Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Image and Video Encryption - Andreas Uhl, Andreas Pommer

Image and Video Encryption (eBook)

From Digital Rights Management to Secured Personal Communication
eBook Download: PDF
2005 | 2005
XVII, 161 Seiten
Springer US (Verlag)
978-0-387-23403-8 (ISBN)
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).

The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.


Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.

Contents 7
List of Figures 9
List of Tables 13
Preface 15
Acknowledgments 17
Chapter 1 Introduction 18
Chapter 2 Visual data formats 28
1. Image and Video Data 28
2. DCT-based Systems 29
2.1 JPEG 29
2.2 MPEG Video Coding (MPEG-1,2,4) 29
2.3 ITU H.26X Video Conferencing 31
3. Wavelet-based Systems 31
3.1 SPIHT 33
3.2 JPEG 2000 34
4. Further Techniques 35
4.1 Quadtrees 35
4.2 Fractal Coding 36
4.3 Vector Quantisation 36
4.4 Lossless Formats: JBIG, GIF, PNG 36
Chapter 3 Cryptography Primer 38
1. Introduction, Terminology 38
2. Secret key vs. Public key Cryptography 39
3. Block Ciphers 40
3.1 sidestep: XOR 41
3.2 Operation Modes for Block Ciphers 41
3.3 DES and triple-DES 42
3.4 AES 43
3.5 Other Blockciphers 44
4. Stream Ciphers 44
4.1 One Time Pad — OTP 45
5. Hybrid Algorithms, some Applications 45
5.1 PGP 45
5.2 SSL and TLS 45
6. Cryptanalysis Overview 46
7. Further Information 47
Chapter 4 Application scenarios for the encryption of visual data 48
1. Security provided by Infrastructure or Application 48
2. Full Encryption vs. Selective Encryption 49
2.1 Off-line Scenario: 50
2.2 On-line Scenario: 51
2.3 Selective Encryption of a JPEG-2000 Bitstream 51
3. Interplay between Compression and Encryption 54
3.1 Basic Building Blocks: Compression, Encryption, and Transmission 55
3.2 Encryption and Transmission 57
3.3 Cost Optimal Configuration of Confidential Visual Data Transmission 57
Chapter 5 Image and video encryption 62
1. DCT-based Techniques 64
1.1 Image Encryption 64
1.2 Video Encryption 75
1.3 Our Implementations of selective MPEG-encryption 79
1.4 Encryption of Scalable or Embedded Bitstreams 91
2. Wavelet-based Techniques 99
2.1 Compression Oriented Schemes 100
2.2 Bitstream Oriented Schemes 124
3. Further Techniques 132
3.1 Raw Image Data 132
3.2 Quadtrees 142
3.3 Fractal-based system 143
3.4 Vector quantisation based system 143
3.5 Base-switching based system 144
4. Transparent Encryption 144
5. Commercial Applications and Standards 146
5.1 JPSEC — secure JPEG 2000 146
5.2 IPMP — Intellectual Property Management and Protection 146
5.3 MPEG, DVB & CSA
5.4 DVD 149
5.5 Other commercial products 150
Chapter 6 Conclusions 152
Appendix 155
A Copyrighted sections 155
B Test Images and Videos 156
1. Cover Page 156
2. Test Images 156
3. Sequence 1 — Bowing 158
4. Sequence 2 — Surf Side 158
5. Sequence 3 — Coast Guard 158
6. Sequence 4 — Akiyo 159
7. Sequence 5 — Calendar 159
C Authors’ Biographies 160
References 162
Index 176

Chapter 4 APPLICATION SCENARIOS FOR THE ENCRYPTION OF VISUAL DATA (p.31-32)

1. Security provided by Infrastructure or Application Images and videos (often denoted as visual data) are data types which require enormous storage capacity or transmission bandwidth due to the large amount of data involved. In order to provide reasonable execution performance for encrypting such large amounts of data, only symmetric encryption (as opposed to public key cryptography) can be used. As done in most current applications with demand for confidentiality, public key techniques are used for key exchange or signature generation only (such schemes are usually denoted as "hybrid").

There are two ways to provide confidentiality to a storage or transmission application. First, confidentiality is based on mechanisms provided by the underlying computational infrastructure. The advantage is complete transparency, i.e. the user or a specific application does not have to take care about confidentiality. The obvious disadvantage is that confidentiality is provided for all applications, no matter if required or not, and that it is not possible to exploit specific properties of certain applications. To give a concrete example, consider the distributed medical database infrastructure mentioned in the introduction. If the connections among the components are based on TCP/IP internet-connections (which are not confidential by itself of course), confidentiality can be provided by creating a Virtual Private Network (VPN) using IPSec (which extends the IP protocol by adding confidentiality and integrity features).

In this case, the entire visual data is encrypted for each transmission which puts a severe load on the encryption system. The second possibility is to provide confidentiality is on the application layer. Here, only applications and services are secured which have a demand for confidentiality. The disadvantage is that each application needs to take care for confidentiality by its own, the advantage is that specific properties of certain applications may be exploited to create more efficient encryption schemes or that encryption is omitted if not required. Selective encryption of visual data takes advantage of the redundancy in visual data which takes place at the application level and is therefore classified into the second category.


2. Full Encryption vs. Selective Encryption

Over the last years a number of different encryption schemes for visual data types have been proposed, since methods to provide confidentiality need to be specifically designed to protect multimedia content and fulfil the security requirements for a particular multimedia application.

The so called naive method - the most secure one - is to take the multimedia bitstream and encrypt this stream with the aid of a cryptographically strong cipher like AES. Here, the encryption is performed after the compression stage and due to the complexity of the involved encryption algorithm, such a scheme inherently adds significant latency which often conflicts with real-time constraints. Since runtime performance is often very critical in video encoding and decoding, more efficient methods have been proposed. Such systems - often denoted as "selective" or "soft" encryption systems - usually trade off runtime performance for security, and are therefore - in terms of security - somewhat weaker than the naive method.

Whereas selective encryption (SE) approaches exploit application specific data structures to create more efficient encryption systems (e.g. encryption of I-encoded blocks in MPEG, packet data of selected layers in JPEG 2000) using secure but slow "classical" ciphers, soft encryption systems employ weaker encryption systems (like permutations) to accelerate the processing speed.

Erscheint lt. Verlag 28.12.2005
Reihe/Serie Advances in Information Security
Advances in Information Security
Zusatzinfo XVII, 161 p. 65 illus.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Grafik / Design
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Schlagworte Communication • cryptography • Encryption • Video
ISBN-10 0-387-23403-9 / 0387234039
ISBN-13 978-0-387-23403-8 / 9780387234038
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 11,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Kryptographie und Geschichte

von Wolfgang Killmann; Winfried Stephan

eBook Download (2024)
Springer Berlin Heidelberg (Verlag)
CHF 38,95