Integrated visual security management for optimal condition explorations in resource-constrained systems

Junhyung Moon, Heemin Park, Kyoungwoo Lee

Research output: Contribution to journalArticle

Abstract

As more and more mobile video applications contain important and private video data, various video encryption techniques have been proposed to protect them. Many of those applications typically utilize the standard video compression while running on mobile platforms which have limited amount of resources. Therefore, we need to consider not only the protection but also the compression and the energy in the mobile video applications. Accordingly, the selective video encryption which protects partial data within the standard video compression has been challenging thanks to format compliance and low computational complexity. However, various parameters of the video compression and the video encryption result in different amount of visual security, compression efficiency, and energy efficiency. Further, it is difficult to find the one solution to maximize all those performance indices at once since there exist tradeoff relationships among them. Therefore, based on the tradeoff relationships, design space exploration should be required to find the interesting parameter set under the given requirements. For the efficient design space exploration, we propose the BEVS (bitrate and energy-bound visual security) to examine each Joint Video Compression and Encryption scheme in terms of the visual security, the compression efficiency, and the energy efficiency. Utilizing the proposed BEVS in our experimental design space, we achieve up to 36.7% visual security improvement under the empirical budgets.

Original languageEnglish
Article number12
JournalEurasip Journal on Image and Video Processing
Volume2019
Issue number1
DOIs
Publication statusPublished - 2019 Dec 1

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Information Systems
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Integrated visual security management for optimal condition explorations in resource-constrained systems'. Together they form a unique fingerprint.

  • Cite this