• Aucun résultat trouvé

FAST PROTECTION OF H.264/AVC BY SELECTIVE ENCRYPTION OF CABAC

N/A
N/A
Protected

Academic year: 2022

Partager "FAST PROTECTION OF H.264/AVC BY SELECTIVE ENCRYPTION OF CABAC"

Copied!
17
0
0

Texte intégral

(1)

FAST PROTECTION OF H.264/AVC BY SELECTIVE ENCRYPTION OF CABAC

Zafar SHAHID, Marc CHAUMONT, William PUECH (zafar.shahid@lirmm.fr)

LIRMM, UMR CNRS 5506, Université Montpellier II

(2)

Talk Outline

 Problem Statement

 CABAC

Block diagram

Binarization

 Proposed Approach

Proposed scheme in H.264/AVC

Proposed scheme for non-zero coefficients

Encryption process

 Results

Visual comparison of encrypted frames at different QPs

Foreman sequence encryption at different QPs

Nine benchmark video sequences results at same QP.

 Conclusions

(3)

Problem Statement

To perform selective encryption (SE) of CABAC for real-time protection of H.264/AVC bitstream.

Constraints:

 Same bitrate

 No increase in processing power

 Browseable bitstream

(4)

Our Approach

1. SE is performed in Context-based Adaptive Binary Arithmetic Coding (CABAC) module.

2. Same bitrate is achieved through scrambling of only equal length binarized code words.

3. Encrypted bitstream is completely compliant to H.264/AVC format. ( ONLY MB data is

encrypted.)

(5)

Talk Outline

 Problem Statement

 CABAC

Block diagram

Binarization

 Proposed Approach

Proposed scheme in H.264/AVC

Proposed scheme for non-zero coefficients

Encryption process

 Results

Visual comparison of encrypted frames at different QPs

Foreman sequence encryption at different QPs

Nine benchmark video sequences results at same QP.

 Conclusions

(6)

CABAC

Context modeling

Binarization Regular

BAC Syntax

Element

H.264/AVC bitstream Context update

Bypass BAC

Binary Arithmetic Coder Binary syntax element

binary Non- syntax element

Context modeling

Binarization Regular

BAC Syntax

Element

H.264/AVC bitstream Context update

Bypass BAC

Binary Arithmetic Coder Binary syntax element

binary Non- syntax element

Context modeling

Binarization Regular

BAC Syntax

Element

H.264/AVC bitstream Context update

Bypass BAC

Binary Arithmetic Coder Binary syntax element

binaryNon- syntax element

(7)

CABAC

CABAC codes the input data in the following steps:

1. Binarization

It is performed in one of the following ways:

1. The unary code

2. The truncated unary code

3. The kth order Exp-Golomb code 4. The fixed length code

2. Context modeling

3. Binary Arithmetic Coding

(8)

Talk Outline

 Problem Statement

 CABAC

Block diagram

Binarization

 Proposed Approach

Proposed scheme in H.264/AVC

Proposed scheme for non-zero coefficients

Encryption process

 Results

Visual comparison of encrypted frames at different QPs

Foreman sequence encryption at different QPs

Nine benchmark video sequences results at same QP.

 Conclusions

(9)

Proposed Algorithms

PRNG

Inverse Quantization Quantization Input

Video

Decoded Video Secret

Key

Inverse Transform

Integer

Transform CABAC Encoding

(with cipher)

Encrypted Bitstream CABAC Decoding

(with decipher)

(10)

Proposed Algorithms

PRNG NZ

1...1

Secret Key

Suffix

EG0 binarization 0 X

Scrambling

1...1 0 Xe

n bits n bits

n bits

s Scrambling

Prefix UT binarization

n bits

sign bit

se

AB C

Bitstream

|NZ|

(11)

Encryption Process

 NZs are scrambled with only those NZs whose EG0 (0th order Exp-Golomb code) codes have the same length.

For encryption process:

 Let

x

be a suffix part of absolute level of NZ. It is encrypted with the encrypted coefficient

y

:

y = (x + γ ) mod log2 (x + 1 ),

 Where

γ= rand() mod log2 (x + 1 ).

For decryption process:

 For the decryption of NZs in H.264/AVC decoder:

x = (y + log2 (n + 1) - γ )) mod log2 (y + 1 ).

(12)

Talk Outline

 Problem Statement

 CABAC

Block diagram

Binarization

 Proposed Approach

Proposed scheme in H.264/AVC

Proposed scheme for non-zero coefficients

Encryption process

 Results

Visual comparison of encrypted frames at different QPs

Foreman sequence encryption at different QPs

Nine benchmark video sequences results at same QP.

 Conclusions

(13)

Results: Foreman 1

st

Frame at diff. QPs

QP = 18 QP = 24

QP = 30 QP = 36

(14)

Results – Foreman seq. at diff. QPs

QP Without With Without With Without With

SE SE SE SE SE SE

18 44.43 8.42 45.62 23.87 47.42 22.14

24 39.40 8.38 41.70 24.87 43.86 22.70

30 34.93 8.92 39.38 24.60 40.99 22.71

36 30.80 8.89 37.33 24.65 38.10 22.90

PSNR (Y) (dB) PSNR (U) (dB) PSNR (V) (dB)

(15)

Results – Nine seq. at QP = 18

Seq. Without With Without With Without With

SE SE SE SE SE SE

bus 44.26 7.73 45.22 25.19 46.50 26.86

city 44.28 11.52 45.83 30.50 46.76 31.86

crew 44.81 9.39 45.81 23.80 45.66 19.90

football 44.59 11.46 45.70 15.79 45.98 23.10

foreman 44.43 8.42 45.62 23.87 47.42 22.14

harbour 44.10 9.48 45.60 23.82 46.63 31.20

ice 46.56 10.37 48.70 25.42 49.19 19.73

mobile 44.45 8.42 44.14 13.47 44.04 11.11

soccer 44.26 10.84 46.59 19.69 47.82 24.83

PSNR (Y) (dB) PSNR (U) (dB) PSNR (V) (dB)

(16)

Talk Outline

 Problem Statement

 CABAC

Block diagram

Binarization

 Proposed Approach

Proposed scheme in H.264/AVC

Proposed scheme for non-zero coefficients

Encryption process

Results

Visual comparison of encrypted frames at different QPs

Foreman sequence encryption at different QPs

Nine benchmark video sequences results at same QP.

 Conclusions

(17)

Conclusions

Encouraging results in the following contexts:

 Equally efficient algorithm over whole range of QP values.

 Real-time constraints successfully handled for:

 Heterogeneous networks (exactly the same birate),

 Handheld devices ( minimal set of computational requirements),

 Encrypted bitstream browsing (H.264/AVC compliant bitstream).

 The work can be extended for:

 Protection of ROI,

 Medical image transmission,

 Protection of P and B frames in H.264/AVC.

Références

Documents relatifs

In addition to the ALORA algorithm we provide a heuristic algorithm named AGC, envisaged for matrices with exponentially de- creasing singular values, which can be used to

Dans cette section nous présentons l'étude théorique d'un ltre à structure périodique rendu ac- cordable par le contrôle optique de trous dans le plan de masse.. La topologie du

A new adaptive scanning methodology for intra frame scalable coding framework based on subband/wavelet coding approach is presented for H.264/AVC scalable video coding.. It

Tardos probabilistic fingerprinting code is embedded in H.264/AVC video signals using spread spectrum watermarking technique.. Different linear and non-linear collusion attacks

H.264/AVC using spread spectrum (SS) embedding while taking into account the reconstruction loop.. OUR APPROACH: The proposed solution consists of the

Thus, by scrambling the scan order of QTCs in the intra scalable coding framework of H.264/AVC, we were able to get encryption and compression for enhance- ment layers

Different SVC approaches have been used in literature: a) Pyramid coding used in JSVM, b) Wavelet subband coding used in JPEG2000, c) DWTSB for dyadic scalable intra frame of JSVM..

In our scheme, CABAC engine serves the purpose of encryption cipher without affecting the coding efficiency of H.264/AVC by keeping exactly the same bit rate, generating