http://iet.metastore.ingenta.com
1887

Design of new scan orders for perceptual encryption of H.264/AVC videos

Design of new scan orders for perceptual encryption of H.264/AVC videos

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this study, a perceptual encryption algorithm is proposed for H.264/AVC video to enhance the scrambling effect and encryption space. Six new scan orders are designed for H.264/AVC encoder by analysing the energy distribution of discrete cosine transform coefficients. They are proven to have similar performance as the conventional zigzag scan order and its symmetrical scan order. These six new scan orders are combined with two existing scan orders to design a scan-order based perceptual encryption algorithm. Specifically, video encryption is achieved more specifically by randomly selecting one scan order from the eight scan orders with a security key, and the sign bit flipping of DC coefficients is also incorporated to further increase the encryption space. Experimental results show that the proposed approach has the advantages of both low bitrate increase and low computational cost. Furthermore, it is more flexible and has stronger security than the existing scan-order based video encryption schemes.

References

    1. 1)
      • 1. Liu, F., Koenig, H.: ‘A survey of video encryption algorithms’, Comput. Secur., 2010, 29, (1), pp. 315.
    2. 2)
      • 2. Stütz, T., Uhl, A.: ‘A Survey of H.264 AVC/SVC Encryption’, IEEE Trans. Circuits Syst. Video Technol., 2012, 22, (3), pp. 325339.
    3. 3)
      • 3. Yeung, S.K.A., Zhu, S., Zeng, B.: ‘Partial video encryption based on alternating transforms’, IEEE Signal Process. Lett., 2009, 16, (10), pp. 893896.
    4. 4)
      • 4. Yeung, S.K.A., Zhu, S., Zeng, B.: ‘Perceptual video encryption using multiple 8 × 8 transforms in H.264 and MPEG-4’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 24362439.
    5. 5)
      • 5. Yeung, S.K.A., Zeng, B.: ‘A new design of multiple transforms for perceptual video encryption’. IEEE Int. Conf. on Image Processing (ICIP), 2012, pp. 26372640.
    6. 6)
      • 6. Zeng, B., Yeung, S.K.A., Zhu, S., et al: ‘Perceptual encryption of H. 264 videos: Embedding sign-flips into the integer-based transforms’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (2), pp. 309320.
    7. 7)
      • 7. Li, S., Chen, G., Cheung, A., et al: ‘On the design of perceptual MPEG-video encryption algorithms’, IEEE Trans. Circuits Syst. Video Technol., 2007, 17, (2), pp. 214223.
    8. 8)
      • 8. Magli, E., Grangetto, M., Olmo, G.: ‘Transparent encryption techniques for H.264/AVC and H.264/SVC compressed video’, Signal Process., 2011, 91, (5), pp. 11031114.
    9. 9)
      • 9. Asghar, M.N., Ghanbari, M., Fleury, M., et al: ‘Confidentiality of a selectively encrypted H.264 coded video bit-stream’, J. Vis. Commun. Image Represent., 2014, 25, (2), pp. 487498.
    10. 10)
      • 10. Shen, H., Zhuo, L., Zhao, Y.: ‘An efficient motion reference structure based selective encryption algorithm for H.264 videos’, IET Inf. Sec., 2014, 8, (3), pp. 199206.
    11. 11)
      • 11. Joshi, J.M., Dalal, U.D.: ‘Highly secure and fast video encryption using minimum overhead in H.264/AVC bitstream’, J. Test. Eval., 2016, 44, (4), pp. 1225.
    12. 12)
      • 12. Xu, D., Wang, R.: ‘Context adaptive binary arithmetic coding-based data hiding in partially encrypted H. 264/AVC videos’, J. Electron. Imaging, 2015, 24, (3), pp. 033028033028.
    13. 13)
      • 13. Shahid, Z., Chaumont, M., Puech, W.: ‘Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames’, IEEE Trans. Circuits Syst. Video Technol., 2011, 21, (5), pp. 565576.
    14. 14)
      • 14. Lui, O.Y., Wong, K.W.: ‘Chaos-based selective encryption for H. 264/AVC’, J. Syst. Softw., 2013, 86, (12), pp. 31833192.
    15. 15)
      • 15. Li, Z., Wang, X., Yang, W.: ‘A fast selective video encryption algorithm by selecting data randomly’. Sixth Int. Conf. on Electronics and Information Engineering. Int. Society for Optics and Photonics, 2015, 97940S-97940S-6.
    16. 16)
      • 16. Tang, L.: ‘Methods for encrypting and decrypting MPEG video data efficiently’. The fourth ACM Int. Conf. on Multimedia, 1997, pp. 219229.
    17. 17)
      • 17. Qiao, L., Nahrstedt, K., Tam, M.C.: ‘Is MPEG encryption by using random list instead of zigzag order secure?’. IEEE Int. Symp. on Consumer Electronics (ISCE), 1997, pp. 226229.
    18. 18)
      • 18. Wang, Y., O'Neill, M., Kurugollu, F.: ‘Partial encryption by randomized zigzag scanning for video encoding’. IEEE Int. Symp. on Circuits and Systems (ISCAS), 2013, pp. 229232.
    19. 19)
      • 19. H.264/AVC Reference Software. Available at http://iphome.hhi.de/suehring/tml, 2014.
    20. 20)
      • 20. Richardson, I.E.: ‘The H.264 advanced video compression standard’ (John Wiley & Sons, 2011).
    21. 21)
      • 21. Thayer, R., Kaukonen, K.: ‘A stream cipher encryption algorithm arcfour [J]’. Internet Engineering Task Force, 1999. Availabe at: http://www.mozilla.org/projects/security/pki/nss/draft-kaukonen-cipher-arcfour-03.txt.
    22. 22)
      • 22. Wang, Z., Bovik, A.C.: ‘Mean squared error: love it or leave it? A new look at signal fidelity measures’, IEEE Signal Process. Mag., 2009, 26, (1), pp. 98117.
    23. 23)
      • 23. Yeung, S.K.A., Zhu, S., Zeng, B.: ‘Quality assessment for a perceptual video encryption system’. IEEE Int. Conf. on Wireless Communications, Networking and Information Security(WCNIS), 2010, pp. 102106.
    24. 24)
      • 24. Xia, Z., Wang, X., Sun, X., et al: ‘Steganalysis of least significant bit matching using multi-order differences’, Sec. Commun. Netw., 2014, 7, (8), pp. 12831291.
    25. 25)
      • 25. Xia, Z., Wang, X., Sun, X., et al: ‘Steganalysis of LSB matching using differences between nonadjacent pixels’, Multimedia Tools Appl., 2014, 1, pp. 116.
    26. 26)
      • 26. Pan, Z., Zhang, Y., Kwong, S.: ‘Efficient motion and disparity estimation optimization for low complexity multiview video coding’, IEEE Trans. Broadcast., 2015, 61, (2), pp. 166176.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0492
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0492
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address