Professional Documents
Culture Documents
I.
INTRODUCTION
(a)
*Prof. Yong Man Ro is the director of Image and Video Systems Lab.,
ICU. E-mail: yro@icu.ac.kr, Tel. +82-42-866-6289
(b)
Figure 1. ROI representation in SVC: (a) foreground and leftover type,
and (b) the SVC bitstream structure defined as the ROI
V. EXPERIMENTAL RESULTS
We implemented the proposed method in JSVM version 6.0,
and performed functional verification of ROI-independent
encryption. SVC test sequence, Foreman is used for the
experiment. For the sequence, two layer configurations
{QCIF, 15 fps}, {CIF, 30 fps}were used for encoding
sequence with one ROI. The size of ROI is 80 64 (pixel
pixel) in QCIF resolution.
Fig. 5 shows the decoded results with or without the
application of the constrained motion estimation. In Fig. 5
(a), the noise pattern of the encrypted macroblock spreads
out to the background area. However, the restricted
encryption only for the ROI is achieved by using constraint
of motion search range between the ROI and the background
as shown in Fig. 5 (b).
Fig. 6 shows the decoded pictures with or without the
application of the boundary handling for half-pel
interpolation. As shown in Fig. 6 (a), there are distinct errors
near the ROI, which appear like vertical stripes. These are
(a)
(b)
Figure 5. Comparison of (a) of handling with the unconstrained motion
estimation, and (b) constrained motion estimation.
(a)
(b)
Figure 6. Comparison of handling with the restricted half-pel interpolation
and quarter-pel on the ROI boundary: (a) not applied, and (b) applied.
VI. CONCLUSION
(a)
(b)
Figure 7. Comparison of handling with the restricted Intra_BL mode on the
ROI boundary: (a) not applied, and (b) applied
(a)
(b)
(c)
[1]
[2]
(d)
(e)
Figure 8. Visual patterns comparison of encrypted video data in terms of
texture, motion, and FGS: (a) original picture, (b) picture encrypted texture
data, (c) picture encrypted motion vector data, (d) picture encrypted FGS
data, and (e) picture encrypted combined all data.
[3]
[4]
[5]
[6]
[7]
ISO/IEC JTC 1/SC 29/WG 11, Joint Scalable Video Model (JSVM)
6.0 Reference Encoding Algorithm Description, N 8015, April 2006,
Switzerland.
S. Lian, Z. Liu, Z. Ren, and H. Wang, Secured Advanced Video
Coding Based on Selective Encryption Algorithms, IEEE Trans. on
Consumer Electronics, pp. 621-629, vol. 52, no. 2, 2006.
T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, Overview
of the H.264/AVC video coding standard, IEEE Trans. on Circuits
Systems for Video Technology, vol. 13, no. 7, pp. 560-576, July 2003.
Y. G. Won, T. M. Bae, and Y. M. Ro, Scalable Protection and Access
Control in Full Scalable Video Coding, LNCS, 4283, pp. 407-421,
Nov. 2006.
M. Grangetto, E. Magli, and G. Olmo, Multimedia Selective
Encryption by Means of Randomized Arithmetic Coding, IEEE Trans.
on Multimedia, vol. 8, no. 5, pp. 905917, Oct. 2006.
D. Marpe, H. Schwarz, and T. Wiegand, Context-Based Adaptive
Binary Arithmetic Coding in H.264/AVC Video Compression
Standard, IEEE Trans. on Circuits Systems for Video Technology, Vol.
13, no. 7, pp. 620-636, July 2003.
T. M. Bae, T. C. Thang, D. Y. Kim, Y. M. Ro, J. W. Kang, and J. K.
Kim, Multiple Region-of-Interest Support in Scalable Video Coding,
ETRI Journal, vol. 28, no. 2, April 2006.