透過您的圖書館登入
IP:3.149.254.110
  • 學位論文

針對MPEG壓縮視訊資料流之有效的加密方法

An Efficient Encryption Scheme for MPEG Video

指導教授 : 陳文進

摘要


MPEG (ISO Moving Picture Expert Group)是一種影像壓縮標準,目前廣泛地應用在各多媒體應用程式中,如 : VCD, DVD and VOD (Video-on-Demand)。 在網際網路傳輸MPEG影像時,由於要維護機密性及著作權,影像的安全性就變得非常重要。 在本篇論文中,我們提出一種對MPEG影像加密的方法,此方法使用了一個有別於標準的Huffman table來壓縮影像串流,然後對串流中的每個位元組進行旋轉,最後再對串流的位元進行XOR。 我們的方法對影像壓縮過程只增加了微量的計算,因此實作時速度十分快,能符合即時傳輸的要求。 經過我們的分析,它也能抵抗密碼學上的明文及密文的攻撃。 另外,我們的方法也能應用在所有的MPEG壓縮標準中。

關鍵字

影像加密 加密

並列摘要


MPEG (ISO Moving Picture Expert Group) is a compression standard for video processing and is widely used in multimedia applications, for example, VCD, DVD and VOD (Video-on-Demand). When the MPEG streams are transmitted over the public Internet, security becomes very important because of Confidentiality and Copyright protection. In this thesis, we propose an encryption scheme, which uses a permutated Huffman table to encode the input symbols, then rotates and XORs the encoded bit stream. This scheme adds very little computational overhead to the MPEG video compression process, and therefore the implementation is fast enough to meet the real-time requirement of MPEG video applications. In our analysis, it is also robust to both plaintext and ciphertext attacks. In addition, our scheme can be applied to all MPEG compression standards.

並列關鍵字

encryption mpeg

參考文獻


[1] L. Tang, “Methods for Encrypting and Decrypting MPEG Video Data Efficiently”, Proceedings of the 4th ACM International Conference on Multimedia, pp. 219-229, November 1996.
[5] C.-P. Wu and C. C. Jay Kuo, “Efficient Multimedia Encryption via Entropy Codec Design”, Proceedings of SPIE International Symposium on Electronic imaging 2001, (San Jose, CA, USA), Vol. 4314, Jan. 2001.
[8] Reza Hashemian, “Memory Efficient and High-Speed Search Huffman Coding”, IEEE Transactions on Communications, Vol. 43 No.10, October 1995.
BIBLIOGRAPHY
[2] L. Qiao and K. Nahrstedt, “Comparison of mpeg encryption algorithms”, International Journal on Computers and Graphics, Special Issue on Data Security in Image Communication and Network, vol. 22, January 1998.

延伸閱讀