• Aucun résultat trouvé

FAST PROTECTION OF H.264/AVC BY SELECTIVE ENCRYPTION OF CABAC FOR I & P FRAMES

N/A
N/A
Protected

Academic year: 2022

Partager "FAST PROTECTION OF H.264/AVC BY SELECTIVE ENCRYPTION OF CABAC FOR I & P FRAMES"

Copied!
19
0
0

Texte intégral

(1)

FAST PROTECTION OF H.264/AVC BY SELECTIVE ENCRYPTION OF CABAC FOR I &

P FRAMES

Z. SHAHID, M. CHAUMONT, W. PUECH

LIRMM, UMR CNRS 5506, Universit´e de Montpellier II

EUSIPCO 2009

(2)

Outline Introduction Proposed Approach Results Conclusions & Prospects

Outline

Outline

Problem Statement CABAC

Proposed Approach Results

Experiments

Conclusions & Prospects

(3)

Problem Statement

To perform selective encryption (SE) of CABAC for real-time protection of H.264/AVC bitstream.

Same bitrate

No increase in processing power

Browseable bitstream

...

(4)

Outline Introduction Proposed Approach Results Conclusions & Prospects

Problem Statement Problem Statement

Our approach

SE is performed in Context-based Adaptive Binary Arithmetic Coding (CABAC) module.

Same bitrate is achieved through scrambling of only equal length binarized code words.

Encrypted bitstream is completely compliant to H.264/AVC format. ( ONLY MB data is encrypted.)

(5)

CABAC block diagram

(6)

Outline Introduction Proposed Approach Results Conclusions & Prospects

CABAC CABAC Encryption

CABAC

Binarization:

It is performed in one of the following ways:

The unary code( for x, x no. of 1’s) The truncated unary code (1 - 14) The kth order Exp-Golomb code

The fixed length code (for header information)

Context modeling

Binary Arithmetic Coding

(7)

CABAC

Binarization:

It is performed in one of the following ways:

The unary code( for x, x no. of 1’s)

The truncated unary code (1 - 14) The kth order Exp-Golomb code

The fixed length code (for header information)

Context modeling

Binary Arithmetic Coding

(8)

Outline Introduction Proposed Approach Results Conclusions & Prospects

CABAC CABAC Encryption

CABAC

Binarization:

It is performed in one of the following ways:

The unary code( for x, x no. of 1’s)

The truncated unary code (1 - 14)

The kth order Exp-Golomb code

The fixed length code (for header information)

Context modeling

Binary Arithmetic Coding

(9)

CABAC

Binarization:

It is performed in one of the following ways:

The unary code( for x, x no. of 1’s)

The truncated unary code (1 - 14)

The kth order Exp-Golomb code

The fixed length code (for header information)

Context modeling

Binary Arithmetic Coding

(10)

Outline Introduction Proposed Approach Results Conclusions & Prospects

CABAC CABAC Encryption

CABAC

Binarization:

It is performed in one of the following ways:

The unary code( for x, x no. of 1’s)

The truncated unary code (1 - 14)

The kth order Exp-Golomb code

The fixed length code (for header information)

Context modeling

Binary Arithmetic Coding

(11)

CABAC

Binarization:

It is performed in one of the following ways:

The unary code( for x, x no. of 1’s)

The truncated unary code (1 - 14)

The kth order Exp-Golomb code

The fixed length code (for header information)

Context modeling

Binary Arithmetic Coding

(12)

Outline Introduction Proposed Approach Results Conclusions & Prospects

CABAC CABAC Encryption

CABAC Encryption

Figure: Encryption process for NZs in CABAC of H.264/AVC.

(13)

Foreman sequence encryption at different QP values

(a) QP = 12 (b) QP = 18 (c) QP = 24

(d) QP = 30 (e) QP = 36 (f) QP = 42

(14)

Outline Introduction Proposed Approach Results Conclusions & Prospects

Analysis at different QP values intraframes

intraandinterframes.

Foreman sequence over whole range of QP values.

Comparison of PSNR without encryption and with SE forforeman sequence at different QP values.

PSNR (Y) (dB) PSNR (U) (dB) PSNR (V) (dB) QP Without With Without With Without With

SE SE SE SE SE SE

12 50.05 8.92 49.99 24.08 50.78 23.84 18 44.43 8.42 45.62 23.87 47.42 22.14 24 39.40 8.38 41.70 24.87 43.86 22.70 30 34.93 8.92 39.38 24.60 40.99 22.71 36 30.80 8.89 37.33 24.65 38.10 22.90 42 27.03 8.93 35.87 24.24 36.41 23.94

(15)

Analysis of nine benchmark video sequences.

Comparison of PSNR without encryption and with SE of benchmark video sequences at QP 18.

PSNR (Y) PSNR (U) PSNR (V)

Seq. (dB) (dB) (dB)

Orig. SE Orig. SE Orig. SE

bus 44.26 7.73 45.22 25.19 46.50 26.86 city 44.28 11.52 45.83 30.50 46.76 31.86 crew 44.81 9.39 45.81 23.80 45.66 19.90 football 44.59 11.46 45.70 15.79 45.98 23.10 foreman 44.43 8.42 45.62 23.87 47.42 22.14 harbour 44.10 9.48 45.60 23.82 46.63 31.20 ice 46.56 10.37 48.70 25.42 49.19 19.73 mobile 44.45 8.42 44.14 13.47 44.04 11.11 soccer 44.26 10.84 46.59 19.69 47.82 24.83

(16)

Outline Introduction Proposed Approach Results Conclusions & Prospects

Analysis at different QP values intraframes

intraandinterframes.

Foreman sequence over whole range of QP values.

Comparison of PSNR without encryption and with SE forforeman sequence at different QP values.

PSNR (Y) (dB) PSNR (U) (dB) PSNR (V) (dB) QP Without With Without With Without With

SE SE SE SE SE SE

12 49.54 8.41 49.89 23.34 50.63 22.16 18 43.91 9.23 45.50 26.06 47.55 21.11 24 38.90 8.61 42.04 24.62 44.29 21.83 30 34.59 9.19 39.84 24.02 41.56 25.18 36 30.76 8.78 37.96 25.12 38.86 23.50 42 26.61 8.31 36.34 25.30 36.92 27.06

(17)

Nine benchmark video sequences results at same QP vlaue.

Comparison of PSNR without encryption and with SE of benchmark video sequences at QP 18.

PSNR (Y) PSNR (U) PSNR (V)

Seq. (dB) (dB) (dB)

Orig. SE Orig. SE Orig. SE

bus 43.72 7.44 45.10 25.06 46.44 28.03 city 43.80 10.84 45.73 30.07 46.78 32.24 crew 44.45 8.83 45.81 23.00 45.71 20.34 football 44.15 11.52 45.71 12.65 46.05 23.50 foreman 43.91 9.23 45.50 26.06 47.55 21.11 harbour 43.70 9.71 45.44 26.05 46.57 32.52 ice 46.13 9.85 48.63 24.37 49.14 21.27 mobile 43.84 8.94 44.15 12.74 44.06 11.52 soccer 43.53 10.76 46.45 20.12 47.75 23.84

(18)

Outline Introduction Proposed Approach Results Conclusions & Prospects

Analysis at different QP values intraframes

intraandinterframes.

CABAC Encryption - Example

Foreman Foreman QP = 18

City QP = 18 Football QP = 18

(19)

Conclusions & Prospects

Encouraging results in the following contexts:

Equally efficient algorithm over whole range of QP values.

Real-time constraints successfully handled for:

Heterogeneous networks (exactly the same birate).

Handheld devices ( minimal set of computational requirements).

Encrypted bitstream browsing (H.264/AVC compliant bitstream).

Protection of ROI.

Medical image transmission.

Références

Documents relatifs

Dans cet article, nous avons proposé une analyse des outils de robustesse du stan- dard H.264 dans le cas où un flux vidéo conforme à ce standard subit des altérations typiques à

Ainsi, dans cette plage de réduction de débit supérieure à 10%, pour la séquence Soeeer encodée avec un QP=24, huit débits intermédiaires sont disponibles

Table 2 Comparison of the bitrate, the payload and the PSNR at the QP 18 for the data hiding embedding inside and outside the reconstruction loop for the intra sequence with the

Thus, by scrambling the scan order of QTCs in the intra scalable coding framework of H.264/AVC, we were able to get encryption and compression for enhance- ment layers

Different SVC approaches have been used in literature: a) Pyramid coding used in JSVM, b) Wavelet subband coding used in JPEG2000, c) DWTSB for dyadic scalable intra frame of JSVM..

For the non-zero QTCs, in intra frames we exploit the spatial masking and in inter frames we exploit motion and texture masking for watermark em- bedding.. There is not

I Embedding watermark inside reconstruction loop avoids mismatch between encoder and decoder and also takes into account the bitrate/quality tradeoff because of watermarking of

In our scheme, CABAC engine serves the purpose of encryption cipher without affecting the coding efficiency of H.264/AVC by keeping exactly the same bit rate, generating