Skip to main content
Log in

CABAC-based selective encryption for HEVC using RC6 in different operation modes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a selective encryption (SE) algorithm for the almost recently video compressing technique that is called High-Efficiency Video Coding (HEVC). The improvement of our HEVC SE algorithm is to secure real-time HEVC streaming using low computational overhead, same bit rate and ensuring the video format compliance. This contribution is achieved with low computational RC6 algorithm to encrypt subset of binstrings that is binarized using the bypass binary arithmetic coding mode in the context adaptive binary arithmetic coding (CABAC) process of HEVC. This binstrings subset is the non-zero discrete cosine transform (DCT) coefficients sign bits, motion vector difference (MVD) sign bits, remaining absolute values suffix of DCT, MVD absolute values suffix, Sample adaptive offset (SAO) sign bit, residual size, reference picture index and the delta Quantization Parameter (QP). Also, this paper investigates the performance evaluation of using the RC6 with its operation modes within the proposed HEVC CABAC SE. This investigation is done for choosing the best operation mode for RC6 to be suitable for being used in the HEVC real-time application. The security analysis like histogram analysis, correlation coefficients test and key sensitivity test are presented to make sure the protection of HEVC CABAC SE algorithm against brute force and statistical attacks. The performance analysis results prove that the HEVC CABAC SE is highly secure and can be used in real-time HEVC applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abdallah EE, Hamza AB, Bhattacharya P (2007) MPEG Video Watermarking using tensor singular value decomposition. In: Kamel M, Campilho A (eds) Image analysis and recognition. ICIAR 2007. Lecture Notes in Computer Science, vol 4633. Springer, Berlin

  2. Ahmad J, Ahmed F (2012) Efficiency Analysis and Security Evaluation of Image Encryption Schemes. Proceedings of International Journal of Video & Image Processing and Network Security 12(04):18–31

    Google Scholar 

  3. Ahmed H, Kalash HM, Farag Allah OS (2007) An efficient Chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Proceedings of Informatica 31(1):121–129

    Google Scholar 

  4. Bjøntegaard G (2001) Calculation of average PSNR differences between RDcurves, Technical Report VCEG-M33, ITU-T SG16/Q6, Austin, Texas, USA

  5. Bross B, Han W, Ohm J, Sullivan G, Wiegand T (2012) High efficiency video coding (HEVC) text specification draft 8. JCTVC-J1003, joint collaborative team on video coding of ITU-T SG16 WP3 and ISO/IEC JTC1/SC29/WG11, 10th meeting. Stockholm

  6. Chen X, Huang X, Li J, Ma J, Lou W, Wong D (2015) New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations. IEEE Transactions on Information and Forensics Security 10(1):69–78

    Article  Google Scholar 

  7. Elsheh E, Hamza B (2011) Secret Sharing Approaches for 3D Object Encryption. Journal of Expert Systems with Applications 38(11):13906–13911

    Google Scholar 

  8. Fraunhofer Heinrich Hertz Institute. (2015) High Efficiency Video Coding: HEVC software repository [Online]. Available: https://hevc.hhi.fraunhofer.de

  9. Hofbauer H, Uhl A, Unterweger A (2014) Transparent encryption for HEVC using bit-stream-based selective coefficient sign encryption. In: Proceedings of IEEE international conference on acoustics, speech and signal processing (ICASSP), Florence, pp 1986–1990

  10. Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the Protection for Data Security under Selective Opening Attacks. J Inf Sci 412-413:223–241

    Article  Google Scholar 

  11. Jolfaei A, Mirghadri A (2010) A New Approach to Measure Quality of Image Encryption. Proceedings of International Journal of Computer and Network Security 2(8):38–43

    Google Scholar 

  12. Kaur A, Kaur L, Gupta S (2012) Image recognition using coefficient of correlation and structural SIMilarity index in uncontrolled environment. Proceedings of International Journal of Computer Applications 59(5):32–39

    Article  Google Scholar 

  13. Li J, Huang X, Li J, Chen X, Yang X (2014) Securely outsourcing attribute-based encryption with Checkability. IEEE Transactions on Parallel and Distributed Systems 25(8):2201–2210

    Article  Google Scholar 

  14. Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced Revocaion in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  Google Scholar 

  15. Li J, Yu C, Gupta B et al (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561. https://doi.org/10.1007/s11042-017-4452-0

    Article  Google Scholar 

  16. Liu F, Koenig H (2010) A Survey of Video Encryption Algorithms. Journal of Computers & Security 19(1):3–15

    Article  Google Scholar 

  17. MSU Graphics and Media Lab, Video Group (2016) MSU codecs. www.compression.ru/video/, Access Date: 1/6/2016

  18. Rivest R, Robshaw M, Sidney R, Yin Y (1998) The RC6 Block Cipher: A Simple Fast Secure AES Proposal. M.I.T Laboratory for Computer Science, RSA Laboratories, USA. Available at: http://csrc.nist.gov/CryptoToolkit/aes/round1/conf1/rc6-slides.pdf

  19. Shahid Z, Puech W (2014) Visual protection of HEVC video by selective encryption of CABAC Binstrings. IEEE Transactions on Multimedia 16(1):24–36

    Article  Google Scholar 

  20. Tew Y, Wong K (2014) An Overview of Information Hiding in H.264/AVC Compressed Video. IEEE Transactions on Circuits and Systems for Video Technology 24(2):305–319

    Article  Google Scholar 

  21. Tew Y, Minemura K, Wong K (2015) HEVC selective encryption using transform skip signal and sign bin. In: Asia-pacific signal and information processing association annual summit and conference (APSIPA), Hong Kong, pp 963–970

  22. Wallendael G, Boho A, Cock J, Munteanu A, Walle R (August 2013) Encryption for high efficiency video coding with video adaptation capabilities. Proceedings of IEEE Trans Consum Electron 59(3):634–642

    Article  Google Scholar 

  23. Yu C, Li J, Li X et al (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608. https://doi.org/10.1007/s11042-017-4637-6

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama S. Faragallah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sallam, A.I., El-Rabaie, ES.M. & Faragallah, O.S. CABAC-based selective encryption for HEVC using RC6 in different operation modes. Multimed Tools Appl 77, 28395–28416 (2018). https://doi.org/10.1007/s11042-018-5994-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5994-5

Keywords

Navigation