: from digital rights management to secured personal communication.” Springer, 2005.
    [22] L.M. Varalakshmi, V. Bharathi and V.F. Sudha, “A selective encryption scheme for H.264 video based on permutation code and dynamic keys,” in Proc. International Conference on Computer Communication and Informatics (ICCCI), pp. 1-5, Jan. 2012.
    [23] T. Wiegand, G. J. Sullivan, G. Bjontegaard and A. Luthra, “Overview of the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003.
    [24] Z. Wang, A. Bovik, H. Sheikh and E. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Trans. Image Process., vol. 13, no. 4, pp. 600–612, Apr. 2004.
    [25] C. P. Wu and C. C. Kuo, “Design of integrated multimedia compression and encryption systems,” IEEE Trans. on Multimedia, vol. 7, no. 5, pp. 828-839, Oct. 2005.
    [26] X. Wang, N. Zheng and L. Tian, “Hash key-based video encryption scheme for H.264/AVC,” in Sig. Proc. Image Comm., vol. 25, no. 6, pp. 427-437, 2010.
    [27] Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264/ISO/IEC 14496-10 AVC), document JVT-G050, Joint Video Team (JVT), Mar. 2003.
    [28] ISO/IEC 14496-10 and ITU-T Rec. H.264, Advanced Video Coding, 2003.

    下載圖示 校內:2015-09-01公開
    校外:2015-09-01公開
    QR CODE