Design of a New Format-Compliant Partial Encryption Scheme for H.264 Video Design of a New Format-Compliant Partial Encryption Scheme for H.264 Video
Subject Areas : electrical and computer engineeringS. Rasoolifar 1 * , M. Khademi 2
1 - Ferdosi University
2 - Ferdowsi University of Mashhad
Keywords: H.264 standard partial video encryption stream cipher EGEA LSE,
Abstract :
H.264 is the latest video compression standard and its compression efficiency is twice as much as previous standards. Due to the advantages of this standard and its widespread use in various video applications, the protection of this standard has become necessary. In this paper, a new partial encryption scheme is presented for H.264 video which keeps the video format unchanged. In this method, parameters with high sensitivity to H.264 video texture and motion components are encrypted during compression. That is, such parameters as Intra4x4PredMode, Intra Residual Data, Ref-Index and MVD are encrypted using stream ciphers. This encryption scheme obtains high encryption efficiency through reducing the encrypted data volume along with high perceptual security. In addition to these properties, parameter selection and encryption in the proposed method is implemented in a way that the encrypted video format is kept compliant and thus can be utilized in different applications such as commercial and entertainment applications.
[1] S. A. Vanstone, A. J. Menezes, and P. C. Oorschot, Handbook of Applied Cryptography, CRC Press, 1996.
[2] R. A. Mollin, An Introduction to Cryptography, CRC Press, 2006.
[3] F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni, and M. Reginelli, "A new chaotic algorithm for video encryption," IEEE Trans. on Consumer Electronics, vol. 48, no. 4, pp. 838-844, Nov. 2002.
[4] J. Yen and J. Guo, "A new MPEG encryption system and its VLSI architecture," in Proc. IEEE Workshop on Signal Processing Systems, pp. 430-437, Taipei, Taiwan, Oct. 1999.
[5] C. Shi and B. Bhargava, "An efficient MPEG video encryption algorithm," in Proc. of the 17th IEEE Symposium on Reliable Distributed Systems, pp. 381-386, Indiana, US, Oct. 1998.
[6] C. G. Shi, S. Y. Wang, and B. Bhargava, "MPEG video encryption in real - time using secret key cryptography," in Proc. of the Int. Conf. of Parallel and Distributed Processing Techniques and Applications, pp. 2822-2828, Las Vegas, US, Jun. 1998.
[7] A. Tosum and W. Feng, "Efficient multi - layer coding and encryption of MPEG video streams," in Proc. IEEE Int. Conf. on Multimedia and Expo (I), vol. 1, pp. 119-122, Jul. 2000.
[8] L. Qiao, K. Nahrstedt, and I. Tam, "Is MPEG encryption by using random list instead of zigzag order secure," in Proc. IEEE Int. Symp. on Consumer Electronics, pp. 226-229, Singapore, Dec. 1997.
[9] W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. on Multimedia, vol. 5, no. 1, pp. 118-129, Mar. 2003.
[10] C. Wang, H. Yu, and M. Zheng, "A DCT- based MPEG - 2 transparent scrambling algorithm," IEEE Trans. on Consumer Electronics, vol. 49, no. 4, pp. 1208-1213, Nov. 2003.
[11] M. Kankanhalli and T. Guan, "Compressed-domain scrambler/descrambler for digital video," IEEE Trans. on Consumer Electronics, vol. 48, no. 2, pp. 356-365, May 2002.
[12] J. Wen and W. Zeng, "A format - compliant configurable encryption framework for access control of multimedia," in Proc. IEEE Workshop on Multimedia Signal Processing, vol. 12, pp. 435-440, Oct. 2001.
[13] D. Xie and C. Kuo, "Enhanced multiple huffman table (MHT) encryption scheme using key hopping," in Proc. IEEE Int. Symp. on Circuits and Systems, vol. 5, pp. 5533-5536, May 2005.
[14] J. Wang, Y. Fan, T. Ikenaga, and S. Goto, "A partial scramble scheme for H.264 video," in Proc. Int. Conf. on Multimedia Technology, pp. 802-805, Oct. 2007.
[15] Y. Wang, M. Cai, and F. Tang, "Design of a new selective encryption scheme based on H.264," in Proc. IEEE Int. Conf. on Computational Intelligence and Security, pp. 883-887, Dec. 2007.
[16] S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, "Secure advanced video coding based on selective encryption algorithms," IEEE Trans. on Consumer Electronics, vol. 52, no. 2, pp. 621-629, May 2006.
[17] S. Hai-Wei and L. Jin-Ping, "A novel stream cipher for video compressed by H.264," in Proc. Int. Forum on Computer Science - Technology and Applications, vol. 2, pp. 54-56, Dec. 2009.
[18] J. Zhou, O. C. Au, and A. Y. Wu, "Secure exp - golomb coding using stream cipher," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 1457-1460, Apr. 2009.
[19] H. Z. Yao and Y. T. Jing, "The design of video-conference encryption system based on H.264," in Proc. Int. Conf. on Multimedia Technology, 4 pp., Oct. 2010.
[20] S. K. Yeung, S. Zhu, and B. Zeng, "Partial video encryption based on alternative integer transforms," in Proc. IEEE Int. Symp. on Circuits and Systems, pp. 933-936, May 2010.
[21] "Draft ITU-T recommendation and final draft international standard of joint video specification (ITU - T Rec. H.264/ISO/IEC 14496-10 AVC version 13)," in Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, 2010.
[22] T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 7, pp. 560-576, Jul. 2003.
[23] G. Sullivan and T. Wiegand, "Video compression - from concepts to the H.264/AVC standard," in Proc. of the IEEE, Special Issue on Advances in Video Coding and Delivery, vol. 93, no. 1, pp. 18-31, Jan. 2005.
[24] J. Ahn, H. Shim, B. Jeon, and I. Choi, "Digital video scrambling method using intra prediction method," in Proc. PCM2004, vol. 3333 of LNC, pp. 386-393, Nov. 2004.
[25] S. Lian, J. Sun, G. Liu, and Z. Wang, "Efficient video encryption scheme based on advanced video coding," Multimedia Tools and Applications, vol. 38, no. 1, pp. 75-89, May 2007.
[26] I. E. G. Richardson, H.264/MPEG-4 Part 10, Oct. 2002, http://www.vcodex.com.
[27] N. Masuda, G. Jakimoski, K. Aihara, and L. Kocarev, "Chaotic block ciphers: from theory to practical algorithms," IEEE Trans. on Circuits and Systems-I: Regular Papers, vol. 53, no. 6, pp. 1341-1352, Jun. 2006.
[28] S. G. Lian, Multimedia Content Encryption, CRC Press, 2008.