Encryption of Video Streaming with Optimized Energy in WSN
Abstract
Selective encryption for video streaming was
proposed for efficient multimedia content protection. In this paper,we propose a scheme to optimize the energy, distortion, andencryption performance of video streaming in WSNs. However,previous works were focused on providing security for a single imageonly, without considering the temporal correlation and dependencyamong multiple pictures in a video sequence. The motion estimation/compensation and the residue coding from the inter-frame
video compression have a great potential to further improve the efficiency of encryption and network resource allocation in WSNs.
This paper proposes a new WSN-based secure multimedia
communication framework to enhance video transmission quality,
reduces energy consumption, and guarantee security. Due to the
limitation of computing and energy resource, selective encryption
and resource allocation naturally fits well to WSN for two reasons.
First, selective encryption significantly reduces computational load by only controlling a tiny portion of the position information inmultimedia stream structure. The magnitude information is useless in decryption without correct position information in the bit stream.
Second, WSN has extremely limited energy resource which requireshigh communication energy efficiency by UEP-based WSN resource
allocation.
Simulation experiments demonstrate that the proposed joint
selective encryption and resource allocation scheme can improve the video transmission quality significantly with guaranteed content protection and energy efficiency.
Keywords
Full Text:
PDFReferences
The ITU-T H.264 Standard and the ISO/IEC MPEG-4 Part 10
Standard(ISO/IEC 14496-10), May 2003.
G.-J. Sullivan and T. Wiegand, “Video compression—From conceptsto
the H.264/AVC standard,” Proc. IEEE, vol. 93, no. 1, pp. 18–31, Jan.
T.Wiegand, G.-J. Sullivan, G. Bjontegaard, and A. Luthra, “Overviewof
the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst.
Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003.
T. Lookabaugh and D.-C. Sicker, “Selective encryption for
consumerapplications,” IEEE Commun. Mag., vol. 42, no. 5, pp. 124–
, May 2004.
M. Yang, N. Bourbakis, and S. Li, “Data-image-video encryption,”
IEEE Potentials, vol. 23, no. 2, pp. 28–34, Aug. 2004.
S. Lian, Z. Liu, Z. Ren, and H. Wang, “Secure advanced video
codingbased on selective encryption algorithms,” IEEE Trans. Consum.
Electron., vol. 52, no. 2, pp. 621–629, May 2006.
M. Kankanhalli and T. Guan, “Compressed domain
scrambler/descramblerfor digital video,”
W. Zeng and S. Lei, “Efficient frequency domain selective scramblingof
digital video,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118–129, Mar.
H. Cheng and X. Li, “Partial encryption of compressed images
andvideos,” IEEE Trans. Signal Process., vol. 48, no. 8, pp. 2439–2451,
Aug. 2000.
M. Podesser, H.-P. Schmidt, and A. Uhl, “Selective bitplane encryption
for secure transmission of image data in mobile environments,” in
Proc.5th Nordic Signal Processing Symp., Oct. 2002.
L. Tang, “Methods for encrypting and decrypting MPEG video data
efficiently,” in Proc. Int. Conf. ACM Multimedia, Nov. 1996, pp.219–
M. Grangetto, E. Magli, and G. Olmo, “Multimedia selective encryption
by means of randomized arithmetic coding,” IEEE Trans.
Multimedia,vol. 8, no. 5, pp. 905–917, Oct. 2006.
C. Wu and C. Kuo, “Design of integrated multimedia compressionand
encryption systems,” IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828–
, Oct. 2005.
O. Au, J. Zhou, Y. Chen, and Z. Liang, “Security analysis of
multimediaencryption schemes based on multiple Huffman table,”
IEEESignal rocess. Lett., vol. 14, no. 3, pp. 201–204, Mar. 2007.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.