TY - JOUR
T1 - Design of new unitary transforms for perceptual video encryption
AU - Yeung, Siu Kei Au
AU - Zhu, Shuyuan
AU - Zeng, Bing
N1 - Funding Information:
Manuscript received April 21, 2010; revised July 6, 2010, August 11, 2010 and October 14, 2010; accepted October 14, 2010. Date of publication March 10, 2011; date of current version September 2, 2011. This work was supported in part by an RGC research grant from the Hong Kong Special Administrative Region Government. This paper was recommended by Associate Editor M. Barni.
PY - 2011/9
Y1 - 2011/9
N2 - In our earlier work, we proposed for the first time that the perceptual video encryption be performed at the transformation stage by selecting one out of multiple unitary transforms according to the encryption key. In this letter, we aim to design some more efficient transforms to be used in this framework. Two criteria are followed for designing such transforms: 1) they are significantly different from discrete cosine transform (DCT) or discrete sine transform (DST), and 2) the resulted coding efficiency is exactly the same to what can be achieved by using DCT or just falls very slightly. As a result, we find that these transforms are actually derived by the sign-flipping on some node-variables in the flow-graph structure of DCTa special case of the plane-based rotations (by π or 180°). Extensive simulations based on the H.264 codec are performed to demonstrate their effectiveness through both objective and subjective assessments. Finally, we present the security analysis to show the resistance of our algorithms to different types of attacks.
AB - In our earlier work, we proposed for the first time that the perceptual video encryption be performed at the transformation stage by selecting one out of multiple unitary transforms according to the encryption key. In this letter, we aim to design some more efficient transforms to be used in this framework. Two criteria are followed for designing such transforms: 1) they are significantly different from discrete cosine transform (DCT) or discrete sine transform (DST), and 2) the resulted coding efficiency is exactly the same to what can be achieved by using DCT or just falls very slightly. As a result, we find that these transforms are actually derived by the sign-flipping on some node-variables in the flow-graph structure of DCTa special case of the plane-based rotations (by π or 180°). Extensive simulations based on the H.264 codec are performed to demonstrate their effectiveness through both objective and subjective assessments. Finally, we present the security analysis to show the resistance of our algorithms to different types of attacks.
KW - H.264/AVC
KW - perceptual video encryption
KW - unitary transforms
KW - video encryption
UR - http://www.scopus.com/inward/record.url?scp=80052523835&partnerID=8YFLogxK
U2 - 10.1109/TCSVT.2011.2125630
DO - 10.1109/TCSVT.2011.2125630
M3 - Article
AN - SCOPUS:80052523835
SN - 1051-8215
VL - 21
SP - 1341
EP - 1345
JO - IEEE Transactions on Circuits and Systems for Video Technology
JF - IEEE Transactions on Circuits and Systems for Video Technology
IS - 9
M1 - 5729321
ER -