Skip to main content

A New Video Encryption Scheme for H.264/AVC

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4810))

Abstract

With the increase of video applications, the security of video data becomes more and more important. In this paper, we propose a new video encryption scheme for H.264/AVC video coding standard. We define Unequal Secure Encryption (USE) as an approach that applies different cryptographic algorithms (with different security strength) to different partitions of video data. The USE scheme includes two parts: video data classification and unequal secure video data encryption. For data classification, we propose 3 data classification methods and define 5 security levels in our scheme. For encryption, we propose a new stream cipher algorithm FLEX and XOR method to reduce computational cost. In this way, our scheme can achieve both high security and low computational cost. The experimental results show that the computational cost of the USE scheme is very low. In security level 0, the computational cost is about 18% of naive encryption. The USE scheme is very suitable for high security and low cost video encryption systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ostermann, J., Bormans, J., List, P., Marpe, D., Narroschke, M., Pereira, F., Stockhammer, T., Wedi, T.: Video coding with H.264/AVC: tools, performance, and complexity. IEEE Circuits and Systems Magazine 4(1), 7–28 (2004)

    Article  Google Scholar 

  2. Furht, B., Socek, D.: Multimedia Security: Encryption Techniques, IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL (2003)

    Google Scholar 

  3. Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: CIIT 2003. IASTED International Conference on Communications, Internet and Information Technology, Scottsdale, AZ, (November 17-19, 2003) pp. 17–19 (2003)

    Google Scholar 

  4. Lookabaugh, T., Sicker, D.C., Keaton, D.M., Guo, W.Y., Vedula, I.: Security Analysis of Selectively Encrypted MPEG-2 Streams. In: Multimedia Systems and Applications VI Conference, Orlando, FL (September 7-11, 2003)

    Google Scholar 

  5. Qiao, L., Nahrstedt, K.: Comparison of MPEG Encryption Algorithms, International Journal on Computer and Graphics. Special Issue on Data Security in Image Communication and Network 22(3) (1998)

    Google Scholar 

  6. Furht, B., Socek, D., Eskicioglu, A.M.: Fundamentals of multimedia encryption techniques. In: Multimedia Security Handbook, ch. 3, pp. 93–131. CRC Press, Boca Raton (2004)

    Google Scholar 

  7. Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmission. In: Proceedings of the Symposium on Network and Distributed Systems Security, IEEE, Los Alamitos (1996)

    Google Scholar 

  8. Qiao, L., Nahrstedt, K., Tam, I.: Is MPEG Encryption by Using Random List Instead of Zigzag Order Secure? In: IEEE International Symposium on Consumer Electronics, Singapore (December 1997)

    Google Scholar 

  9. Bhargava, B., Shi, C., Wang, Y.: MEPG: Video Encryption Algorithms (August 2002), available at http://raidlab.cs.purdue.edu/papers/mm.ps

  10. Seidel, T., Socek, D., Sramka, M.: Cryptanalysis of Video Encryption Algorithms. In: TATRACRYPT 2003. Proceedings of The 3rd Central European Conference on Cryptology, Bratislava, Slovak Republic (2003)

    Google Scholar 

  11. Alattar, A., Al-Regib, G.: Evaluation of selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 4, pp IV-340-IV-343, (1999)

    Google Scholar 

  12. Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: CISST 1997. Proceedings of the 1st International Conference on Imaging Science, Systems and Technology, Las Vegas, NV, pp. 21–29 (July 1997)

    Google Scholar 

  13. National Institute of Standards and Technology (U.S.). Advanced Encryption Standards (AES). FIPS Publication 197 (2001)

    Google Scholar 

  14. Biryukov, A.: A New 128-bit Stream Cipher LEX, ECRYPT Stream Cipher Project Report, 2005, Available at http://www.ecrypt.eu.org/stream/lex.html

  15. Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1Video, Project Description of SECMPEG, Technical University of Berlin, Germany (May 1995)

    Google Scholar 

  16. Maples, T.B., Spanos, G.A.: Performance study of selective encryption scheme for the security f networked real-time video. In: Proceedings of the 4th International Conference on Computer and Communications, Las Vegas, NV (1995)

    Google Scholar 

  17. Spanos, G.A., Maples, T.B.: Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications. In: Conference on Computers and Communications, pp. 72–78 (1996)

    Google Scholar 

  18. Shi, C., Bhargava, B.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the 6th International Multimedia Conference, Bristol, UK (September 12-16, 1998)

    Google Scholar 

  19. Shi, C., Wang, S.-Y., Bhargava, B.: MPEG Video Encryption in Real-Time Using Secret key Cryptography. In: PDPTA 1999. 1999 International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV (June 28 - July 1, 1999)

    Google Scholar 

  20. Alattar, A.M., Al-Regib, G.I., Al-Semari, S.A.: Improved Selective Encryption techniques for Secure Transmission of MPEG Video Bit-Streams. In: ICIP 1999. Proceedings of the 1999 International Conference on Image Processing, Kobe, Japan (October 24-28, 1999) vol. 4, pp. 256–260 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Horace H.-S. Ip Oscar C. Au Howard Leung Ming-Ting Sun Wei-Ying Ma Shi-Min Hu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fan, Y., Wang, J., Ikenaga, T., Tsunoo, Y., Goto, S. (2007). A New Video Encryption Scheme for H.264/AVC. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77255-2_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77254-5

  • Online ISBN: 978-3-540-77255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics