Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics

Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such as that arising from video surveillance, is of heightened concern. This leads to the encryption of that content. To reduce the overhead and the lack of flexibility arising from full encryption of the content, a good number of selective-encryption algorithms have been proposed in the last decade. Some of them have limitations, in terms of: significant delay due to computational cost, or excess memory utilization, or, despite being energy efficient, not providing a satisfactory level of confidentiality, due to their simplicity. To address such limitations, this paper presents a lightweight selective encryption scheme, in which encoder syntax elements are encrypted with the innovative EXPer (extended permutation with exclusive OR). The selected syntax elements are taken from the final stage of video encoding that is during the entropy coding stage. As a diagnostic tool, the Encryption Space Ratio measures encoding complexity of the video relative to the level of encryption so as to judge the success of the encryption process, according to entropy coder. A detailed comparative analysis of EXPer with other state-of-the-art encryption algorithms confirms that EXPer provides significant confidentiality with a small computational cost and a negligible encryption bitrate overhead. Thus, the results demonstrate that the proposed security scheme is a suitable choice for constrained devices in an Internet of Multimedia Things environment.

[1]  Waqar Mahmood,et al.  Internet of multimedia things: Vision and challenges , 2015, Ad Hoc Networks.

[2]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[3]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.

[4]  Fei Peng,et al.  An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.

[5]  Fei Peng,et al.  Separable reversible data hiding and encryption for HEVC video , 2017, Journal of Real-Time Image Processing.

[6]  Frederic Dufaux,et al.  Video scrambling for privacy protection in video surveillance: recent results and validation framework , 2011, Defense + Commercial Sensing.

[7]  Hartmut König,et al.  A survey of video encryption algorithms , 2010, Comput. Secur..

[8]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Ramjee Prasad,et al.  Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..

[10]  Jan Sher Khan,et al.  Chaos based efficient selective image encryption , 2018, Multidimensional Systems and Signal Processing.

[11]  Douglas C. Sicker,et al.  Selective encryption for consumer applications , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[12]  Mohammed Ghanbari,et al.  The accuracy of PSNR in predicting video quality for different video scenes and frame rates , 2012, Telecommun. Syst..

[13]  Gary J. Sullivan,et al.  Overview of the High Efficiency Video Coding (HEVC) Standard , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Mohammed Ghanbari,et al.  Standard Codecs: Image Compression to Advanced Video Coding , 2003 .

[15]  Xiangjian He,et al.  Data Sharing in Secure Multimedia Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[16]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[17]  Joonsang Baek,et al.  Lightweight Encryption for Smart Home , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[18]  Mohammed Ghanbari,et al.  Confidentiality of a selectively encrypted H.264 coded video bit-stream , 2014, J. Vis. Commun. Image Represent..

[19]  Edward Curry,et al.  Towards a Generalized Approach for Deep Neural Network Based Event Processing for the Internet of Multimedia Things , 2018, IEEE Access.

[20]  Marius Preda,et al.  Beginning of a New Standard: Internet of Media Things , 2017, KSII Trans. Internet Inf. Syst..

[21]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[22]  Ajay Mittal,et al.  A Survey on Various Edge Detector Techniques , 2012 .

[23]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[24]  Denny Darlis,et al.  An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).

[25]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[26]  Kosmas Dimitropoulos,et al.  Video sensor network for real-time traffic monitoring and surveillance , 2010 .

[27]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[28]  Martin Fleury,et al.  Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes , 2017, J. Vis. Commun. Image Represent..

[29]  Martin Fleury,et al.  Multimedia security perspectives in IoT , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).

[30]  M. Prasanth,et al.  Encryption and hash based security in Internet of Things , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).

[31]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[32]  Safwan El Assad,et al.  A new chaos-based image encryption system , 2016, Signal Process. Image Commun..

[33]  Saima Abdullah,et al.  Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering , 2018, IEEE Access.

[34]  Zhi Chen,et al.  A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..

[35]  Christof Paar,et al.  Block Ciphers - Focus on the Linear Layer (feat. PRIDE) , 2014, CRYPTO.

[36]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[37]  Thomas Stütz,et al.  A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[38]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[39]  Mohammed Ghanbari,et al.  Sufficient encryption based on entropy coding syntax elements of H.264/SVC , 2015, Multimedia Tools and Applications.

[40]  Martin Fleury,et al.  Prospects for live higher resolution video streaming to mobile devices: achievable quality across wireless links , 2018, Journal of Real-Time Image Processing.

[41]  Ali Chehab,et al.  One round cipher algorithm for multimedia IoT devices , 2018, Multimedia Tools and Applications.

[42]  Haijun Lei,et al.  A new H.264 video encryption scheme based on chaotic cipher , 2010, 2010 International Conference on Communications, Circuits and Systems (ICCCAS).

[43]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[44]  Zafar Shahid,et al.  Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[45]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[46]  Mingyuan Xin,et al.  A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System , 2015, 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[47]  Rengarajan Amirtharajan,et al.  Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.

[48]  Russ Housley,et al.  Guidelines for Cryptographic Key Management , 2005, RFC.

[49]  Mohammad Ghanbari,et al.  An Efficient Security System for CABAC Bin-Strings of H.264/SVC , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[50]  Zafar Shahid,et al.  Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.

[51]  Dominique Barchiesi,et al.  A new image encryption scheme based on a chaotic function , 2012, Signal Process. Image Commun..

[52]  Heiko Schwarz,et al.  Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[53]  Daniel W. Engels,et al.  The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.

[54]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[55]  Martin Fleury,et al.  Interoperable conditional access with video selective encryption for portable devices , 2016, Multimedia Tools and Applications.

[56]  Yu-Hung Huang,et al.  A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).

[57]  Kazuhiko Minematsu,et al.  $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.