Video JET: Packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data

Jian Ru Chen, Shih Wei Sun, Chun Shien Lu, Pao Chi Chang

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Media encryption technologies actively play the first line of defense in securing the access of multimedia data. Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped creating packet loss. In order to achieve robust media encryption, the requirement of error resilience can be achieved with error-resilient media transmission. This study proposes a video joint encryption and transmission (video JET) scheme by exploiting media hash-embedded residual data to achieve motion estimation and compensation for recovering lost packets, while maintaining format compliance and cryptographic provable security. Interestingly, since video block hash preserves the condensed content to facilitate search of similar blocks, motion estimation is implicitly performed through robust media hash matching - which is the unique characteristic of our method. We analyze and compare the performance of resilience to (bursty) packet loss between the proposed method and forward error correction (FEC), which has been extensively employed to protect video packets over error-prone networks. The feasibility of our packet loss-resilient video JET approach is further demonstrated through experimental results.

Original languageEnglish
Pages (from-to)249-278
Number of pages30
JournalMultimedia Tools and Applications
Volume44
Issue number2
DOIs
StatePublished - Sep 2009

Keywords

  • (Selective) Encryption
  • Embedding
  • Error concealment
  • Error resilience
  • Media hashing
  • Motion estimation/compensation
  • Packet loss

Fingerprint

Dive into the research topics of 'Video JET: Packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data'. Together they form a unique fingerprint.

Cite this