Adaptive Streaming of Wavelet-based Secure Scalable Video
Adaptive Streaming of Wavelet-based Secure Scalable Video
Disciplines
Computer Sciences (100%)
Keywords
-
Video streaming,
Perceptual Hashing,
Video encryption,
Scalable Video,
Watermarking,
Multimedia Security
The MPEG-21 Call for Contributions for a scalable video coding system (SVC) has been answered by a significant amount of wavelet-based proposals involving motion threading and temporal lifting, which represent the state of the art technology in wavelet-based scalable video coding. Multimedia security is a heavily researched topic at present, especially due to the financial interests of media content owners. Encryption and watermarking technologies for wavelet-based visual data formats in the context of digital rights management have been mainly focussed on JPEG 2000 (JPSEC) and still image coding schemes in general (due to the former lack of wavelet-based video coding standards). The first aim of this project is to develop scalable encryption and watermarking schemes specifically tailored to the corresponding wavelet-based video coding systems. In particular, partial or selective encryption schemes providing bitstream compliance for stream adaptation without decoding on the one hand and reducing the computational load for encryption on the other hand will be developed. As an example we mention the possible combination of partially encrypting texture data (i.e. frame data) and scalable motion data in an optimal way. Scalable watermarking techniques are required as well which can offer protection across a wide range of quality/resolution layers. Another goal of the project, seemingly conflicting to the first one, is to stream the secured scalable videos and adapt them to downstream client device capabilities, user preferences, or network conditions, if and where required. That is, universal scalability (temporal, spatial, and quality dimensions) will be considered. Adaptation can happen on a (trusted) server or on mid-network (possibly untrusted) nodes and will, in most cases, be performed as truncation of, or random access into, the scalable video bitstreams. The challenge in this project is therefore to perform these adaptation operations without compromising the streams` compliance and security properties (and thereby resolving the observed conflict with respect to satisfying both requirements).
The MPEG-21 Call for Contributions for a scalable video coding system (SVC) has been answered by a significant amount of wavelet-based proposals involving motion threading and temporal lifting, which represent the state of the art technology in wavelet-based scalable video coding. Multimedia security is a heavily researched topic at present, especially due to the financial interests of media content owners. Encryption and watermarking technologies for wavelet-based visual data formats in the context of digital rights management have been mainly focussed on JPEG 2000 (JPSEC) and still image coding schemes in general (due to the former lack of wavelet-based video coding standards). The first aim of this project is to develop scalable encryption and watermarking schemes specifically tailored to the corresponding wavelet-based video coding systems. In particular, partial or selective encryption schemes providing bitstream compliance for stream adaptation without decoding on the one hand and reducing the computational load for encryption on the other hand will be developed. As an example we mention the possible combination of partially encrypting texture data (i.e. frame data) and scalable motion data in an optimal way. Scalable watermarking techniques are required as well which can offer protection across a wide range of quality/resolution layers. Another goal of the project, seemingly conflicting to the first one, is to stream the secured scalable videos and adapt them to downstream client device capabilities, user preferences, or network conditions, if and where required. That is, universal scalability (temporal, spatial, and quality dimensions) will be considered. Adaptation can happen on a (trusted) server or on mid-network (possibly untrusted) nodes and will, in most cases, be performed as truncation of, or random access into, the scalable video bitstreams. The challenge in this project is therefore to perform these adaptation operations without compromising the streams` compliance and security properties (and thereby resolving the observed conflict with respect to satisfying both requirements).
- Universität Klagenfurt - 28%
- Universität Salzburg - 72%
- Hermann Hellwagner, Universität Klagenfurt , associated research partner
Research Output
- 250 Citations
- 19 Publications
-
2010
Title Lightweight Detection of Additive Watermarking in the DWT-Domain DOI 10.1109/tip.2010.2064327 Type Journal Article Author Kwitt R Journal IEEE Transactions on Image Processing Pages 474-484 Link Publication -
2010
Title WATERMARKING OF 2D VECTOR GRAPHICS WITH DISTORTION CONSTRAINT DOI 10.1109/icme.2010.5583049 Type Conference Proceeding Abstract Author Huber S Pages 480-485 -
2010
Title Robust watermarking of H.264-encoded video: Extension to SVC DOI 10.1109/iihmsp.2010.28 Type Conference Proceeding Abstract Author Meerwald P Pages 82-85 -
2010
Title Improving Internet Video Streaming Performance by Parallel TCP-based Request-Response Streams DOI 10.1109/ccnc.2010.5421815 Type Conference Proceeding Abstract Author Kuschnig R Pages 1-5 -
2009
Title Efficient in-network adaptation of encrypted H.264/SVC content DOI 10.1016/j.image.2009.07.002 Type Journal Article Author Hellwagner H Journal Signal Processing: Image Communication Pages 740-758 Link Publication -
2009
Title Attack on “Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization” DOI 10.1109/tmm.2009.2021793 Type Journal Article Author Meerwald P Journal IEEE Transactions on Multimedia Pages 1037-1041 -
2009
Title In-network Real-time Adaptation of Scalable Video Content on a WiFi Router DOI 10.1109/ccnc.2009.4785005 Type Conference Proceeding Abstract Author Kofler I Pages 1-2 -
2009
Title COLOR-IMAGE WATERMARKING USING MULTIVARIATE POWER-EXPONENTIAL DISTRIBUTION DOI 10.1109/icip.2009.5413715 Type Conference Proceeding Abstract Author Kwitt R Pages 4245-4248 -
2009
Title BLIND DT-CWT DOMAIN ADDITIVE SPREAD-SPECTRUM WATERMARK DETECTION DOI 10.1109/icdsp.2009.5201255 Type Conference Proceeding Abstract Author Kwitt R Pages 1-8 -
2009
Title Improving IPTV Services by H.264/SVC Adaptation and Traffic Control DOI 10.1109/isbmsb.2009.5133771 Type Conference Proceeding Abstract Author Kofler I Pages 1-6 -
2008
Title MULTIPLE RE-WATERMARKING USING VARYING WAVELET PACKETS DOI 10.1109/icme.2008.4607409 Type Conference Proceeding Abstract Author Hämmerle-Uhl J Pages 213-216 Link Publication -
2008
Title BLIND MOTION-COMPENSATED VIDEO WATERMARKING DOI 10.1109/icme.2008.4607445 Type Conference Proceeding Abstract Author Meerwald P Pages 357-360 Link Publication -
2008
Title An H.264/SVC-based adaptation proxy on a WiFi router DOI 10.1145/1496046.1496061 Type Conference Proceeding Abstract Author Kofler I Pages 63-68 -
2012
Title Secure transport and adaptation of MC-EZBC video utilizing H.264-based transport protocols DOI 10.1016/j.image.2011.11.002 Type Journal Article Author Hellwagner H Journal Signal Processing: Image Communication Pages 192-207 Link Publication -
2012
Title Assessing JPEG2000 encryption with key-dependent wavelet packets DOI 10.1186/1687-417x-2012-2 Type Journal Article Author Engel D Journal EURASIP Journal on Information Security Pages 2 Link Publication -
2011
Title MULTIPLE BLIND RE-WATERMARKING WITH QUANTISATION-BASED EMBEDDING DOI 10.1109/icip.2011.6116214 Type Conference Proceeding Abstract Author Hämmerle-Uhl J Pages 265-268 -
2011
Title Efficient and Rate-Distortion Optimal Wavelet Packet Basis Selection in JPEG2000 DOI 10.1109/tmm.2011.2177644 Type Journal Article Author Stütz T Journal IEEE Transactions on Multimedia Pages 264-277 Link Publication -
2007
Title AN ATTACK AGAINST IMAGE-BASED SELECTIVE BITPLANE ENCRYPTION DOI 10.1109/icip.2007.4379112 Type Conference Proceeding Abstract Author Engel D -
2007
Title Efficient Transparent Jpeg2000 Encryption With Format-Compliant Header Protection DOI 10.1109/icspc.2007.4728507 Type Conference Proceeding Abstract Author Engel D Pages 1067-1070