Security for Visual Data in Wavelet Representation
Security for Visual Data in Wavelet Representation
Disciplines
Computer Sciences (80%); Mathematics (20%)
Keywords
-
MULTIMEDIA SECURITY,
WAVELETS,
VIDEO ENCRYPTION,
WATERMARKING,
ADAPTIVE WAVELET TECHNIQUES
We propose a project in the area of multimedia security. Currently, wavelet-based representations of visual data are highly relevant due to their widespread use in compression standards (JPEG2000 and parts of MPEG-4) and proprietory multimedia applications. We focus on two main research directions: image/video encryption and watermarking. In the area of encrypting visual data, most current approaches concentrate on selective encryption of MPEG streams whereas in the watermarking area many approaches suffer from a lack of integrated security features (as opposed to robustness). For these reasons, we propose to investigate the impact of exploiting wavelet-domain specific features and properties within multimedia security applications in order to overcome the aformentioned shortcomings.
Multimedia security is a recent field important in the area of digital rights protection, digital rights management, and many more. Main emphasis of this project has been devoted to wavelet-based techniques in this area, technologies covered are watermarking, low cost encryption of visual data, and robust visual hashing. Wavelet transforms offer a certain degree of freedom in the choice of the actual specific transform in a decomposition. The main approach followed in this project is to exploit this degree of freedom to implement security techniques based on the idea of "secret transform domains" or "key dependent transform domains". In particular, this idea has been used as follows: 1) Watermarking: the actual wavelet transform domain used for watermark embedding is kept secret and controlled by a key. We were able to demonstrate a significant security benefit for a certain class of watermarking algorithms using this technique, where unauthorized watermark detection and unauthorized watermark removal attacks could be repelled. 2) Encryption: the actual wavelet transform domain used within a compression codec (like JPEG2000) is kept secret and controlled by a key. We have designed and evaluated lightweight encryption schemes with extremely low encryption effort, suited for low power mobile devices like PDAs or cell phones - this is achieved by restricting encryption to the parameters defining the transform, the data itself can be left unencrypted. The security of this approach turns out to be highly dependent on the compression scheme used. 3) Robust Visual Hashing: the actual wavelet transform domain used within a hashing scheme is kept secret and controlled by a key. We have demonstrated higher security for certain authentication focussed hashing techniques, whereas the even higher robustness of CBIR hashing schemes seems to inhibit an increase in security. Apart from the topics described, many other issues have been covered, e.g. bitstream based JPEG2000 encryption, multiple watermarking, permutation within wavelet compression pipelines, encryption of scalable MPEG and progressive JPEG data, and many more.
- Universität Salzburg - 100%
Research Output
- 70 Citations
- 7 Publications
-
2004
Title Lightweight JPEG 2000 Confidentiality for Mobile Environments DOI 10.1109/icme.2004.1394520 Type Conference Proceeding Abstract Author Köckerbauer T Pages 1495-1498 -
2004
Title Robustness Against Unauthorized Watermark Removal Attacks via Key-Dependent Wavelet Packet Subband Structures**This work has been partially supported by the Austrian Science Fund, project no. 15170 DOI 10.1109/icme.2004.1394666 Type Conference Proceeding Abstract Author Dietl W Pages 2043-2046 -
2004
Title Encryption of Wavelet-Coded Imagery using Random Permutations **This work has been partially supported by the Austrian Science Fund (project FWF-15170). DOI 10.1109/icip.2004.1421852 Type Conference Proceeding Abstract Author Norcen R Pages 3431-3434 -
2008
Title Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication DOI 10.1155/2008/895174 Type Journal Article Author Laimer G Journal EURASIP Journal on Information Security Pages 895174 Link Publication -
2006
Title Secret Wavelet Packet Decompositions for JPEG 2000 Lightweight Encryption DOI 10.1109/icassp.2006.1661313 Type Conference Proceeding Abstract Author Engel D -
2006
Title On Format-Compliant Iterative Encryption of JPEG2000 DOI 10.1109/ism.2006.119 Type Conference Proceeding Abstract Author Stutz T Pages 985-990 Link Publication -
2005
Title Security Enhancement for Light Weight JPEG 2000 Transparent Encryption DOI 10.1109/icics.2005.1689224 Type Conference Proceeding Abstract Author Engel D Pages 1102-1106