Advertisement

Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization

  • Bubi G. Flepp-Stars
  • Herbert Stögner
  • Andreas Uhl
Conference paper
  • 307 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2828)

Abstract

We discuss confidential transmission of visual data in lossless format. Based on exemplary experimental data, we model the costs of the three main steps of such a scheme, i.e. compression, encryption, and transmission. Subsequently, we derive a cost optimal strategy for employment of confidential visual data transmission. Our approach may be applied to any environment provided that the costs of the single main steps in the target environment are known.

References

  1. 1.
    Alattar, A.M., Al-Regib, G.I., Al-Semari, S.A.: Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceedings of the 1999 IEEE International Conference on Image Processing, ICIP 1999, Kobe, Japan, vol. 4, pp. 256–260 (October 1999)Google Scholar
  2. 2.
    Bruckmann, A., Uhl, A.: Selective medical image compression techniques for telemedical and archiving applications. Computers in Biology and Medicine 30(3), 153–169 (2000)CrossRefGoogle Scholar
  3. 3.
    Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8), 2439–2451 (2000)Google Scholar
  4. 4.
    Cosman, P.C., Gray, R.M., Olshen, R.A.: Evaluating quality of compressed medical images: SNR, subjective rating, and diagnostic accuracy. Proceedings of the IEEE 82(6), 919–932 (1994)Google Scholar
  5. 5.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES — The Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRefzbMATHGoogle Scholar
  6. 6.
    Kunkelmann, T.: Applying encryption to video communication. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia 1998, Bristol, England, September 1998, pp. 41–47 (1998)Google Scholar
  7. 7.
    Norcen, R., Podesser, M., Pommer, A., Schmidt, H.-P., Uhl, A.: Confidential storage and transmission of medical image data. Computers in Biology and Medicine 33(3), 277–292 (2003)CrossRefGoogle Scholar
  8. 8.
    Podesser, M., Schmidt, H.-P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso- Trondheim, Norway (October 2002), IEEE Norway Section. file cr1037.pdfGoogle Scholar
  9. 9.
    Pommer, A., Uhl, A.: Application scenarios for selective encryption of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Multimedia and Security Workshop, ACM Multimedia, Juan-les-Pins, France, December 2002, pp. 71–74 (2002)Google Scholar
  10. 10.
    Pommer, A., Uhl, A.: Selective encryption of wavelet packet subband structures for secure transmission of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Multimedia and Security Workshop, ACM Multimedia, Juan-les-Pins, France, December 2002, pp. 67–70 (2002)Google Scholar
  11. 11.
    Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. International Journal on Computers and Graphics 22(3), 437–444 (1998) (special Issue on Data Security in Image ommunication and Networks)CrossRefGoogle Scholar
  12. 12.
    Schneier, B.: Applied cryptography: protocols, algorithms and source code in C. 2nd edn. Wiley Publishers, Chichester (1996)zbMATHGoogle Scholar
  13. 13.
    Shi, C., Bhargava, B.: A fast MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Multimedia Conference, Bristol, UK, September 1998, pp. 81–88 (1998)Google Scholar
  14. 14.
    Skrepth, C.J., Uhl, A.: Selective encryption of visual data: Classification of application scenarios and comparison of techniques for lossless environments. In: Jerman-Blazic, B., Klobucar, T. (eds.) Advanced Communications and Multimedia Security, IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, pp. 213–226. Kluver Academic Publishing, Boston (2002)Google Scholar
  15. 15.
    Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the ACM Multimedia 1996, Boston, USA, November 1996, pp. 219–229 (1996)Google Scholar
  16. 16.
    Welschenbach, M.: Kryptographie in C und C++. Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools. Springer, Heidelberg (1998)zbMATHGoogle Scholar
  17. 17.
    Wong, S., Zaremba, L., Gooden, D., Huang, H.K.: Radiologic image compression – a review. Proceedings of the IEEE 83(2), 194–219 (1995)Google Scholar
  18. 18.
    Zeng, W., Lei, S.: Efficient frequency domain video scrambling for content access control. In: Proceedings of the 7th ACM International Multimedia Conference 1999, Orlando, FL, USA, November 1999, pp. 285–293 (1999)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Bubi G. Flepp-Stars
    • 1
  • Herbert Stögner
    • 1
  • Andreas Uhl
    • 1
    • 2
  1. 1.Carinthia Tech InstituteSchool of Telematics & Network EngineeringKlagenfurtAustria
  2. 2.Department of Scientific ComputingSalzburg UniversitySalzburgAustria

Personalised recommendations