Fast Encryption Algorithm For Streaming Video Over Wireless Networks
Fast Encryption Algorithm For Streaming Video Over Wireless Networks
ABSTRACT:
Wireless networks are poised to enable a variety of existing and emerging video streaming applications. However, video streaming over wireless suffers from piracy and malicious attack. Also, it is well-known that video decompression on the handheld devices is constrained by the power and other computation resource. Therefore, video encryption should be designed to be lightweight and efficient. In this paper, we designed a new lightweight, efficient, scalable, format-compliant video encryption algorithm, which is based on the DCT (Discrete Cosine Transformations) coefficients scrambling. The simulation shows that the proposed video encryption algorithm consumes low computation resource while achieves high scalability and confidentiality, which is in compliance with the design goal of video streaming over wireless applications.
Advances in multimedia and wireless technologies have led to the recent wide deployment of streaming video over wireless applications and services that suffer from piracy and malicious attack. The security becomes a critical issue in the design and development of such multimedia applications. Assuring a certain level of security is a strong requirement for a large deployment of multimedia applications. Failure to meet security requirement poses potential threats to the service providers and customers. Encryption for the video bit stream should be designed to be lightweight and format-compliant. Since video decompression on the handheld devices is constrained by the limited power and other computation resources, conventional ciphers such as data standard encryption (DES) or advanced encryption standard (AES) to wireless applications over handheld devices are intensive computation tasks. Therefore, it is not efficient to apply conventional ciphers for wireless multimedia applications. Selective encryption algorithms are proposed to be an economical and secure video encryption algorithm where only I-frames are encrypted. However, it has been reported as not good choices in the encryption of digital video since encrypting I-frames alone may not be sufficiently secure for digital video [1]. Compression-Logic based encryption is widely studied and several algorithms have been proposed [2,3,4,5,6,7,8,9,10,11]. However, these compression-based algorithms suffer either vulnerability or low-efficiency problem. In this paper, a new compression-based video encryption algorithm is proposed. The new algorithm overcomes the reported vulnerability and at the same time, relatively low computation complexity, low compression overhead, high scalability are maintained. Also, the new algorithm confines the encryption-incurred error propagation. Quick recovery from bit errors and fast resynchronization from packet losses are feasible..
II.
RELATED WORK
The output of video compression is a sequence of three types of frames: I-frame (Intra picture), Pframe (Forward Predicted) and B-frame (Bidirectional Predicted: Forward-Prediction and BackwardPrediction). I-frame is reference frame and is self-contained. A P-frame specifies the difference between the previous I-frame and itself; while a B-frame is an interpolation between the previous and subsequent frame of I or P type. To compress an I-frame, the process starts from dividing the frame into macro-blocks. Each macroblock is of size 1616 pixels. And each macro-block is composed of six blocks, four of them represent luminance and the other two represent chrominance. Each block of size 88 is through a discrete cosine transformation.
www.ijceronline.com
||May |2013||
Page 40
III.
Figure 2: After random Permutation The proposed algorithm is a Compression-Logic based video encryption algorithm. Instead of randomly permuting 88 coefficients of a single DCT block, the random permutation is applied to a number of permutation groups. Each permutation group contains the DCT coefficients of the same frequency (index of 88 DCT matrix) from every single block of a frame, regardless of I, P or B frame. Obviously, since each DCT block has 64 coefficient frequencies so that 64 permutation groups can be formed, the proposed algorithm runs random permutations on each of permutation groups to encrypt a single video frame. After random permutation, the encrypted video data is compressed by standard RLE. The resulting picture after the random permutation is shown in Figure 1(b). The idea of the random permutation is illustrated in Figure 2 by an
www.ijceronline.com ||May ||2013|| Page 41
IV.
The new encryption algorithm can be described by the following formula: Y=E(K,X) Where X is the DCT coefficients before the scrambling while Y is the coefficients after the scrambling; K is the scrambling order, which represents the encryption key. To protect the algorithm from brute-force attack, the key space can be used to measure the strength of the encryption algorithm. Tangs algorithm is based on permutation of 64 coefficients of a DCT block. In theory, the key space of Tangs algorithm is factorial of 64. However, by exploiting the DCT vulnerability, the attackers can recover significant amount of video info from only a few DCT coefficients without exhaustively working through the key space in Tangs algorithm. The key space of the proposed video encryption algorithm is proportional to the frame size. For a video frame of MN pixels, the number of luminance DCT blocks, K, can be computed as follows:
K=
Since the scrambling is performed on DCT coefficients of permutation group, the key size of the proposed algorithm is factorial of K. As an example, ITU QCIF (Quarter Common Intermediate Format 176144 pixels) video has 396 luminance blocks, which means the key space for QCIF video is factorial of 396, which is much larger than that of Tangs algorithm. More importantly, as we discussed in section 4.1, the proposed algorithm does not suffer from DCT vulnerability. Therefore, it is impractical to brute-force attack the video encrypted by the proposed algorithm.
www.ijceronline.com ||May ||2013|| Page 42
V.
This paper, proposed a computationally efficient, yet secure video encryption scheme. It uses RC5 for encryption of the DCT coefficients and ECC for small key sized generation .The proposed scheme is very fast, possesses good security and adds less overhead on the codec. It slightly decreases the compression rate of the video, which is negotiable for higher security. In fu-ture it would be to reduce the encrypted video size by modifying the default Huffman tables and hence come up with an ideal video encryption algorithm which takes less encryption time and causes no overhead on video size. It can also be extended to videos like MPEG-4, H.261, and H.264 etc
REFERENCES
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] I. Agi, L. Gong. An empirical study of secure MPEG video transmission, In Proceedings of the Internet Society Sumposium on Network and Distributed System Security, L. Tang, Methods for encrypting and decrypting MPEG video data efficiency, in Proc. Fourth ACM Int. Multimedia Conferenc e. (ACM Multimedia96), 1996, pp.201-206S.. W. Zeng, S. Lei, Efficient Frequency Domain Selective Scrambling of Digital Video, IEEE Transaction on Multimedia, Vol. 5 , No.1. March C. Wu, C, Kuo, Efficient multimedia encryption via scrambling by spatially shuffling codewords of compressed bitstreams, in Proc. SPIE Security and watermarking of Multimedia Contents III, vol. 4314, San Jose, CA, Jan. J, Wen, M. Severa, W. Zeng, M. Luttrell and W. Jin, A format compliant configurable encryption frame work for access control of multimedia, in IEEE Workshop on Multimedia Signal Processing, pp. 435-440, Oct. 2001. FLEXChip Signal Processor (MC68175/D) , Motorola, 1996. J, Wen, M. Severa, W. Zeng, M. Luttrell and W. Jin, A format compliant configurable encryption framework for access control of video, IEEE Transaction. CSVT, Special Issue on Wireless Video, 2002. 7. A. S. Tosun and W. Feng, A light -weight mechanism for securing multi-layer video streams, Proc. IEEE International Conference on Info rmation Technology: C. Yuan, B. B. Zhu, Y. Wang, S. Li and Y. Zhong, Efficient and fully scalable encryption for MPEG -4 FGS, in Proc. IEEE Int. Symp. Circuits and Systems, vol.2, Bangkok, Thailand, May 2003, pp 620-623. 9. B. Zhu, C. Yuan, Y. Wang, S . Li, Scalable protection for MPEG-4 fine granularity scalability, IEEE Transactions on Multimedia, vol.7, No.2, April 2005. 10. st L. Qiao and K. Nahrstedt, A new algorithm for MPEG video encryption, in Proc. 1 Int. Conf. Imaging Science, Systems & Tech, Las Vegas, Jun, 1997, pp 21-29. 11. C. Shi and B.Bhargava, A fast MPEG video encryption algorithms, Int. J. Comput. & Graph., vol.22, No.3, 1998 . Mr.Avinash P. Wadhe,Mrs Lekha Bhandari Speeding up Video Encryption using Elliptic Curve Crypt ography (ECC) International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-2, Issue-3)
[11]
www.ijceronline.com
||May ||2013||
Page 43