Abstract
With the ubiquity of the internet and advances in technology, especially digital consumer electronics, demand for online multimedia services is ever increasing. While it’s possible to achieve a great reduction in bandwidth utilization of multimedia data such as image and video through compression, security still remains a great concern. Traditional cryptographic algorithms/systems for data security are often not fast enough to process the vast amounts of data generated by the multimedia applications to meet the realtime constraints. Selective encryption is a new scheme for multimedia content protection. It involves encrypting only a portion of the data to reduce computational complexity(the amount of data to encrypt)while preserving a sufficient level of security. To achieve this, many selective encryption schemes are presented in different literatures. One of them is Wavelet Tree Shuffling. In this paper we assess the security of a wavelet tree shuffling encryption scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Recommendation for Key Management, Special Publication 800-57 Part 1, NIST, 03/2007
Keylength - Cryptographic Key Length Recommendation, http://www.keylength.com
Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2004)
Kwon, G., Lee, T., Kim, K., Jin, J., Ko, S.: Multimedia digital right management using selective scrambling for mobile handset. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 1098–1103. Springer, Heidelberg (2005)
Li, W.: Overview of Fine Granularity Scalability in MPEG-4 Video Standard. IEEE Trans. on Circuits & Systems for Video Technology 11(3), 301–317 (2001)
Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Security, 1–18 (2008)
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Proceedings of the 22nd Annual Symposium on Theory of Computing. ACM, New York (1990)
Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Processing 15(7), 2061–2075 (2006)
Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing (ICIPÅ 2004), Singapore. IEEE Signal Processing Society (October 2004)
Podesser, M., Schmidt, H., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th Nordic Signal Processing Symposium, NORSIG 2002 (2002)
Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 9(3), 279–287 (2003)
Said, A., Pearlman, W.A.: A new, fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. Circuits and Systems for Video Technology 6(3), 243–250 (1996)
Salama, P., King, B.: Efficient secure image transmission: compression integrated with encryption. In: Proc. SPIE, vol. SPIE-5681, pp. 47–58 (2005)
Shapiro, M.: Embedded Image Coding using Zerotrees of Wavelet Coefficients. IEEE Trans. Signal Processing 41, 3445–3462 (1993)
Shamir, A.: How to share a secret. Comm. of ACM 22(11), 612–613 (1979)
Stinson, D.: Cryptography: theory and practice, 2nd edn. CRC Press, Boca Raton (2002)
Uehara, T., Safavi-Naini, R., Ogunbona, P.: Securing wavelet compression with random permutations. In: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, pp. 332–335. IEEE Signal Processing Society (December 2000)
Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Boston (2005)
Valens, C.: As appeared in (1999), http://pagesperso-orange.fr/polyvalens/clemens/ezw/ezw.html
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia 5(1), 118–129 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Assegie, S., Salama, P., King, B. (2010). An Attack on Wavelet Tree Shuffling Encryption Schemes. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-16444-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16443-9
Online ISBN: 978-3-642-16444-6
eBook Packages: Computer ScienceComputer Science (R0)