access icon free Design of new scan orders for perceptual encryption of H.264/AVC videos

In this study, a perceptual encryption algorithm is proposed for H.264/AVC video to enhance the scrambling effect and encryption space. Six new scan orders are designed for H.264/AVC encoder by analysing the energy distribution of discrete cosine transform coefficients. They are proven to have similar performance as the conventional zigzag scan order and its symmetrical scan order. These six new scan orders are combined with two existing scan orders to design a scan-order based perceptual encryption algorithm. Specifically, video encryption is achieved more specifically by randomly selecting one scan order from the eight scan orders with a security key, and the sign bit flipping of DC coefficients is also incorporated to further increase the encryption space. Experimental results show that the proposed approach has the advantages of both low bitrate increase and low computational cost. Furthermore, it is more flexible and has stronger security than the existing scan-order based video encryption schemes.

Inspec keywords: discrete cosine transforms; video coding; cryptography

Other keywords: scrambling effect enhancement; energy distribution; discrete cosine transform coefficients; video encryption; AVC video; perceptual encryption algorithm; H.264 video; zigzag scan order; encryption space enhancement; symmetrical scan order; sign bit flipping; security key

Subjects: Data security; Image and video coding; Integral transforms; Integral transforms; Cryptography; Video signal processing

References

    1. 1)
      • 20. Richardson, I.E.: ‘The H.264 advanced video compression standard’ (John Wiley & Sons, 2011).
    2. 2)
      • 7. Li, S., Chen, G., Cheung, A., et al: ‘On the design of perceptual MPEG-video encryption algorithms’, IEEE Trans. Circuits Syst. Video Technol., 2007, 17, (2), pp. 214223.
    3. 3)
      • 8. Magli, E., Grangetto, M., Olmo, G.: ‘Transparent encryption techniques for H.264/AVC and H.264/SVC compressed video’, Signal Process., 2011, 91, (5), pp. 11031114.
    4. 4)
      • 14. Lui, O.Y., Wong, K.W.: ‘Chaos-based selective encryption for H. 264/AVC’, J. Syst. Softw., 2013, 86, (12), pp. 31833192.
    5. 5)
      • 25. Xia, Z., Wang, X., Sun, X., et al: ‘Steganalysis of LSB matching using differences between nonadjacent pixels’, Multimedia Tools Appl., 2014, 1, pp. 116.
    6. 6)
      • 3. Yeung, S.K.A., Zhu, S., Zeng, B.: ‘Partial video encryption based on alternating transforms’, IEEE Signal Process. Lett., 2009, 16, (10), pp. 893896.
    7. 7)
      • 4. Yeung, S.K.A., Zhu, S., Zeng, B.: ‘Perceptual video encryption using multiple 8 × 8 transforms in H.264 and MPEG-4’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 24362439.
    8. 8)
      • 13. Shahid, Z., Chaumont, M., Puech, W.: ‘Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames’, IEEE Trans. Circuits Syst. Video Technol., 2011, 21, (5), pp. 565576.
    9. 9)
      • 15. Li, Z., Wang, X., Yang, W.: ‘A fast selective video encryption algorithm by selecting data randomly’. Sixth Int. Conf. on Electronics and Information Engineering. Int. Society for Optics and Photonics, 2015, 97940S-97940S-6.
    10. 10)
      • 9. Asghar, M.N., Ghanbari, M., Fleury, M., et al: ‘Confidentiality of a selectively encrypted H.264 coded video bit-stream’, J. Vis. Commun. Image Represent., 2014, 25, (2), pp. 487498.
    11. 11)
      • 18. Wang, Y., O'Neill, M., Kurugollu, F.: ‘Partial encryption by randomized zigzag scanning for video encoding’. IEEE Int. Symp. on Circuits and Systems (ISCAS), 2013, pp. 229232.
    12. 12)
      • 6. Zeng, B., Yeung, S.K.A., Zhu, S., et al: ‘Perceptual encryption of H. 264 videos: Embedding sign-flips into the integer-based transforms’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (2), pp. 309320.
    13. 13)
      • 12. Xu, D., Wang, R.: ‘Context adaptive binary arithmetic coding-based data hiding in partially encrypted H. 264/AVC videos’, J. Electron. Imaging, 2015, 24, (3), pp. 033028033028.
    14. 14)
      • 1. Liu, F., Koenig, H.: ‘A survey of video encryption algorithms’, Comput. Secur., 2010, 29, (1), pp. 315.
    15. 15)
      • 22. Wang, Z., Bovik, A.C.: ‘Mean squared error: love it or leave it? A new look at signal fidelity measures’, IEEE Signal Process. Mag., 2009, 26, (1), pp. 98117.
    16. 16)
      • 11. Joshi, J.M., Dalal, U.D.: ‘Highly secure and fast video encryption using minimum overhead in H.264/AVC bitstream’, J. Test. Eval., 2016, 44, (4), pp. 1225.
    17. 17)
      • 21. Thayer, R., Kaukonen, K.: ‘A stream cipher encryption algorithm arcfour [J]’. Internet Engineering Task Force, 1999. Availabe at: http://www.mozilla.org/projects/security/pki/nss/draft-kaukonen-cipher-arcfour-03.txt.
    18. 18)
      • 19. H.264/AVC Reference Software. Available at http://iphome.hhi.de/suehring/tml, 2014.
    19. 19)
      • 2. Stütz, T., Uhl, A.: ‘A Survey of H.264 AVC/SVC Encryption’, IEEE Trans. Circuits Syst. Video Technol., 2012, 22, (3), pp. 325339.
    20. 20)
      • 23. Yeung, S.K.A., Zhu, S., Zeng, B.: ‘Quality assessment for a perceptual video encryption system’. IEEE Int. Conf. on Wireless Communications, Networking and Information Security(WCNIS), 2010, pp. 102106.
    21. 21)
      • 16. Tang, L.: ‘Methods for encrypting and decrypting MPEG video data efficiently’. The fourth ACM Int. Conf. on Multimedia, 1997, pp. 219229.
    22. 22)
      • 5. Yeung, S.K.A., Zeng, B.: ‘A new design of multiple transforms for perceptual video encryption’. IEEE Int. Conf. on Image Processing (ICIP), 2012, pp. 26372640.
    23. 23)
      • 26. Pan, Z., Zhang, Y., Kwong, S.: ‘Efficient motion and disparity estimation optimization for low complexity multiview video coding’, IEEE Trans. Broadcast., 2015, 61, (2), pp. 166176.
    24. 24)
      • 17. Qiao, L., Nahrstedt, K., Tam, M.C.: ‘Is MPEG encryption by using random list instead of zigzag order secure?’. IEEE Int. Symp. on Consumer Electronics (ISCE), 1997, pp. 226229.
    25. 25)
      • 24. Xia, Z., Wang, X., Sun, X., et al: ‘Steganalysis of least significant bit matching using multi-order differences’, Sec. Commun. Netw., 2014, 7, (8), pp. 12831291.
    26. 26)
      • 10. Shen, H., Zhuo, L., Zhao, Y.: ‘An efficient motion reference structure based selective encryption algorithm for H.264 videos’, IET Inf. Sec., 2014, 8, (3), pp. 199206.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0492
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0492
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading