Visual evaluation, scaling and transport of secure videos

Due to the pervasive access to broad band internet at home and on mobile devices Video-onDemand (VoD) and video streaming become more and more popular. Consumers of VoD want to use such systems without locational restrictions, as is embodied in the idea of “ubiquitous computing”, and on any device ranging from cell phones via 3G connection to home cinema system. This requires that VoD providers store videos in various resolutions and qualities, adapted to the screen resolution and connection speed of consumer systems. This in turn leads to an increase in storage and consequently an increased cost for providers. However, there is a solution for this kind of problem, the Universal Multimedia Access (UMA). UMA means a video is encoded in a way which allows the adaptation to consumer requirements from a single source video. This leads not only to a reduction in required storage but also allows to adapt the VoD system to target platforms which were not originally taken into account. The drawback of such a system is the computational cost required to adapt the video. Fortunately, this computational cost can be shifted away from the original server since modern network technologies allow adaptation in the network Just-in-Time (JIT), i.e., at the last possible moment in the network. This can be done by using multimedia aware network elements (MANE), and can theoretically reduce the actual transfer rate at the original server by using multicast and performing the adaptation JIT at the appropriate point in the network. Wavelet based video codecs are inherently scalable and thus fit this application scenario perfectly. Additionally, the performance in terms of quality is the same as for current state of the art, non wavelet based, video codecs. The Motion Compensated Embedded Zero Bit Codec (MCEZBC) is a state of the art wavelet based video codec, and thus meets all the requirements for its use for UMA. To use a wavelet based codec for UMA seems deceptively easy. However, the direct application is prevented by MANEs, network protocols and standards which are designed in regard to the current standardised codec, i.e., H.264. Additionally, providers of VoD want a secure end-to-end communication with their customers to prevent piracy. This is in conflict with the idea to use JIT scaling in the network since full encryption would also prevent MANEs from accessing the video for adaptation. In this cumulative thesis we will thus deal with the following problems: We have to ensure that MC-EZBC based video codecs can be transported via existing technology; We have to develop encryption methods for secure end-to-end connection which allow JIT adaptation in the network; and we have to develop methods to ensure and evaluate these encryption methods.

[1]  Christian Timmerer,et al.  Bitstream syntax description: a tool for multimedia resource adaptation within MPEG-21 , 2003, Signal Process. Image Commun..

[2]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Alan C. Bovik,et al.  Image information and visual quality , 2006, IEEE Trans. Image Process..

[4]  Béatrice Pesquet-Popescu,et al.  Scalable and Media Aware Adaptive Video Streaming over Wireless Networks , 2008, EURASIP J. Adv. Signal Process..

[5]  Nikolay N. Ponomarenko,et al.  METRICS PERFORMANCE COMPARISON FOR COLOR IMAGE DATABASE , 2008 .

[6]  Douglas Sicker,et al.  Selective encryption for consumer applications , 2004, CCNC.

[7]  Yongdong Zhang,et al.  Visual security evaluation for video encryption , 2010, ACM Multimedia.

[8]  F. Wrba,et al.  Pit pattern classification using extended Local Binary Patterns , 2009, 2009 9th International Conference on Information Technology and Applications in Biomedicine.

[9]  Amir Said Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.

[10]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[11]  Miska M. Hannuksela,et al.  RTP Payload Format for H.264 Video , 2005, RFC.

[12]  Henning Schulzrinne,et al.  Real Time Streaming Protocol (RTSP) , 1998, RFC.

[13]  Itu-T and Iso Iec Jtc Advanced video coding for generic audiovisual services , 2010 .

[14]  Thomas Stütz,et al.  A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[16]  Andreas Uhl,et al.  Iris Recognition: From Segmentation to Template Security , 2012 .

[17]  Florent Autrusseau,et al.  Toward a simplified perceptual quality metric for watermarking applications , 2010, Electronic Imaging.

[18]  Andreas Uhl,et al.  Selective encryption of the MC-EZBC bitstream and residual information , 2010, 2010 18th European Signal Processing Conference.

[19]  Miska M. Hannuksela,et al.  System and Transport Interface of SVC , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  A. Uhl,et al.  Cost of in-network adaption of MC-EZBC for universal multimedia access , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[21]  Thomas Stütz,et al.  Efficient in-network adaptation of encrypted H.264/SVC content , 2009, Signal Process. Image Commun..

[22]  Mohammed Ghanbari,et al.  Scope of validity of PSNR in image/video quality assessment , 2008 .

[23]  Alberto Signoroni,et al.  State-of-the-Art and Trends in Scalable Video Compression With Wavelet-Based Approaches , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Andreas Uhl,et al.  Selective encryption of the MC EZBC bitstream for DRM scenarios , 2009, MM&Sec '09.

[25]  Thomas Stütz,et al.  Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking , 2010, Communications and Multimedia Security.

[26]  Barry E. Mullins,et al.  An analysis of XML compression efficiency , 2007, ExpCS '07.

[27]  Sos S. Agaian,et al.  Simultaneous Encryption/Compression of Images Using Alpha Rooting , 2008, Data Compression Conference (dcc 2008).

[28]  Jin Liu,et al.  An objective visual security assessment for cipher-images based on local entropy , 2011, Multimedia Tools and Applications.

[29]  Nikolay N. Ponomarenko,et al.  Color image database for evaluation of image quality metrics , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[30]  Mihir Bellare,et al.  Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..

[31]  M. Kendall A NEW MEASURE OF RANK CORRELATION , 1938 .

[32]  Touradj Ebrahimi,et al.  From the guest editors - Universal multimedia access , 2003 .

[33]  John W. Woods,et al.  Bidirectional MC-EZBC with lifting implementation , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[34]  Alan C. Bovik,et al.  A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms , 2006, IEEE Transactions on Image Processing.

[35]  C. Spearman The proof and measurement of association between two things. , 2015, International journal of epidemiology.

[36]  Min Wu,et al.  Security evaluation for communication-friendly encryption of multimedia , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[37]  Shengcai Liao,et al.  Learning Multi-scale Block Local Binary Patterns for Face Recognition , 2007, ICB.

[38]  Sheila S. Hemami,et al.  Natural image utility assessment using image contours , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[39]  Nikolay N. Ponomarenko,et al.  TID2008 – A database for evaluation of full-reference visual quality assessment metrics , 2004 .