Abstract
This paper proposes a selective encryption (SE) algorithm for the almost recently video compressing technique that is called High-Efficiency Video Coding (HEVC). The improvement of our HEVC SE algorithm is to secure real-time HEVC streaming using low computational overhead, same bit rate and ensuring the video format compliance. This contribution is achieved with low computational RC6 algorithm to encrypt subset of binstrings that is binarized using the bypass binary arithmetic coding mode in the context adaptive binary arithmetic coding (CABAC) process of HEVC. This binstrings subset is the non-zero discrete cosine transform (DCT) coefficients sign bits, motion vector difference (MVD) sign bits, remaining absolute values suffix of DCT, MVD absolute values suffix, Sample adaptive offset (SAO) sign bit, residual size, reference picture index and the delta Quantization Parameter (QP). Also, this paper investigates the performance evaluation of using the RC6 with its operation modes within the proposed HEVC CABAC SE. This investigation is done for choosing the best operation mode for RC6 to be suitable for being used in the HEVC real-time application. The security analysis like histogram analysis, correlation coefficients test and key sensitivity test are presented to make sure the protection of HEVC CABAC SE algorithm against brute force and statistical attacks. The performance analysis results prove that the HEVC CABAC SE is highly secure and can be used in real-time HEVC applications.
Similar content being viewed by others
References
Abdallah EE, Hamza AB, Bhattacharya P (2007) MPEG Video Watermarking using tensor singular value decomposition. In: Kamel M, Campilho A (eds) Image analysis and recognition. ICIAR 2007. Lecture Notes in Computer Science, vol 4633. Springer, Berlin
Ahmad J, Ahmed F (2012) Efficiency Analysis and Security Evaluation of Image Encryption Schemes. Proceedings of International Journal of Video & Image Processing and Network Security 12(04):18–31
Ahmed H, Kalash HM, Farag Allah OS (2007) An efficient Chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Proceedings of Informatica 31(1):121–129
Bjøntegaard G (2001) Calculation of average PSNR differences between RDcurves, Technical Report VCEG-M33, ITU-T SG16/Q6, Austin, Texas, USA
Bross B, Han W, Ohm J, Sullivan G, Wiegand T (2012) High efficiency video coding (HEVC) text specification draft 8. JCTVC-J1003, joint collaborative team on video coding of ITU-T SG16 WP3 and ISO/IEC JTC1/SC29/WG11, 10th meeting. Stockholm
Chen X, Huang X, Li J, Ma J, Lou W, Wong D (2015) New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations. IEEE Transactions on Information and Forensics Security 10(1):69–78
Elsheh E, Hamza B (2011) Secret Sharing Approaches for 3D Object Encryption. Journal of Expert Systems with Applications 38(11):13906–13911
Fraunhofer Heinrich Hertz Institute. (2015) High Efficiency Video Coding: HEVC software repository [Online]. Available: https://hevc.hhi.fraunhofer.de
Hofbauer H, Uhl A, Unterweger A (2014) Transparent encryption for HEVC using bit-stream-based selective coefficient sign encryption. In: Proceedings of IEEE international conference on acoustics, speech and signal processing (ICASSP), Florence, pp 1986–1990
Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the Protection for Data Security under Selective Opening Attacks. J Inf Sci 412-413:223–241
Jolfaei A, Mirghadri A (2010) A New Approach to Measure Quality of Image Encryption. Proceedings of International Journal of Computer and Network Security 2(8):38–43
Kaur A, Kaur L, Gupta S (2012) Image recognition using coefficient of correlation and structural SIMilarity index in uncontrolled environment. Proceedings of International Journal of Computer Applications 59(5):32–39
Li J, Huang X, Li J, Chen X, Yang X (2014) Securely outsourcing attribute-based encryption with Checkability. IEEE Transactions on Parallel and Distributed Systems 25(8):2201–2210
Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced Revocaion in cloud computing. IEEE Trans Comput 64(2):425–437
Li J, Yu C, Gupta B et al (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561. https://doi.org/10.1007/s11042-017-4452-0
Liu F, Koenig H (2010) A Survey of Video Encryption Algorithms. Journal of Computers & Security 19(1):3–15
MSU Graphics and Media Lab, Video Group (2016) MSU codecs. www.compression.ru/video/, Access Date: 1/6/2016
Rivest R, Robshaw M, Sidney R, Yin Y (1998) The RC6 Block Cipher: A Simple Fast Secure AES Proposal. M.I.T Laboratory for Computer Science, RSA Laboratories, USA. Available at: http://csrc.nist.gov/CryptoToolkit/aes/round1/conf1/rc6-slides.pdf
Shahid Z, Puech W (2014) Visual protection of HEVC video by selective encryption of CABAC Binstrings. IEEE Transactions on Multimedia 16(1):24–36
Tew Y, Wong K (2014) An Overview of Information Hiding in H.264/AVC Compressed Video. IEEE Transactions on Circuits and Systems for Video Technology 24(2):305–319
Tew Y, Minemura K, Wong K (2015) HEVC selective encryption using transform skip signal and sign bin. In: Asia-pacific signal and information processing association annual summit and conference (APSIPA), Hong Kong, pp 963–970
Wallendael G, Boho A, Cock J, Munteanu A, Walle R (August 2013) Encryption for high efficiency video coding with video adaptation capabilities. Proceedings of IEEE Trans Consum Electron 59(3):634–642
Yu C, Li J, Li X et al (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608. https://doi.org/10.1007/s11042-017-4637-6
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sallam, A.I., El-Rabaie, ES.M. & Faragallah, O.S. CABAC-based selective encryption for HEVC using RC6 in different operation modes. Multimed Tools Appl 77, 28395–28416 (2018). https://doi.org/10.1007/s11042-018-5994-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5994-5