first follow up.pptx

Upload: mohamed-yaacoub

Post on 06-Jul-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/17/2019 First Follow up.pptx

    1/14

    Analysis of the tradeo betweecompression ratio and security lein real-time video communicatio

    Supervisor:DR. Ahmad FADLALLADR !ohamad RAAD

  • 8/17/2019 First Follow up.pptx

    2/14

    "lan

    "ro#ect outline

    $ideo compression%ncryption scheme

    Review of related wor&

    Future wor&

    '(A

  • 8/17/2019 First Follow up.pptx

    3/14

    "ro#ect outline

    ).* %+ permonth ,/01 ).2 %+ permonth ,1

    u3e data consumption

    *4 of tra5c is video

    "ossible solution:6se video compression techni7ue to minimi8e the load

    +69 9his is not the only concernS%6R;9

  • 8/17/2019 First Follow up.pptx

    4/14

    "ro#ect outline

    • $ideo compression

    • Security scheme

    •  9radeo between video compression and security level

  • 8/17/2019 First Follow up.pptx

    5/14

    $ideo compression

    • Reduce data si8e by eliminatin3 redundancy• ombinin3 ima3e compression and motion

    vector compression• lossy or lossless• an be seen as possibility to send better

    7uality while concervin3 the same networ&

    capacity

  • 8/17/2019 First Follow up.pptx

    6/14

    ideo compression

  • 8/17/2019 First Follow up.pptx

    7/14

    %ncryption

    %ncryption is the process of encodin3 messa3es or informatsuch a way that only authori8ed parties can read it.

    Several encryption schemes e=ist:• Full encryption where the whole data is encrypted it is secomple=> re7uire hu3e memory and slow

    • "ermutation is the fact of interchan3in3 byte location> it?ssimple and fast scheme but 3enerally with low security

    • Selective encryption it is considered as li3ht wei3ht encry

    that encrypt data and ma&e it secure with a reasonablecomple=ity and time consumption• "erceptual encryption a low 7uality of data used in specia

    li&e $oD and "ay per $ideo

  • 8/17/2019 First Follow up.pptx

    8/14

    eview of related wor&

    Meyer and Gadegast

    %ncryptin3 !"%@ video stream usin3 RSA and D%S in + mode

    Dierent level of security ,eader> eader and D and A component> ; frame> FullSpecial encoder and decoder must be implemented leadin3 to non format complianDemonstrated reduced e5cient demonstrated by Qiao and Naharestedt

    Aegis mechanism

    • %ncrypt ; frame and eader of !"%@ stream usin3 D%S in + mode• Show the importance of selective encryption• Agi and Gong demonstrated that this mechanism has a low security due

    inter correlation between + and " frame and ; Frame• eader encryption un-useful as they are predictable

  • 8/17/2019 First Follow up.pptx

    9/14

    eview of related wor&

    Changgui Shi and Bharat Bhargava

    • $ideo %ncryption Al3orithm ,$%A1 for !"%@ stream• %ncryption of D9 coe5cient by BRin3 with secret &ey• %nhanced $%A by encryptin3 D coe5cient and si3n of motion vector• $ulnerable to chosen plain-te=t attac&

    iguo Lian, Zhongxuan Liu, Zhen Ren, and Haia !ang

    "roposed for .2CA$ video streamSensitive data as intra prediction mode> residue data and motion vector are encryp

  • 8/17/2019 First Follow up.pptx

    10/14

    eview of related wor&

    Bergeron and Lamy Bergot

    • %ncrypt .2C $ideo stream usin3 A%S•

    Format compliant scheme with possibility of insertin3 encryption in encode• %ncryption bit that have no or ne3li3ible eect on compression ration• Lac& of crypto3raphic security

    A"omhara and a

    • %ncryptin3 .2CA$ ; frame usin3 /E-bit A%S•

    Reduced computational comple=ity and simple to implement•  !ust ta&e in consideration + and " frame

  • 8/17/2019 First Follow up.pptx

    11/14

    Future wor&

    +riey tal&in3 we can resume previous wor& as:

    /. ; frame encryption. D9 coe5cient encryption

    ).!$ encryption

    C.Ghole encryption

  • 8/17/2019 First Follow up.pptx

    12/14

    Future wor&

    ;n our pro#ect $"E is used as video compressiontechni7ue:• Bpen source techni7ue• Gidely implemented and supported ,

    hrome> !o8illa> Bpera H1• !ature techni7ue and recently a mandatory encoder

    to implement in G%+R9•  9he frame by frame processin3

    Simulation will ta&e in consideration one> more or acombination of selective encryption scheme.;n order to analy8e the tradeo between compressionratio an security level in a real time videocommunication.

  • 8/17/2019 First Follow up.pptx

    13/14

    Discussion

  • 8/17/2019 First Follow up.pptx

    14/14

    References

    • isco $isual Ietwor&in3 inde=: @lobal !obile Data 9ra5c Forecast 6p/0-

    • L.'iao and J. Iahrstedt >KAnew Al3orithm for !"%@ $ideo %ncryption•

     M.!eyer and F.@ade3ast >KSecurity mechanism for multimedia-data we=ample !"%@-;-$ideo• ;.A3i and L.@on3> An %mpirical study of secure !"%@ $ideo 9ransmis• @.Spanos and 9.!aples K"erformance of a selective encryption schem

    security of networ&ed> Real-9ime $ideo• .Shi and +.+har3ava> KAn e5cient !"%@ $ideo %ncryption Al3orithm•  M.Gen and al.> K A format-compliant conN3urable encryption framewo

    access control of multimedia• G.Oen3 and S. Lei> K%5cirnt Fre7uency domain selective scramblin3

    video• .+er3eron and . +er3ot> Kompliant Selective encryption for .2C

    $ideo Streams• S.Lian and al.>Secure Advanced $ideo codin3 +ased on selective enc

    al3orithms•

    !.Abomhara and al> K%nhancin3 selective encryption for .2CA$ 6advanced %ncryption Standard