Skip to main content
Log in

Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The newly standardized H.264/SVC enable multimedia suppliers to provide video bitstream with temporal, spatial and quality scalabilities to meet various needs of end users. Its bitstream scalability characteristic is also especially suitable for multimedia applications under merged heterogeneous networks with different network protocols, capacities and throughputs. Although the network environment, to some extent, provides security protection against the illegal users, it is not enough to protect against the authorized users from digesting contents beyond its authorization. Hence the issue of content protection for the H.264/SVC has aroused researchers’ interests in recent years. In this paper, we present an efficient bitstream-oriented protection scheme for the H.264/SVC in a compression friendly and format compliant manner. The encryption is implemented on the Network Abstraction Layer (NAL) unit level. To improve the computational efficiency as well as to provide sufficient security, selective cryptographic algorithms with different computation cost are employed for different content level of SVC according to its significance. The I slice NAL units from the base layer of SVC bitstream are encrypted with the symmetric AES algorithm in Cipher Block Chaining mode. And the other NAL units are protected by simplified XOR cipher. Furthermore, a robust key management (key generation and distribution) mechanism is also discussed in this paper. The security analysis and simulation results further verify that the proposed methods can effectively protect the H.264/SVC bitstream at low computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Schwarz, H., Marpe, D., & Wiegand, T. (2007). Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Transactions on Circuits Systems for Video Technology, 17(9), 1103–1120.

    Article  Google Scholar 

  2. Sohn, H., AnzaKu, E. T., De Neve, W., Ro, Y. M., & Plataniotis, K. N. (2009). Privacy protection in video surveillance systems using scalable video coding. In Proceedings of the 6th IEEE international conference advanced video and signal based surveillance (pp. 424–429).

  3. Liu, Y., Zhang, S., Xu, S., & Zhang, Y. (2009). Research on H.264/SVC compressed video communication in 3G. In Proceedings of the 4th international conference computer science and education (pp. 327–332).

  4. Stutz, T., & Uhl, A. (2012). A survey of H.264 AVC/SVC encryption. IEEE Transactions on Circuits Systems for Video Technology, 22(3), 325–339.

    Article  Google Scholar 

  5. Su-Wan, P., Sang-Uk S. (2008). Efficient selective encryption scheme for the H.264/Scalable video coding (SVC). In Proceedings of IEEE 4th international conference network computing and advanced information management (pp. 371–376).

  6. Won, Y. G., Bae, T. M., & Ro, Y. M. (2006). Scalable protection and access control in full scalable video coding. In Proceedings of 5th International Workshop Digital Watermarking, volume 4283 of Lecture notes in Computer Science, Springer (pp. 407–421).

  7. Li, C., Yuan, C., & Zhong, Y. (2009). Layered encryption for scalable video coding. In Proceedings of 2nd CISP (pp. 1–4).

  8. Kim, Y., Jin, S. H., Bae, T. M., & Ro, Y. M., (2007). A selective video encryption for the region of interest in scalable video coding. In Proceedings of IEEE. TENCON Region 10 conference (pp. 1–4).

  9. Li, C. (2008). Multimedia forensics and security (pp. 351–352). Derry Township: IGI Publishing Hershey.

    Google Scholar 

  10. Li, C., Zhou, X., & Zhong, Y. (2008). NAL level encryption for scalable video coding. In Proceedings of 9th pacific rim conference multimedia: advances in multimedia information processing (pp. 496–505).

  11. Thomas St., Uhl., A. (2008). Format-compliant encryption of H.264/AVC and SVC. In Proceedings of 10th IEEE international symposium multimedia (pp. 446–451).

  12. Arachchi, H. K., Perramon, S., Dogan, S., & Kondoz, A. M. (2009). Adaptation-aware encryption of scalable H.264/AVC video for content security. Signal Processing: Image Communication, 24(6), 468–483.

    Google Scholar 

  13. FIPS PUB 197(2001). Advanced encryption standard (AES). National Institute of Standards and Technology, U.S. Department of Commerce. [Online]. Available:http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.

  14. Wang, J. (2009). Computer network security: theory and practice. Higher Education Press (pp. 71–72), Beijing and Springer-Verlag GmbH Berlin Heidelberg.

  15. Pachghare, V. K. (2009). Cryptography and information security. PHI learning.

  16. Shahid, Z., Chaumont, M., & Puech, W. (2011). Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Transactions on Circuits Systems for Video Technology, 21(5), 565–576.

    Article  Google Scholar 

  17. Wei, Z., Wu, Y., Ding, X., & Deng, R. (2012). A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Signal Processing: Image Communication, 27(9), 1011–1024.

    Google Scholar 

Download references

Acknowledgements

This work was supported by the Young Scholars Development Fund of SWPU (Nos. 201,699,010,009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ting Ma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, T., Ma, M., Lee, Y.H. et al. Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC). Wireless Pers Commun 97, 5115–5135 (2017). https://doi.org/10.1007/s11277-017-4771-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4771-5

Keywords

Navigation