A selective encryption scheme for protecting H.264/AVC video in multimedia social network

Aiming to protect H.264/AVC video in multimedia social network, a selective encryption scheme is put forward. In the scheme, after analyzing the impact of quantization parameter (QP) on the encryption of the sign of T1 s and the impact of encrypting inter-macroblock non-zero coefficients, the sign of intra-macroblock non-zero DCT coefficients, the sign of trailing ones (T1 s), the intra prediction modes (IPMs) and the sign of motion vector difference (MVD) are encrypted to protect the texture and motion information of H.264/AVC. Experimental results and analysis show that the computation cost is low and the bitrate increment is negligible, and it can achieve good performance in resisting brute-force attacks, histogram-based attacks and replacement attacks. Based on the encryption scheme, a framework of its implementation in multimedia social network is put forward. It has great potential to be implemented for the video data protection in multimedia social network.

[1]  Byeungwoo Jeon,et al.  Digital Video Scrambling Method Using Intra Prediction Mode , 2004, PCM.

[2]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[3]  Yuzhuo Zhong,et al.  A Quality-Controllable Encryption for H.264/AVC Video Coding , 2006, PCM.

[4]  Hartmut König,et al.  A survey of video encryption algorithms , 2010, Comput. Secur..

[5]  Jianguo Jiang,et al.  An Intra Prediction Mode-Based Video Encryption Algorithm in H.264 , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[6]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[7]  Feng Tang,et al.  Design of a New Selective Video Encryption Scheme Based on H.264 , 2007 .

[8]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[9]  Shuyuan Zhu,et al.  Partial Video Encryption Based on Alternating Transforms , 2009, IEEE Signal Processing Letters.

[10]  Yuzhuo Zhong,et al.  A New Digital Rights Management System In Mobile Applications Using H.264 Encryption , 2007, The 9th International Conference on Advanced Communication Technology.

[11]  Zhiyong Zhang,et al.  Frontier and Methodologies on Digital Rights Management for Multimedia Social Networks , 2012 .

[12]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[13]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[14]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[15]  Liang Li-wei Research and Improvement of the Video Encryption Algorithm for H.264 , 2007 .

[16]  Zafar Shahid,et al.  Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[18]  Thomas Wiegand,et al.  Draft ITU-T recommendation and final draft international standard of joint video specification , 2003 .

[19]  Byeungwoo Jeon,et al.  Digital Video Scrambling Using Motion Vector and Slice Relocation , 2005, ICIAR.

[20]  Lian Shi Quality Analysis of Several Typical MPEG Video Encryption Algorithms , 2004 .

[21]  Xue Li,et al.  Motion vector encryption in multimedia streaming , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[22]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[23]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[24]  Alan C. Bovik,et al.  Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.

[25]  Shiguo Lian,et al.  Efficient video encryption scheme based on advanced video coding , 2007, Multimedia Tools and Applications.

[26]  C.V. Jawahar,et al.  A real-time video encryption exploiting the distribution of the DCT coefficients , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[27]  Fei Peng,et al.  An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.

[28]  William F. Friedman The index of coincidence and its applications in cryptanalysis , 1987 .

[29]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[30]  Máire O'Neill,et al.  A Tunable Encryption Scheme and Analysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[31]  Yajun Wang,et al.  Design of a New Selective Video Encryption Scheme Based on H.264 , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[32]  Zafar Shahid,et al.  Fast protection of H.264/AVC by selective encryption of CABAC , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[33]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[34]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .