a seed generation technique based on elliptic...

33
A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Computer Science (Information Security) Faculty of Computing Universiti Teknologi Malaysia JUNE 2013

Upload: trinhdat

Post on 08-May-2019

214 views

Category:

Documents


0 download

TRANSCRIPT

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR

PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE

TELECONFERENCING

VAHIDREZA KHOUBIARI

A project report submitted in partial fulfillment of the

requirements for the award of the degree of

Master of Computer Science (Information Security)

Faculty of Computing

Universiti Teknologi Malaysia

JUNE 2013

iii

I dedicate my thesis to my family. A special feeling of thankfulness to my loving

wife, “Sara” whose without her help and patience this work could not be done. To

my parents whose words of inspiration and push for endurance ring in my ears.

iv

ACKNOWLEDGEMENT

I would like to truly appreciate Associate Prof. Dr. Mazleena Salleh for

taking the time out of her busy schedule to encourage and guide me through this

project. Her deep knowledge and valuable experience inspired me and illuminated

my path. Also I would like to thank Dr. Majid Bakhtiari for his great advices and

technical points that he gave me without any expectation.

Beside I should be appreciative of authority of Universiti Teknologi Malaysia

(UTM) for providing me with a good environment and creative area.

v

ABSTRACT

Immersive Teleconferencing as one of the new progresses in video-

conferencing allows users to see multiple partners in the conference simultaneously

or watch a single event from different views. H.264/MVC standard provides a well-

defined structure for implementing immersive teleconferencing that can merge

pictures taken by several cameras into a single video stream at the encoder side and

also show the encoded video stream from different views at the decoder side. For

confidential and top secret circumstances like governmental, military and medical

cases keeping the contents of conversations hidden from adversaries is critical.

Therefore for these applications video content encryption is necessary. The

encryption scheme used for video-conferencing besides high perceptual security

must have suitable synchronization performance between two parties due to used key

stream especially in noisy transmission environments. The problem with existing

techniques is that their seed generations have no synchronization mechanism or they

add the encrypted seed or its hash value to the bitstream as synchronization control

information. To overcome the issue this study recommends a seed generation

technique based on points located on elliptic curve to provide synchronization

between teleconferencing parties due to applied key stream. The work proved that

points located on elliptic curve have proper randomness characteristics to offer the

appropriate security property. The results show that the proposed technique performs

better synchronization in secured environment than current seed generation

techniques.

vi

ABSTRAK

Immersive Teleconferencing merupakan salah satu pembaharuan dalam

persidangan video yang membolehkan para pengguna melihat beberapa rakan

mereka di dalam satu persidangan secara serentak atau menonton sesuatu rancangan

dengan menggunakan pandangan yang berbeza. Piawai H.264/MVC yang digunakan

menyediakan struktur yang jelas untuk melaksanakan Immersive Teleconferencing

membolehkan video yang diambil dari beberapa kamera digabungkan menjadi satu

strim video di bahagian pengekod. Strim video yang telah dikodkan akan dipisahkan

semula untuk menjadi satu pandangan yang berbeza di bahagian penyahkod. Untuk

penggunaan yang sulit atau rahsia seperti dalam transaksi kerajaan, tentera mahupun

perubatan, kandungan video perlu disembunyikan dari pihak musuh dan ini akan

tercapai dengan penggunaan teknik penyulitan. Selain dari keperluan kawalan

keselamatan yang tinggi dalam persidangan video, skema penyulitan yang digunakan

juga mesti mempunyai prestasi sinkronisasi yang sesuai kerana penggunaan strim

kekunci dan terutama sekali dalam talian penghantaran yang mempunyai hingar yang

tinggi. Masalah dengan teknik yang sedia ada ialah ia tidak disokong dengan

penjanaan benih yang mempunyai mekanisma sinkronisasi atau jika ada pun, nilai

benih tersulit atau nilai cincangannya akan dihantar bersama strim bit sebagai

kawalan maklumat sinkroni. Untuk mengatasi masalah tersebut, kajian ini

mencadangkan teknik pembenihan berdasarkan titik-titik yang terletak pada lengkuk

eliptik bagi menyokong penyelarasan diantara pihak-pihak yang bersidang. Kajian

ini telah membuktikan bahawa titik-titik yang terletak pada lengkuk eliptik

mempunyai ciri kerawakkan yang sesuai untuk keselamatan. Keputusan kajian

menunjukkan bahawa teknik yang dicadangkan mempunyai prestasi yang lebih baik

dari teknik yang sedia ada dari segi sinkronisasi dalam persekitaraan terselamat.

vii

TABLE OF CONTENTS

CHAPTER TITEL PAGE

DECLARATION II

DEDICATION III

ACKNOWLEDGEMENT IV

ABSTRACT V

ABSTRAK VI

ABLE OF CONTENTS VII

LIST OF TABLES XII

LIST OF FIGURES XIV

LIST OF ABBREVIATION XVIII

LIST OF APPENDIX XXI

1 INTRODUCTION

1.1 Introduction 1

1.2 Background of the Problem 2

1.3 Statement of the Problem 5

1.4 Research Questions 6

1.5 Purpose of the Study 6

1.6 Objectives of the Study 6

1.7 Scope of the Study 7

1.8 Significance of the Study 7

1.9 Thesis Organization 8

2 LITERATURE REVIEW

2.1 Introduction 9

2.2 Color Spaces 9

viii

2.2.1 RGB Color Spaces 10

2.2.2 YCrCb Color Spaces 11

2.3 Video Formats 13

2.3.1 Intermediate 13

2.3.2 Standard Definition 14

2.3.3 High Definition 14

2.4 H.264/MPEG-4 AVC 15

2.4.1 Previous ITU-T VCEG Works 16

2.4.2 Previous ISO/IEC MPEG Works 17

2.4.3 Working of H.264 18

2.4.3.1 Encoder 19

2.4.3.1.1 Prediction 20

2.4.3.1.2 Transform and Quantization 22

2.4.3.1.3 Entropy Encoding 24

2.4.3.2 Decoder 24

2.4.3.2.1 Bitstream Decoding 25

2.4.3.2.2 Rescaling and Inverse

Transform 25

2.4.3.2.3 Reconstruction 26

2.4.4 H.264 AVC Syntax 28

2.5 Scalable Video Coding (SVC) 28

2.5.1 H.264 SVC Syntax 31

2.6 Multiview Video Coding (MVC) 33

2.6.1 Immersive Teleconferencing 33

2.6.2 H.264 MVC Syntax 34

2.7 Multimedia Encryption 35

2.7.1 Performance Parameters 35

2.7.1.1 Security Requirement 35

2.7.1.1.1 Cryptographic Security 36

2.7.1.1.2 Perceptual Security 39

2.7.1.1.3 Security Level 42

2.7.1.2 Compression Efficiency 42

2.7.1.3 Encryption Efficiency 43

2.7.2 Before Compression 44

ix

2.7.3 Compression Integrated 44

2.7.4 Bitstream Oriented Encryption 45

2.8 Related Works 46

2.9 Criteria for Enhancement 61

2.10 Using Points of Discrete Elliptic for Generating

Random Numbers 64

2.11 Summary 65

3 RESEARCH METHODOLOGY

3.1 Introduction 66

3.2 Operational Framework 67

3.3 Research Framework 69

3.4 Software and Hardware Requirements 71

3.5 Functions Considered 71

3.5.1 Video Encoder 72

3.5.2 Views Assembler 72

3.5.3 MVC Bitstream Analyser 72

3.5.4 Noise Simulator 73

3.5.5 PSNR Analyser 73

3.6 Data Set 73

3.6.1 Data Analyses 75

3.7 Test / Experiment 75

3.7.1 Technique I 76

3.7.2 Technique II 76

3.8 Summary 76

4 DESIGN

4.1 Introduction 78

4.2 Randomness between Numbers in a Series 80

4.2.1 Autocorrelation 80

4.3 Proof of Randomness between Points Located on a

Discrete Elliptic Curve over Fp 84

4.3.1 Difference of x Values between Two Sequential

Points 84

4.3.2 Difference of y Values between Two Sequential

Points 86

x

4.3.3 Distance between Two Sequential Points 88

4.3.4 Randomness for other Fields 90

4.4 Generating Points Located on Elliptic Curves over Fp 92

4.5 General Framework 93

4.5.1 Encryption without Synchronization between

Encryptor and Decryptor 94

4.5.2 Adding Hash of Seed to the Bitstream 94

4.5.3 Seed Generator Based on Elliptic Curve 95

4.5.4 Noise Simulator 95

4.6 Summary 96

5 IMPLEMENTATION AND ANALYSIS

5.1 Introduction 97

5.2 Seed Generation Function 97

5.3 Implementation of Proposed Synchronization

Technique 99

5.3.1 Encryption and Decryption without

Synchronization 100

5.3.2 Hash of the Seed as Synchronization

Control Information 100

5.3.3 Synchronization by Using NALU’s

Identification 101

5.4 Analysis of Tests Result on Techniques 101

5.4.1 Synchronization Performance Analysis 101

5.4.2 Overhead Analysis 112

5.5 Security of Proposed Seed Generator Function 112

5.6 Real-Time Considerations 113

5.6.1 Time Considerations 114

5.6.2 Processor Considerations 115

5.7 Summary 116

6 CONCLUSION

6.1 Project Achievements 117

6.1.1 Overview of Study 118

6.1.2 Project Contribution 119

6.1.3 Implication of Result 120

6.2 Future Work 120

xi

REFERENCES 121

APPENDIX A 126

xii

LIST OF TABLES

TABLE NO. TITLE PAGE

2.1 Popular Format Set of Common Intermediate Format 13

2.2 30Hz and 25 Hz Frame Rate Parameters 14

2.3 High Definition Video Formats Parameters 15

2.4 Different Standards of VCEG 16

2.5 Different Standards of MPEG 17

2.6 Selected NAL Unit Types 31

2.7 Quality Level in a Subjective Metric 39

2.8 Security Level of Different Encryption Algorithms 41

2.9 Compression Efficiency Classification of Encryption

Algorithms 42

2.10 Encryption Efficiency Classification of Encryption

Algorithms 43

2.11 The Proposed NUT Replacement Value by Stütz and

Uhl (2008) 47

2.12 Comparison of Some of H.264/AVC and SVC

Encryption Techniques 61

3.1 Name and Properties of Sequences Used in this Work 73

4.1 Interpretation of Autocorrelation Value 80

4.2 Autocorrelation Value for Distance between x and y

value and Distance Between Points Located on Curve

Ep(1,1). 90

4.3 Points Located on E23(1, 1) 91

5.1 Result of NIST Tests for Sample Numbers Generated by

Cryptgenrandom 102

5.2 Effect of Noise in Each Technique 107

5.3 Result of NIST Tests for Sample Numbers Generated by

Proposed Function 112

xiii

5.4 Required Time for Producing All Points Located on

EP(1, 1) 113

5.5 Maximun, Minimun and Average Time Between

Generating of Two Sequential Point for different Curve

EP(1, 1)in Millisecond 114

xiv

LIST OF FIGURES

FIGURE NO. TITLE PAGE

1.1 Immersive Teleconferencing 5

2.1 Research Area 10

2.2 4:2:0, 4:2:2 and 4:4:4 Sampling Patterns by Richardson

(2010) 12

2.3 Standards Definition and High Definition Video Formats

by Richardson (2010) 15

2.4 Overall Procedures of Encoders and Decoders of H.264

Formats by Richardson (2010) 18

2.5 H.264 Video Coding and Decoding Process Formats by

Richardson (2010) 19

2.6 Typical H.264 Encoder Formats by Richardson (2010) 20

2.7 Prediction Flow Diagram of H.264 Encoder Formats by

Richardson (2010) 21

2.8 Intra-Prediction Formats by Richardson (2010) 21

2.9 Inter-Prediction Formats by Richardson (2010) 22

2.10 Forward Transform Formats by Richardson (2010) 23

2.11 Quantization Example, QP = 8 Formats by Richardson

(2010) 23

2.12 Typical H.264 Decoder Formats by Richardson (2010) 24

2.13 Rescaling of Quantized Numbers Formats by Richardson

(2010) 25

2.14 Inverse Transform Formats by Richardson (2010) 26

2.15 Reconstruction Flow Diagram of H.264 Decoder Formats

by Richardson (2010) 27

2.16 H.264 Syntax Overview Formats by Richardson (2010) 29

2.17 H.264 Syntax Overview Formats by Richardson (2010) 30

2.18 NAL Unit Header Structure Formats by Richardson

(2010) 30

xv

2.19 SVC Extension NAL Unit Header Stütz and UHL (2012) 31

2.20 A Sample of H.264 Svc Bitstream Stütz and UHL (2012) 32

2.21 Example of MVC Nalu Stütz and UHL (2012) 34

2.22 Histograms of Plain-Image and Cipher-Image by Lian

(2009) 39

2.23 Original Image with Its Different Quality Level

Ciphertext by Lian (2009) 41

2.24 Effect of Noise in Techniques without Synchronization

Mechanism 46

2.25 Encryption Scheme Proposed by Park and Shin (2008) 48

2.26 Encryption Scheme Proposed by Lei, Lo and Lei (2010) 49

2.27 Encryption Scheme Proposed by Mian, Jia and Lei (2007) 50

2.28 Proposed Encryption Scheme by Thomas, Bull and

Redmill (2009) 51

2.29 Encryption Flowchart Proposed by Wei, Et Al. (2012) 52

2.30 Decryption Flowchart Proposed by Wei, Et Al. (2012) 52

2.31 Intra-Prediction Mode Encryption Proposed by Li, Yuan

and Zhong (2009) 53

2.32 Sign Encryption Proposed by Li, Yuan and Zhong (2009) 53

2.33 Temporal Layer Encryption Proposed by Li, Yuan and

Zhong (2009) 54

2.34 Spatial/Snr Layer Encryption Proposed by Li, Yuan And

Zhong (2009) 54

2.35 Encryption Process for Ipm and Mv Proposed by

Varlakshmi, Sudha, And Jaikishan (2012) 55

2.36 Texture Encryption Proposed by Varlakshmi,Sudha, and

Jaikishan (2012) 55

2.37 Enhancement Layer Encryption Proposed by Varlakshmi,

Sudha, and Jaikishan (2012) 56

2.38 Proposed Encryption Algorithm by Boztok Algin and

Tunali (2011) 57

2.39 Proposed Synchronization Mechanism by Boztok Algin

and Tunali (2011) 58

2.40 Encryption Scheme Proposed by Arachchi Et Al. (2009) 59

2.41 Decryption Scheme Proposed by Arachchi Et Al. (2009) 60

2.42 Encryption Scheme Proposed by Won, Bae and Ro

(2009) 61

3.1 Operational Framework 68

3.2 Research Framework 70

xvi

3.3 First View to 8th

View of Exit Video Stream 74

3.4 First View to 8th

View of Vassar Video Stream 75

4.1 SIN(5) Function 82

4.2 Correlogram of SIN(5) 82

4.3 A Pseudo-Random Series 83

4.4 Correlogram of A Pseudo-Random Series 83

4.5 Difference Between X Values of Sequential Points on

E1162099(1, 1) 85

4.6 Correlogram of Difference Between X Values of

Sequential Points on E1162099(1, 1) 86

4.7 Difference Between Y Values of Sequential Points on

E1162099(1, 1) 87

4.8 Correlogram of Difference Between Y Values of

Sequential Points on E1162099(1, 1) 88

4.9 Distance Between Sequential Points on E1162099(1, 1) 89

4.10 Correlogram of Distance Between Sequential Points on

E1162099(1, 1) 90

4.11 General Framework 93

4.12 Technique without Synchronization 94

4.13 Technique that Adds Hash Value of Seed to Bitstream 95

4.14 Proposed Seed Generator Technique 96

5.1 General Outline of Seed Generator Function 98

5.2 Internal Operation of Seed Generator Function 99

5.3 Pseudo Code Used to Make Noise in Video Stream 102

5.4 Sample of Numbers Generated by Cryptgenrandom 103

5.5 PSNR Result for Y Value of Exit Video Stream for the

Three Techniques 104

5.6 PSNR Result for U Value of Exit Video Stream for the

Three Techniques 104

5.7 PSNR Result for V Value of Exit Video Stream for the

Three Techniques 105

5.8 PSNR Result for Y Value of Vassar Video Stream for

the Three Techniques 105

5.9 PSNR Result for U Value of Vassar Video Stream for

the Three Techniques 106

5.10 PSNR Result for V Value of Vassar Video Stream for

the Three Techniques 106

5.11 Each I Frame May Proceed by Some P or B Frames 107

xvii

5.12 PSNR Result Of Noise Effect At 26th

Frame for Vassar

Video Stream 109

5.13 PSNR Result of Noise Effect at 26th

Frame for Exit

Video Stream 109

5.14 PSNR Result of Noise Effect at 50th

Frame for Vassar

Video Stream 110

5.15 PSNR Result of Noise Effect at 50th

Frame for Exit

Video Stream 110

5.16 Frame 218th

of Vassar Video Stream after Decryption 112

xviii

LIST OF ABBREVIATION

4CIF 4× CIF

AES Advanced Encryption Standard

ATSC Advanced Television Systems Committee

AVC Advanced Video Coding

CABAC Context-Adaptive Binary Arithmetic Coding

CAVLC Context-Adaptive Variable-Length Coding

CBC Cipher Block Chaining

CCR Changed Compression Ratio

CFB Cipher Feedback

CIF Common Intermediate Format

CSPRNG Cryptographically Secured Pseudo Random Number Generator

DCT Discrete Cosine Transform

DES Data Encryption Standard

DID Dependency ID

DVB-C Digital Video Broadcasting - Cable

DVB-S Digital Video Broadcasting - Satellite

DVB-S2 Digital Video Broadcasting - Satellite - Second Generation

DVB-T Digital Video Broadcasting - Terrestrial

DVB-T2 Digital Video Broadcasting – Terrestrial - Second Generation

DVD Digital Versatile Disc

EBU European Broadcasting Union

xix

ECB Electronic Codebook

ETR Encryption Time Ratio

GOP Group Of Pictures

HD High-Definition Video

HDTV High-Definition Television

HVS Human Visual System

IEC International Electrotechnical Commission

IPM Intra Prediction Mode

ISDB-T Integrated Services Digital Broadcasting-Terrestrial

ISO International Organization for Standardization

ITU-R International Telecommunication UnionRadiocommunication Sector

ITU-T International Telecommunication UnionTelecommunication

Standardization Sector

IV Initial Vector

JMVC Joint Multiview Video Coding

MPEG Moving Expert Picture Group

MV Motion Vector

MVC Multiview Video Coding

MVD Motion Vector Difference

NAL Network Abstraction Layer

NALU Network Abstraction Layer Unit

NIST National Institute of Standards and Technology

NTSC National Television System Committee

NUT Network Abstraction Layer Unit Type

PAL Phase Alternating Line

PPS Picture Parameter Sets

PSNR Peak Signal-to-Noise Ratio

QCIF Quarter CIF

xx

QID Quality ID

QP Quantization Parameter

SD Standard Definition

SECAM SéquentielCouleur À Mémoire(Sequential Color with Memory)

SNR Signal-to-Noise Ratio

SPS Sequence Parameter Sets

SVC Scalable Video Coding

TID Temporal ID

URL Uniform Resource Locator

VCEG Video Coding Experts Group

VCL Video Coding Layer

xxi

LIST OF APPENDIX

NO. TITLE PAGE

A Source Code 126

CHAPTER 1

INTRODUCTION

1.1 Introduction

Video-conferencing has become one of the favorite communication

technologies in recent years especially by increasing the popularity and bandwidth of

internet connection around the world. One of the new progresses in this area is

Immersive Teleconferencing. Immersive Teleconferencing allows users to see

multiple partners in the conference simultaneously or watch a unique event from

different views. For confidential and top secret cases like governmental, military and

medical cases keeping the contents of conversations hidden from adversaries is

critical, though it is necessary to encrypt them. Therefore the security of the applied

encryption technique should be high enough while imposing low encryption

overhead to the video stream to avoid packet size increasing in the transmission. One

of the issues in this subject is synchronization between two parties especially in lossy

or noisy environments which causes packet-error and packet-loss during

transmission.

Rest of this chapter contains the problem background, problems statement,

scope and objectives of the research.

2

1.2 Background of the Problem

ITU-T Video Coding Expert Groups (VCEG) and ISO/IEC joint working

group, Moving Expert Picture Group (MPEG), developed the H.264/MPEG-4 AVC

standard as a well-defined structure codec (ITU-T recommendation for H.264, series

h). H.264/AVC converts the video source to a series of blocks which are compressed

based on dependencies between pixels in a frame and pixels between other frames

and also motion prediction. It has a wide range of coverage from low-bit to high

definition formats and is widely used in digital TV, Blue-ray Discs, You-Tube,

Mobile TV, Adobe Flash Player, videoconferencing, Microsoft Silverlight, online

video streaming, terrestrial HDTV, satellite HDTV and etc. (Richardson, 2010).

Later ITU-T and ISO/IEC joint group developed a scalable extension for

H.264/AVC which is called Scalable Video Coding (ITU-T recommendation for

H.264, series h). SVC adds subset bitstreams to AVC that present different

scalability based on users’ hardware and network bandwidth. This scalability could

be temporal (frame rate), spatial (resolution) and/or SNR (quality) (Schwarz, Marpe

and Wiegand, 2007).

Recently ITU-T and ISO/IEC joint group developed Multiview Video Coding

(MVC) as another extension of H.264/MPEG-4 AVC (ITU-T recommendation for

H.264, series h). Like SVC, MVC adds subset bitstreams to AVC that present

different views on a unique video stream. These views could be from a same

scene/object or from different scenes or objects. It can be used for applications such

as 3D video application, free-viewpoint video, immersive teleconferencing (Vetro,

Wiegand and Sullivan, 2011).

Different encryption schemes based on H.264/AVC and/or SVC standard

have been proposed to provide security for video bitstream (Stütz and Uhl, 2012).

These encryption schemes can be categorized as:

3

i. Before Compression Encryption

ii. Compression Integrated Encryption

iii. Bitstream Encryption

Before Compression Encryption schemes encrypt the whole video stream,

and then the encoder starts to compress the encrypted bitstream. The compression

procedures of encoders are based on the relationship between adjacent blocks of each

frame and also relationship between different frames. Encrypting the bitstream

before compression disturbs these relationships and has a great negative influence on

compression performance. Therefore this kind of encryption is suitable for hiding

especial part of the video and is not appropriate to apply to the whole bitstream

(Carrillo, Kalva, and Magliveras, 2008). Accordingly this kind of encryption is not

suitable for real-time video applications like video-conferencing.

Compression Integrated Encryption schemes are applied to the video stream

while encoder is compressing the original bitstream. There are eight kinds of

compression integrated encryption scheme: Intra-Prediction, Inter-Prediction, Motion

Vector, Secret Transform, DCT Coefficient, Secret Scan Order, Joint Encryption and

CAVLC and Joint Encryption and CABAC. Bitstream or After Compression

Encryptionschemes are applied to the compressed video stream after encoding. There

are three kinds of bitstream encryption scheme: NALU Encryption, Container-

Formats and Partial/Selective Encryption (Stützand Uhl, 2012). Different techniques

for mentioned encryption scheme kinds have been proposed.

Several encryption performance evaluation parameters for multimedia

encryption have been proposed and discussed comprehensively by (Lian, 2009).

These parameters are: Security Requirement, Compression Efficiency and

Encryption Efficiency which are discussed in Chapter 2. Synchronization

performance in lossly or noisy transmission environments also can be added to above

list especially for real-time video streaming applications like teleconferencing.

4

The proposed During Compression or After Compression encryption

techniques for real-time application have some weaknesses in synchronization

performance in lossy or noisy environments. Some techniques suggest using a unique

key for the whole conversation to avoid losing synchronization. Using only one key

makes the cipher vulnerable against some attacks such as known plaintext and

chosen plaintext (Boztok Algin and Tunali, 2011). Some techniques send the

encryption seed/key or its hash value for each group of packets to maintain

synchronization during transmission. These methods do not have sufficient resilience

against high lossy networks and also impose overhead to the bitstream (Boztok Algin

and Tunali, 2011).

Immersive teleconferencing allows the user to see multiple partners

simultaneously as shown in Figure 1.1. Pictures taken by multiple cameras are

merged together by encoder and sent as a unique bitstream to the other side via

network. In the other side the decoder separates the bitstream to multiple views. In

some cases of immersive teleconferencing application such as governmental,

military, medical and secret business conferencing, security and keeping the contents

of conversation confidential is very important. H.264/MVC is one of the progressive

standards for immersive teleconferencing applications development. In MVC

different pictures from different cameras joint with each other and make a single

bitstream. Therefore the size of the bitstream for a particular duration may be far

bigger than AVC or even SVC, though a lightweight encryption scheme with very

high security is needed. Because for a fraction of time there are more frames in a

MVC bitstream than AVC or SVC’s, the scheme should not impose a high level of

overhead to the bitstream. Also both sides of conversation should be able to

synchronize with each other in case of packet-error or packet-loss especially in lossy

or noisy environment. The existing schemes for real-time AVC and SVC video

encryption have some weaknesses in synchronization performance.

Therefore a research needs to propose a synchronization technique for real-

time MVC video that can cover the issue.

5

Figure 1.1: Immersive Teleconferencing

1.3 Statement of the Problem

In some cases of real-time video streaming based on H.264/MVC like

confidential immersive teleconferencing hiding the video contents from adversary is

critical. The existing schemes for H.264 extensions encryption have some

weaknesses for real-time cases. These schemes do not have suitable synchronization

performance in lossy or noisy transmission media (Mian, Jia and Lei, 2007). Even

though these schemes have this performance they either impose significant overhead

to the bitstream (Won, Bae and Ro, 2006) or reduce the security level (Wei et al.,

2012).

6

1.4 Research Questions

This study will answer to the following questions:

i. What parameters are required to have a synchronization performance

in secured real time video application?

ii. How could be an enhanced seed generation scheme that has suitable

synchronization performance?

1.5 Purpose of the Study

The purpose of this study is to propose a seed generation and sharing scheme

for multimedia encryption based on MVC extension of H.264 standard for immersive

teleconferencing. This research proposes a seed generation and sharing scheme to

have suitable synchronization performance in noisy or lossy environments while

preserving the security of encryption with low encryption overhead imposition.

Moreover this research compares existing real-time encryption schemes for

H.264/AVC and SVC with the recommended scheme in terms of synchronization

performance.

1.6 Objectives of the Study

Here are the objectives of the study:

i. To study the synchronization performance of current multimedia

encryption schemes based on H.264/AVC and SVC for real-time

applications.

7

ii. To propose and implement a seed generation scheme based on

H.264/MVC to cover the current weaknesses in synchronization

performance for real-time application.

iii. To validate and evaluate synchronization performance based on

the proposed seed generation scheme.

1.7 Scope of the Study

This research presents the requirement and technical points of view of a seed

generation and sharing technique for immersive teleconferencing encryption and

outlines the implementation of this scheme with following specifications:

i. The technique is based on the MVC extension of H.264 standard.

ii. The technique is for peer-to-peer teleconferencing.

iii. The software program which is used in this research is designed with

Microsoft Visual Studio C++.

iv. JMVC (Joint Multiview Video Coding) reference program willbeused

for some security performance parameters evaluation.

1.8 Significance of the Study

This study proposes a seed generation and sharing scheme for Multiview

Video Coding (MVC) extension of H.264 standard that could be used for immersive

teleconferencing, either for communicating with multiple partners simultaneously or

watching an event from different views. It could be a secured scheme with low

encryption overhead while having suitable synchronization performance for lossy or

noisy transmission media.

8

The scheme may be used for confidential and top secret immersive

teleconferencing such as governmental, military or medical cases.

1.9 Thesis Organization

This chapter gives a brief overview of the problem background and scope of

this study. In Chapter 2 first essential definitions for video coding and history of

H.264 AVC, SVC and MVC will be discussed. Then different method of multimedia

encryption and the parameters to evaluate them and different related works including

their weaknesses with respect to synchronization will be proposed. The research

methodology for this study will be proposed in Chapter 3. Chapter 4 includes design

while Chapter 5 consists of implementation, results and for the proposed technique.

Chapter 6 concludes the project.

121

REFERENCES

Arachchi, H. K., Perramon, X., Dogan, S. and Kondoz, A. M., 2009, Adaptation–

Aware Encryption of Scalable H.264/AVC Video for Content Security, Signal

Processing: Image Communication, 24(6), 468-483.

Bergeron, C. and Lamy-Bergor, C., 2005, Compliant Selective Encryption For

H.264/Avc Video Streams, In Proceedings of the IEEE Workshop on

Multimedia Signal Processing, MMSP’05, pages 1–4, October 2005.

Box, G. E., Jenkins, G. M. and Reinsel, G. C., 2011, Time Series Analysis:

Forecasting and Control, (Vol. 734), Wiley.

Boztok Algin, G. and Tunali, E. T., 2011, Scalable Video Encryption of H. 264 SVC

Codec, Journal of Visual Communication and Image Representation, 22(4),

353-364.

Carrillo, P., Kalva, H., and Magliveras, S., 2008, Compression Independent Object

Encryption for Ensuring Privacy in Video Surveillance. In Proceedings of

International Conference on Multimedia & Expo, ICME’08, pages 273–276.

IEEE, June 2008.

Dufaux, F. and Ebrahimi, T., 2008, H.264/Avc Video Scrambling for Privacy

Protection, In Proceedings of the IEEE International Conference on Image

Processing, ICIP ’08, San Diego, CA, USA, October 2008.

Engel, D., Stütz, T. and Uhl, A., 2009, A Survey on JPEG2000 Encryption.

Multimedia Systems, 15(4):243–270, 2009.

European Broadcasting Union (EBU) Technical Report 3299, 2004, High Definition

Image Formats for Television Broadcasting, Geneva, 2004.

Forouzan, B. A., 2007, Cryptography & Network Security, McGraw-Hill, Inc..

Hai-Wei, S. and Jin-Ping, L., 2009, A Novel Stream Cipher for Video Compressed by

H. 264, In Computer Science-Technology and Applications, IFCSTA'09.

International Forum on (Vol. 2, pp. 54-56), IEEE.

122

Hellwagner, H., Kuschnig, R., Stütz, T. and Uhl, A., 2009, Efficient In-Network

Adaptation of Encrypted H.264/Svc Content, Elsevier Journal on Signal

Processing: Image Communication, 24(9):740 – 758, July 2009.

Iqbal, R., Shirmohammadi, S., Saddik, A. and Zhao, J.,2008, Compressed-Domain

Video Processing for Adaptation, Encryption, and Authentication. IEEE

Multimedia, 15(2):38–50, April 2008.

Iqbal, R., Shirmohammadi, S., Saddik, A., 2007, A Framework for MPEG-21 DIA

Based Adaptation and Perceptual Encryption of H.264 Video. In Roger

Zimmermann, and Carsten Griwodz,editors, Proceedings of SPIE,

Multimedia Computing and Networking 2007, volume 6504. SPIE, 2007.

Iqbal, R., Shirmohammadi, S., Saddik, A., 2006, Secured MPEG-21 Digital Item

Adaptation for H.264 Video. In Proceedings of International Conference on

Multimedia & Expo, ICME ’06, pages 2181–2184, Toronto, Canada, July

2006, IEEE.

ITU-T, Joint Collaborative Team on Video Coding - JCT-VC, Available at:

http://www.itu.int/ITU-T/studygroups/com16/jct-vc/ [Accessed Sep. 2012]

ITU-T, Telecommunication Standardization Sector of ITU, 2012, Series H:

Audiovisual and Multimedia Systems, Infrastructure of Audiovisual Services

– Coding of Moving Video, Advanced Video Coding for Generic Audiovisual

Services, Recommendation ITU-T H.264 (Jan. 2012).

Kapotas, S. K. and Skodras, A. N., 2010, Rate Control of H.264 Encoded Sequences

by Dropping Frames in the Compressed Domain, IEEE 20th International

Conference on Pattern Recognition (ICPR)

Kodikara Arachchi, H., Perramon, X., Dogan, S. and Kondoz, A.M., 2009,

Adaptation-Aware Encryption of Scalable H.264/Avc Video for Content

Security. Signal Processing: Image Communication, 24(6):468–483,2009.

Scalable Coded Media beyond Compression.

Lei, B. Y., Lo, K. T. and Lei, H., 2010, A New H.264 Video Encryption Scheme

Based on Chaotic Cipher. In Communications, Circuits and Systems

(ICCCAS), 2010 International Conference on (pp. 373-377).IEEE.

Li C., Yuan, C. and Zhong, Y., 2009, Layered Encryption for Scalable Video

Coding, 978-1-4244-4131-0/09/, IEEE.

123

Li, Y., Liang, L., Su, Z. and Jiang, J., 2005, A New Video Encryption Algorithm for

H.264, In Proceedings of the Fifth International Conference on Information,

Communications and Signal Processing, ICICS’05, pages 1121– 1124. IEEE,

December 2005.

Lian, Sh., 2009, Multimedia Content Encryption: Techniques and Application, 1st

ed., Taylor and Francis Group, Boca Raton. London, New York, 2009.

Lian, S., Sun, J., Liu, G. and Wang, Z., 2008, Efficient Video Encryption Scheme

Based on Advanced Video Coding, Multimedia Tools and Applications,

38(1):75–89, March 2008.

Lian, S., Liu Z., Ren, Z. and Wang, H., 2006, Secure Advanced Video Coding Based

on Selective Encryption Algorithms, IEEE Transactions on Consumer

Electronics, 52(2):621–629, 2006.

Lian, S., Liu, Z., Ren, Z. and Wang, Z., 2005, Selective Video Encryption Based on

Advanced Video Coding, In Proceedings of the Pacific-Rim Conference on

Multimedia, Advances in Multimedia Information Processing, PCM ’05,

volume 3768 of Lecture Notes in Computer Science, pages 281–290.

Springer, 2005.

Majumder, A., Gopi, M., Seales, B., & Fuchs, H., 1999, Immersive

Teleconferencing: A New Algorithm to Generate Seamless Panoramic Video

Imagery. In Proceedings of the seventh ACM international conference on

Multimedia, pp. 169–178.

Marion, A., 1991, An Introduction to Image Processing. London, Chapman and

Hall.

Mian, C., Jia, J. and Lei, Y., 2007, An H.264 Video Encryption Algorithm Based on

Entropy Coding. In Proceedings of the Third International Conference on

International Information Hiding and Multimedia Signal Processing, IIH-

MSP’07, pages 41–44, Washington, DC, USA, 2007. IEEE Computer

Society.

Park, S.W. and Shin, S.U., 2008, Efficient Selective Encryption Scheme for the

H.264/Scalable Video Coding (SVC), NCM 2008, Sept. 2008, pp. 371-376.

Recommendation ITU-T H.264 | ISO/IEC 14496-10:2009, Advanced Video Coding

for Generic Audio-Visual Services, March 2009.

124

Richardson, I. E., 2010, The H.264 Advanced Video Compression Standard, Wiley,

Second Edition.

Schwarz, H., Marpe, D. and Wiegand, T., 2007, Overview of the Scalable Video

Coding Extension of the H.264/AVC Standard, IEEE Transactions on Circuits

and Systems for Video Technology

Shah, J. and Saxena, V., 2011, Video Encryption: A Survey, IJCSI International

Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011

Shahid, Z., Chaumont, M. and Puech, W, 2009,Fast Protection of H.264/AVC by

Selective Encryption of CABAC, In Proceedings of the IEEE International

Conference on Multimedia & Expo, ICME ’09, Cancun, Mexico, June 2009.

Shannon, C. E., 1949, Communication Theory of Secrecy Systems, Bell Syst. Tech. J.

28, 656–715 (1949).

Shparlinski, I. E., 2009, Pseudorandom Number Generators from Elliptic Curves,

Recent Trends in Cryptography: UIMP-RSME Santaló Summer School, July

11-15, 2005, Universidad Internacional Menéndez Pelayo, Santander,

Spain, 477.

Spinsante, S., Chiaraluce, F. and Gambi, E., 2005, Masking Video Information by

Partial Encryption of H.264/AVC Coding Parameters, In Proceedings of the

13th European Signal Processing Conference, EUSIPCO’05. EURASIP,

September 2005.

Stütz, T. and Uhl, A., 2008, Format-Compliant Encryption of H.264/AVC and SVC,

Tenth IEEE International Symposium on Multimedia

Stütz, T. and Uhl, A., 2012, A Survey of H.264 AVC/SVC Encryption, IEEE

Transactions on Circuits and Systems for Video Technology, March 2012

Su, P., Hsu, C. and Wu, C., 2010, A Practical Design Of Content Protection For

H.264/AVC Compressed Videos By Selective Encryption And Fingerprinting,

Multimedia Tools and Applications, January 2010.

Thomas, T., Bull, D. and Redmill, D., 2009, A Novel H.264 Svc Encryption Scheme

for Secure Bit-Rate Transcoding, In Proceedings of15the Picture Coding

Symposium, PCS’09, Chicago, IL, USA, May 2009.IEEE.

Tong, L., Dai, F., Zhang, Y. and Li, J., 2010, Prediction Restricted H.264/AVC Video

Scrambling for Privacy Protection. Electronic Letters, 46(1):47–49, January

2010.

125

Varlakshmi, L. M., Sudha, G., and Jaikishan, G., 2012,An Efficient Scalable Video

Encryption Scheme for Real time applications, Procedia Engineering, 30,

852-860.

Vetro, A., Wiegand, T. and Sullivan, G. J., 2011, Overview of the Stereo and

Multiview Video Coding Extensions of the H.264/MPEG-4 AVC Standard.

Proceeding of the IEEE, Vol. 99, No. 4, April 2011

Voydock, V. L. and Kent, S. T., 1983, Security Mechanisms in High-Level Network

Protocols. ACM Computing Surveys (CSUR), 15(2), 135-171.

Watkinson, J., 2012, The MPEG Handbook, Elsevier.

Wei, Z., Wu, Y., Ding, X. and Deng, R. H., 2012, A Scalable and Format-Compliant

Encryption Scheme for H.264/Svc Bitstreams, Signal Processing: Image

Communication Volume 27, Issue 9, October 2012, Pages 1011–1024

Wiegand, T., Sullivan G. J., Bjontegaard, G. and Luthra, A., 2003, Overview of the

H.264/Avc Video Coding Standard, IEEE Transactions on Circuits and

Systems for Video Technology, vol. 13, no. 7, pp. 560–576.

Wikipedia, 2012, Peak Signal-to-Noise Ratio (PSNR), Available

at:http://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio [Accessed Sep.

2012]

Won, Y. G., Bae, T. M. and Ro, Y. M., 2006, Scalable Protection and Access

Control in Full Scalable Video Coding, Springer-Verlag Berlin Heidelberg

Yeung, S. A., Zhu, S. and Zeng, B., 2009, Partial Video Encryption Based on

Alternating Transforms, IEEE Signal Processing Letters, 16(10):893–896,

October 2009.

Zou, D. and Bloom, J., 2010,H.264 Stream Replacement Watermarking with CABAC

Encoding, In Proceedings of the IEEE International Conferenceon

Multimedia and Expo, ICME ’10, Singapore, July 2010.