Study of Selective Video Encryption for the H.264 Standard

Article Preview

Abstract:

Video encryption has been widely researched in digital right management in recent years, especially selective video encryption. Selective video encryption has been the main trend with the development of compression coding methods, which selects an important subset of the comparative large compressed video data to encrypt in order to satisfy the real-time features and ensure the security of the video at the same time. In this paper, according to a particular evaluation criterion we proposed, we mainly analyze several selective video encryption algorithms based on the H.264 standard. Through the analysis we find out how to select the different vital data sets of the video to encrypt according to various security levels and applications.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2097-2103

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C. E. Shannon. Communication theory of secrecy systems. Declassified Report, (1946).

Google Scholar

[2] MPEG: H. 264/MPE_4 Part 10 White Paper www. vcodex. com. (2003).

Google Scholar

[3] ITU-T Rec.H. 264/ISO/IEC 11496-10, Advanced Video Coding. Final Committee Draft, Document JVT-F100, (2002. 12).

Google Scholar

[4] T. Wiegand, G. Sullivan, G. Bjontegaard and A. Luthra: Overview of the H. 264/AVC Video Coding Standard, IEEE Transactions on Circuits and Systems for Video Technology, (2003).

DOI: 10.1109/tcsvt.2003.815165

Google Scholar

[5] Yinian Mao, and Min Wu: A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption. IEEE Transactions on Image processing. Vol. 15, No. 7(2006).

DOI: 10.1109/tip.2006.873426

Google Scholar

[6] L. Qiao, K. Nahrstedt: A New Algorithm for MPEG Video Encryption[C]. First International Conference on Imaging Science, Systems, and Technology, (1997).

Google Scholar

[7] J. Meyer, F. Gadegast: Security mechanism of multimedia data with the example MPEG-1 video[C]. Berlin, Germany: Technical Univ. Berlin, (1995).

Google Scholar

[8] Tang L: Methods for encrypting and decrypting MPEG video data efficiently [A]. Proceedings of the Fourth ACM International Multimedia Conference (ACM Mutimedia'96) [C]. Boston, MA, ( 1996).

DOI: 10.1145/244130.244209

Google Scholar

[9] Wade Trappe, Lawrence C. Washington: Introduction to Cryptography with Coding Theory [M] (2008).

Google Scholar

[10] Yuanzhi Zhou, Tiejun Huang, and Wen Gao: H. 264 Video Encyption Scheme Adaptive to DRM[J]. IEEE Trans. Consumer Electron., vol. 52, no. 4, pp: 1289-1297, Nov (2006).

DOI: 10.1109/tce.2006.273147

Google Scholar

[11] P. Melih and D. Vadi: A MPEG-2-transparent scrambling technology[M]. IEEE Trans. Consumer Electron., vol. 48, no. 2, pp.345-355, ( May 2002).

Google Scholar

[12] C. Wang, H-B. Yu, and M. Zheng: A DCT-based MPEG-2 transparent scrambling algorithm[J]. IEEE Trans. Consumer Electron., vol. 49, no. 4, pp: 1208 – 1213, Nov. (2003).

DOI: 10.1109/tce.2003.1261218

Google Scholar

[13] Fuwen Liu, and Hartmut Koenig: A survey of video encryption algorithms[J]. Computers & Security, Vol. 29, No. 1, pp.3-15, (2009).

Google Scholar

[14] Xiliang Liu , Ahmet M: Eskicioglu. Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions[J]. Proc. of Conf. Communications, Internet, and Information Technology, pp.17-19, (2003).

Google Scholar

[15] Nidhi S. Kulkarni, Balasubramanian Raman, Indra Gupta. Multimedia Encryption: A Brief Overview[J]. SCI 231, pp.417-449, ( 2009).

Google Scholar

[16] A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, J. -J. Quisquater. Overview on Selective Encryption of Image and Video: Challenges and Perspectives. EURASIP J. on Information Securit. Article ID 179290, ( 2008).

DOI: 10.1155/2008/179290

Google Scholar

[17] Fuwen Liu and Hartmut Koenig. A survey of video encryption algorithms. Computers & Security, Vol. 29, No. 1, pp.3-15, (2009).

Google Scholar

[18] Xiliang Liu, Ahmet M. Eskicioglu. Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. Proc. of Conf. Communications, Internet, and Information Technology, pp.17-19, (2003).

Google Scholar

[19] Nidhi S. Kulkarni, Balasubramanian Raman, Indra Gupta. Multimedia Encryption: A Brief Overview. SCI 231, pp.417-449, (2009).

Google Scholar

[20] Tom Lookabaugh, Douglas C. Sicker, David M. Keaton, Wang Ye Guo, Indrani Vedula. Security Analysis of Selectively Encrypted MPEG-2 Streams. Proc. of Multimedia Systems and Applications, (2003).

DOI: 10.1117/12.512635

Google Scholar

[21] Thomas Stutz , and Andreas Uhl: A Survey of H. 264 AVC/SVC Encryption. In IEEE transactions on Circuits and Systems for Video Techonology, Vol. 22, NO. 3 (2012).

DOI: 10.1109/tcsvt.2011.2162290

Google Scholar

[22] Shi C, and Bhargava B: A fast MPEG video encryption algorithms. In: Proceedings of 6th ACM international conference on multimedia; (1998).

DOI: 10.1145/290747.290758

Google Scholar

[23] Shi C, and Bhargava B. An efficient MPEG video encryption algorithms. In: Proceedings of IEEE symposium on reliable distributed systems; (1998).

DOI: 10.1109/reldis.1998.740527

Google Scholar

[24] Shi C, Wang SY, Bhargava B. MPEG video encryption in real-time using secret key cryptography. International conference on parallel and distributed processing techniques and applications (PDPTA'99), Las Vegas, NV, USA; (1999).

Google Scholar

[25] Wu C-P, and Kuo C-CJ. Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia (2005).

DOI: 10.1109/tmm.2005.854469

Google Scholar