Skip to main content

A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos

  • Conference paper
Image Analysis and Recognition (ICIAR 2006)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 4141))

Included in the following conference series:

Abstract

In this work we present and analyze a conceptually novel encryption method for digital videos. This type of encryption has several advantages over currently available video encryption algorithms. We analyze both security and performance aspects of our method, and show that the method is efficient and secure from a cryptographic point of view. Even though the approach is currently feasible only for a selected class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmission. In: Proc. IEEE Symposium on Network and Distributed System Security (SNDSS 1996), San Diego, CA, February 22-23, pp. 137–144. IEEE Computer Society, Los Alamitos (1996)

    Chapter  Google Scholar 

  2. Chan, C.-K., Chan, C.-K., Lee, L.-P., Cheng, L.M.: Encryption System Based On Neural Network. In: Communications and Multimedia Security Issuses of the New Century, pp. 117–122. Kluwer Academic Publishers, Boston (2001)

    Google Scholar 

  3. Furht, B., Muharemagic, E.A., Socek, D.: Multimedia Security: Encryption and Watermarking, Multimedia Systems and Applications, vol. 28. Springer, Heidelberg (2005)

    Google Scholar 

  4. Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic Encryption Scheme for Real-Time Digital Video. In: Real-Time Imaging VI, Proc. SPIE, vol. 4666, pp. 149–160 (2002)

    Google Scholar 

  5. Li, S., Chen, G., Zheng, X.: Multimedia Security Handbook. In: Furht, B., Kirovski, D. (eds.) Chaos-Based Encryption for Digital Images and Videos. Internet and Communications Series, ch. 4. CRC Press, Boca Raton (2004)

    Google Scholar 

  6. Li, S., Li, C., Chen, G., Bourbakis, N.G.: A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms, IACR’s Cryptology ePrint Archive: Report 2004/374 (2004)

    Google Scholar 

  7. Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, November 17-19 (2003)

    Google Scholar 

  8. Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1 Video, Project Description of SECMPEG, Technical University of Berlin, Germany (May 1995), http://www.gadegast.de/frank/doc/secmeng.pdf

  9. Mihaljević, M.J., Kohno, R.: Cryptanalysis of Fast Encryption Algorithm for Multimedia FEA-M. IEEE Trans. Comm. Letters 6(9), 382–384 (2002)

    Article  Google Scholar 

  10. Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proc. First International Conference on Imaging Science, Systems and Technology (CISST 1997), Las Vegas, NV, June 30-July 3, pp. 21–29 (1997)

    Google Scholar 

  11. Qiao, L., Nahrstedt, K., Tam, M.-C.: Is MPEG Encryption by Using Random List Instead of Zigzag Order Secure? In: Proc. IEEE Intl. Symposium on Consumer Electronics, Singapore, pp. 226–229. IEEE Comp. Soc., Los Alamitos (1997)

    Google Scholar 

  12. Seidel, T.E., Socek, D., Sramka, M.: Cryptanalysis of Video Encryption Algorithms, vol. 29, pp. 1–9. Tatra Mountains Mathematical Publications (2004)

    Google Scholar 

  13. Bhargava, B., Shi, C., Wang, S.-Y.: MPEG Video Encryption Algorithms. Multimedia Tools and Applications 24(1), 57–79 (2004)

    Article  Google Scholar 

  14. Socek, D., Culibrk, D.: On the Security of a Clipped Hopfield Neural Network Cryptosystem. In: Proc. of the ACM Multimedia and Security Workshop (ACM-MM-Sec 2005), New York City, NY, August 1-2, pp. 71–75 (2005)

    Google Scholar 

  15. Spanos, G.A., Maples, T.B.: Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications. In: Proc. IEEE 15th Intl. Phoenix Conf. on Computers and Communications, Scottsdale, AZ, March 27-29, pp. 72–78 (1996)

    Google Scholar 

  16. Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proc. Fourth ACM International Multimedia Conference, Boston, MA, November 18-22, pp. 219–230 (1996)

    Google Scholar 

  17. Yi, X., Tan, C.H., Siew, C.K., Syed, M.R.: Fast Encryption for Multimedia. IEEE Trans. Consumer Eletronics 47(1), 101–107 (2001)

    Article  Google Scholar 

  18. Youssef, A.M., Tavares, S.E.: Comments on the Security of Fast Encryption Algorithm for Multimedia (FEA-M). IEEE Trans. Consumer Eletronics 49(1), 168–170 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Socek, D., Kalva, H., Magliveras, S.S., Marques, O., Ćulibrk, D., Furht, B. (2006). A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos. In: Campilho, A., Kamel, M.S. (eds) Image Analysis and Recognition. ICIAR 2006. Lecture Notes in Computer Science, vol 4141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11867586_51

Download citation

  • DOI: https://doi.org/10.1007/11867586_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44891-4

  • Online ISBN: 978-3-540-44893-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics