Open Access Open Access  Restricted Access Subscription or Fee Access

Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach

P. Raveendra Babu, V. Praveen Kumar, M. Samuel John, J. Ranga Rao

Abstract


Efficient multimedia encryption algorithms play a key role in multimedia security protection. We introducing multiple Huffman Tables (MHT), which performs both compression and encryption by using multiple statistical models (i.e. Huffman coding tables) in the entropy encoder and multiple Huffman tables, are kept secret. A known-plaintext attack is presented to show that the MHTs used for encryption should be carefully selected to avoid the weak keys problem.

We then propose chosen-plaintext attacks on the basic MHT algorithm as well as the advanced scheme with random bit insertion. In addition, we suggest two empirical criteria for Huffman table selection, based on which we can simplify the stream cipher integrated scheme, while ensuring a high level of security.

 


Keywords


Cryptanalysis, Encryption, Entropy encoding, Multiple Huffman Tables (MHT), Selective Encryption

Full Text:

PDF

References


C.Wu and C.-C. J.Kuo, “Design of integrated multimedia compression and encryption systems,” IEEE Trans.Multimedia, vol. 7, no. 5, pp. 828–839, Oct. 2005.

C. Wu and C.-C. J. Kuo, “Efficient multimedia encryption via entropy codec design”, SPIE international symposium on electronic imaging, San Jose, Jan 2001

C. Wu and C.-C. J. Kuo, “Fast encryption methods for audiovisual data confidentiality”, SPIE Photonics East – Symposium on Voice, Video, and Data Communications, Boston, Nov 2000.

D. Xie and C.-C. J. Kuo, “Enhanced multiple Huffman table (MHT) encryption scheme using key hoping,” in Proc. ISCAS, May 2004, vol. 5, pp. 568–571.

D. Xie and C.-C. J. Kuo, “Multimedia data encryption via random rotation in partitioned bit stream,” in Proc. ISCAS, May 2005, vol. 5, pp. 5533–5536.

I. Cheong, Y. Huang, and Y. Yung et al., “An efficient encryption scheme for MPEG video,” in Proc. ICCE, Jan. 2005, pp. 61–62.

S. T. Klein, A. Bookstein, and S. Deerwester, “Storing test retrieval systems on CD-ROM: Compression and Encryption”, ACM Trans. Information Systems, vol. 7, no.3, pp. 230-245, 1989

X. Wang, Y. Yin, and H.Yu,”Finding Collisions in the full SHA-1”,IEEE Trans.Inforamation theory,vol.42,no.3,pp.972-976,1996.

W.Diffie and M.Hellman,”New directions in cryptography.”IEEE Trans.Inf.Theory,Vol.22.no.IT-6,pp.644-654,jun,1976.

Data Encryption Std., FIPS PUBS 46-3, 1999.

Advanced Encryption Std., FIPS PUBS 197, 2001.

A.J.Menezes, P.C.van Oorschot and S.A.Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996

Recommendation for Block Cipher Modes of Operation NIST Special Pub. 800-38A, 2001.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.