Conditional access techniques for H . 264 / AVC and H . 264 / SVC compressed video

Protection of video content calls for encryption of all or part of the compressed files. For the “conditional access” application, this requires to provide a video preview that is left in the clear, while the video enhancement information is encrypted. In this paper we propose four algorithms that provide the conditional access functionality. The first three algorithms are based on the idea of generating controlled drift in such a way as to obtain the desired quality level, while the fourth algorithms employs scalable coding. All four algorithms are designed so as to provide a high degree of format compliancy with H.264. We provide experimental results on several video sequences, as well as security analysis, showing that the proposed algorithms provide an effective framework to perform conditional access, with a small rate overhead with respect to an unprotected reference video, and with a high level of security.

[1]  Ian H. Witten,et al.  Arithmetic coding revisited , 1998, TOIS.

[2]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[3]  Touradj Ebrahimi,et al.  Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.

[4]  Marc Van Droogenbroeck,et al.  Techniques for a selective encryption of uncompressed and compressed images , 2002 .

[5]  Jean-Luc Dugelay,et al.  A scrambling method based on disturbance of motion vector , 2002, MULTIMEDIA '02.

[6]  Mohan S. Kankanhalli,et al.  Compressed-domain scrambler/descrambler for digital video , 2002, IEEE Trans. Consumer Electron..

[7]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[8]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[9]  F. Mora,et al.  Perceptual cryptography of JPEG compressed images on the JFIF bit-stream domain , 2003, 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE..

[10]  John G. Apostolopoulos,et al.  Secure scalable streaming and secure transcoding with JPEG-2000 , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[11]  Ci Wang,et al.  A DCT-based MPEG-2 transparent scrambling algorithm , 2003, IEEE Trans. Consumer Electron..

[12]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[13]  Shiguo Lian,et al.  Perceptual cryptography on SPIHT compressed images or videos , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[14]  Robert H. Deng,et al.  Compliant encryption of JPEG2000 codestreams , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[15]  Shiguo Lian,et al.  Perceptual cryptography on JPEG2000 compressed images or videos , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[16]  Enrico Magli,et al.  Selective encryption of JPEG 2000 images by means of randomized arithmetic coding , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[17]  Jinsheng Sun,et al.  Perceptual cryptography on MPEG compressed videos , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[18]  Shipeng Li,et al.  Scalable protection for MPEG-4 fine granularity scalability , 2005, IEEE Transactions on Multimedia.

[19]  Cyril Bergeron,et al.  Complaint Selective encryption for H.264/AVC video streams , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[20]  Shipeng Li,et al.  JPEG 2000 syntax-compliant encryption preserving full scalability , 2005, IEEE International Conference on Image Processing 2005.

[21]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[22]  Amir Said Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.

[23]  A. Uhl,et al.  Security Enhancement for Lightweight JPEG 2000 Transparent Encryption , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[24]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[25]  Enrico Magli,et al.  Conditional Access to H.264/AVC Video with Drift Control , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[26]  H. Schwarz,et al.  Overview of the Scalable H.264/MPEG4-AVC Extension , 2006, 2006 International Conference on Image Processing.

[27]  Andreas Uhl,et al.  Secret Wavelet Packet Decompositions for Jpeg 2000 Lightweight Encryption , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[28]  Hyungjin Kim,et al.  Binary arithmetic coding with key-based interval splitting , 2006, IEEE Signal Processing Letters.

[29]  Xiaoyu Ruan,et al.  A New Source Coding Scheme with Small Expected Length and Its Application to Simple Data Encryption , 2006, IEEE Transactions on Computers.

[30]  Ranjan Bose,et al.  A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[31]  Shiguo Lian,et al.  Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..

[32]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[33]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[34]  Hyungjin Kim,et al.  Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.

[35]  Bharat K. Bhargava,et al.  On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.