A multi-level approach with visual information for encrypted H.265/HEVC
videos
- URL: http://arxiv.org/abs/2011.02620v1
- Date: Thu, 5 Nov 2020 02:20:43 GMT
- Title: A multi-level approach with visual information for encrypted H.265/HEVC
videos
- Authors: Wenying Wen, Rongxin Tu, Yushu Zhang, Yuming Fang, Yong Yang
- Abstract summary: This paper proposes a multi-level encryption scheme that is composed of lightweight encryption, medium encryption and heavyweight encryption.
It is found that both encrypting the luma intraprediction model (IPM) and scrambling the syntax element of the DCT coefficient sign can achieve the performance of a distorted video.
- Score: 33.908744297617496
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: High-efficiency video coding (HEVC) encryption has been proposed to encrypt
syntax elements for the purpose of video encryption. To achieve high video
security, to the best of our knowledge, almost all of the existing HEVC
encryption algorithms mainly encrypt the whole video, such that the user
without permissions cannot obtain any viewable information. However, these
encryption algorithms cannot meet the needs of customers who need part of the
information but not the full information in the video. In many cases, such as
professional paid videos or video meetings, users would like to observe some
visible information in the encrypted video of the original video to satisfy
their requirements in daily life. Aiming at this demand, this paper proposes a
multi-level encryption scheme that is composed of lightweight encryption,
medium encryption and heavyweight encryption, where each encryption level can
obtain a different amount of visual information. It is found that both
encrypting the luma intraprediction model (IPM) and scrambling the syntax
element of the DCT coefficient sign can achieve the performance of a distorted
video in which there is still residual visual information, while encrypting
both of them can implement the intensity of encryption and one cannot gain any
visual information. The experimental results meet our expectations
appropriately, indicating that there is a different amount of visual
information in each encryption level. Meanwhile, users can flexibly choose the
encryption level according to their various requirements.
Related papers
- NeR-VCP: A Video Content Protection Method Based on Implicit Neural Representation [7.726354287366925]
We propose an automatic encryption technique for video content protection based on implicit neural representation.
NeR-VCP first pre-distributes the key-controllable module trained by the sender to the recipients.
We experimentally find that it has superior performance in terms of visual representation, imperceptibility to illegal users, and security from a cryptographic viewpoint.
arXiv Detail & Related papers (2024-08-20T16:23:51Z) - When Video Coding Meets Multimodal Large Language Models: A Unified Paradigm for Video Coding [112.44822009714461]
Cross-Modality Video Coding (CMVC) is a pioneering approach to explore multimodality representation and video generative models in video coding.
During decoding, previously encoded components and video generation models are leveraged to create multiple encoding-decoding modes.
Experiments indicate that TT2V achieves effective semantic reconstruction, while IT2V exhibits competitive perceptual consistency.
arXiv Detail & Related papers (2024-08-15T11:36:18Z) - Cryptanalysis and improvement of multimodal data encryption by
machine-learning-based system [0.0]
encryption algorithms to accommodate varied requirements of this field.
Best approach to analyzing an encryption algorithm is to identify a practical and efficient technique to break it.
arXiv Detail & Related papers (2024-02-24T10:02:21Z) - dabih -- encrypted data storage and sharing platform [0.0]
dabih is an open-source web application designed to facilitate user-friendly encrypted data management.
Its approach to data security involves a two-stage envelope encryption process.
The private key necessary for decrypting the data remains exclusively on the owner's device.
arXiv Detail & Related papers (2024-01-16T12:57:35Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Large-capacity and Flexible Video Steganography via Invertible Neural
Network [60.34588692333379]
We propose a Large-capacity and Flexible Video Steganography Network (LF-VSN)
For large-capacity, we present a reversible pipeline to perform multiple videos hiding and recovering through a single invertible neural network (INN)
For flexibility, we propose a key-controllable scheme, enabling different receivers to recover particular secret videos from the same cover video through specific keys.
arXiv Detail & Related papers (2023-04-24T17:51:35Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - EViT: Privacy-Preserving Image Retrieval via Encrypted Vision
Transformer in Cloud Computing [9.41257807502252]
We propose a novel paradigm named Encrypted Vision Transformer (EViT), which advances the discriminative representations capability of cipher-images.
EViT achieves both excellent encryption and retrieval performance, outperforming current schemes in terms of retrieval accuracy by large margins while protecting image privacy effectively.
arXiv Detail & Related papers (2022-08-31T07:07:21Z) - Speckle-based optical cryptosystem and its application for human face
recognition via deep learning [17.169570487230747]
Face images are sensitive biometric data that should be carefully protected.
In this study, a plain yet high-efficient speckle-based optical cryptosystem is proposed and implemented.
The proposed cryptosystem has wide applicability, and it may open a new avenue for high-security complex information encryption and decryption.
arXiv Detail & Related papers (2022-01-26T07:18:02Z) - HERS: Homomorphically Encrypted Representation Search [56.87295029135185]
We present a method to search for a probe (or query) image representation against a large gallery in the encrypted domain.
Our encryption scheme is agnostic to how the fixed-length representation is obtained and can therefore be applied to any fixed-length representation in any application domain.
arXiv Detail & Related papers (2020-03-27T01:10:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.