On the Performance of Secret Entropy Coding: A Perspective Beyond Security

In this paper, we study the overall performance of two main forms of secret entropy coding – secret Huffman coding and secret arithmetic coding, as solutions to multimedia encryption. We consider a set of criteria, which include not only security but also other aspects of the performance. We draw the conclusion that neither can fulfill all the criteria, but secret arithmetic coding can offer a better solution. We also point out the possibility of amending existing multimedia coding standards to facilitate multimedia encryption.

[1]  Itu-T and Iso Iec Jtc Advanced video coding for generic audiovisual services , 2010 .

[2]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[3]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[4]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[5]  Andreas Uhl,et al.  Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.

[6]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[7]  Iso/iec 14496-2 Information Technology — Coding of Audio-visual Objects — Part 2: Visual , 2022 .

[8]  Xiaolin Wu,et al.  Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[9]  Mohan S. Kankanhalli,et al.  Compressed-domain scrambler/descrambler for digital video , 2002, IEEE Trans. Consumer Electron..

[10]  Thomas Stütz,et al.  Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters , 2007, EURASIP J. Inf. Secur..

[11]  Bharat K. Bhargava,et al.  On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Borko Furht,et al.  Multimedia encryption and watermarking , 2005, Multimedia systems and applications.

[13]  Philip Ogunbona,et al.  Recovering DC Coefficients in Block-Based DCT , 2006, IEEE Transactions on Image Processing.

[14]  Bharat K. Bhargava,et al.  MPEG Video Encryption Algorithms , 2004, Multimedia Tools and Applications.

[15]  C.-C. Jay Kuo,et al.  Recovering missing coefficients in DCT-transformed images , 2011, 2011 18th IEEE International Conference on Image Processing.

[16]  John G. Cleary,et al.  The subset sum problem and arithmetic coding , 1995 .

[17]  C.-C. Jay Kuo,et al.  An improved DC recovery method from AC coefficients of DCT-transformed images , 2010, 2010 IEEE International Conference on Image Processing.

[18]  Mohan S. Kankanhalli,et al.  On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables , 2005, PSIVT.

[19]  Ian H. Witten,et al.  On the privacy afforded by adaptive text compression , 1988, Comput. Secur..

[20]  Boyce Nemec,et al.  Society of Motion Picture and Television Engineers , 1954 .

[21]  Kiyoshi Tanaka,et al.  Data encryption scheme with extended arithmetic coding , 2001, SPIE Optics + Photonics.

[22]  Reihaneh Safavi-Naini,et al.  Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme , 1999, Communications and Multimedia Security.

[23]  Ed Dawson,et al.  Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes , 1997, ACISP.

[24]  Hyungjin Kim,et al.  Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.

[25]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[26]  Ian F. Akyildiz,et al.  Wireless Multimedia Sensor Networks: Applications and Testbeds , 2008, Proceedings of the IEEE.

[27]  Luis Rueda,et al.  Advances in Image and Video Technology, Second Pacific Rim Symposium, PSIVT 2007, Santiago, Chile, December 17-19, 2007, Proceedings , 2007, PSIVT.

[28]  A. Barbir A methodology for performing secure data compression , 1997, Proceedings The Twenty-Ninth Southeastern Symposium on System Theory.

[29]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[30]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[31]  C.-C. Jay Kuo,et al.  Efficient multimedia data encryption based on flexible QM coder , 2004, IS&T/SPIE Electronic Imaging.

[32]  Colin Boyd,et al.  Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding , 1997, IMACC.

[33]  Colin Boyd,et al.  Cryptography and Coding , 1995, Lecture Notes in Computer Science.

[34]  Ranjan Bose,et al.  A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[35]  Indrani Vedula,et al.  Security analysis of selectively encrypted MPEG-2 streams , 2003, SPIE ITCom.

[36]  Wenjun Zeng,et al.  Multimedia Security Technologies for Digital Rights Management , 2006 .

[37]  Colin Boyd,et al.  A Unified Code , 1999, IMACC.

[38]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[39]  Information Security and Privacy , 1996, Lecture Notes in Computer Science.

[40]  James M. Hogan,et al.  A chosen plaintext attack on an adaptive arithmetic coding compression algorithm , 1993, Comput. Secur..

[41]  James M. Hogan,et al.  Data security in a fixed-model arithmetic coding compression algorithm , 1992, Comput. Secur..