Skip to main content
Log in

New approaches to encryption and steganography for digital videos

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an extended classification of digital video encryption algorithms in order to clarify these advantages. We analyze both security and performance aspects of the proposed method, and show that the method is efficient and secure from a cryptographic point of view. Even though the method is currently feasible only for a certain class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability. Finally, we extend our approach into a novel type of digital video steganography where it is possible to disguise a given video with another video.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alattar, A.M., Al-Regib, G.I.: Evaluation of selective encryption techniques for secure transmission of mpeg video bit-streams. In: Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS ’99), 30 May–2 June 1999, Orlando, FL, USA, vol. 4, pp. 340–343. IEEE Computer Society

  2. Agi, I., Gong, L.: An empirical study of secure mpeg video transmission. In: Proceedings of the IEEE Symposium on Network and Distributed System Security (SNDSS ’96), 22–23 February 1996, San Diego, CA, USA, pp. 137–144. IEEE Computer Society

  3. Bhargava B., Shi C., Wang S.-Y. (2004). Mpeg video encryption algorithms. Multimed. Tools Appl. 24(1): 57–79

    Article  Google Scholar 

  4. Chan, C.-K., Chan, C.-K., Lee, L.-P., Cheng, L.-M.: Encryption system based on neural network. In: Proceedings of the IFIP TC6/TC11 5th Joint Working Conference on Communications and Multimedua Security (CMS ’01), Darmstadt, Germany, in Communications and Multimedia Security Issuses of the New Century pp. 117–122. Kluwer, Boston 21–22 May 2001

  5. Ćulibrk, D., Socek, D., Sramka, M.: Cryptanalysis of the block cipher based on the hopfield neural network. In: Proceedings of the Fifth Central European Conference on Cryptology (MoraviaCrypt ’05), 15–17 June 2005, Brno, Czech Republic, Tatra Mountains Mathematical Publications (2005, to appear)

  6. Eskicioglu, A.M.: Protecting intellectual property in digital multimedia networks. IEEE Computer, Special Issue on Piracy and Privacy (2003), 39–45

  7. Furht, B., Muharemagic, E.A., Socek, D.: Multimedia security: encryption and watermarking. Multimedia Systems and Applications, vol. 28, Springer, December 2005

  8. Furht, B., Socek, D., Eskicioglu, A.M.: Multimedia security handbook, Internet and Communications Series, vol. 4, chap. Fundamentals of Multimedia Encryption Techniques pp. 95–132. CRC Press (2004)

  9. Guo D., Cheng L.-M., Cheng L.L. (1999). A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intelli. 10: 71–84

    Article  Google Scholar 

  10. Knuth, D.E.: The art of computer programming, 2nd edn., vol. 3: Sorting and Searching, pp. 113–122. Addison–Wesley, Reading, MA (1998)

  11. Li, S., Chen, G., Zheng, X.: Multimedia security handbook. Internet and Communications Series, vol. 4, chap. Chaos-Based Encryption for Digital Images and Videos, pp. 133–167. CRC Press, West Palm Beach (2004)

  12. Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: Proceedings of the Second IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), pp. 527–533. Scottsdale, AZ, USA, IASTED, 17–19 November 2003

  13. Li, S., Lo, K.-T.: Security problems with improper implementations of improved fea-m. J. Syst. Softw. (2006). http://dx.doi.org/10.1016/j.jss.2006.05.002

  14. Li, S., Li, C., Chen, G., Bourbakis, N.G.: A general cryptanalysis of permutation-only multimedia encryption algorithms, IACR’s Cryptology ePrint Archive: Report 2004/374, 2004

  15. Lookabaugh, T.D., Sicker, D.C., Keaton, D.M., Guo, W.Y., Vedula, I.: Security analysis of selectively encrypted mpeg-2 streams. Multimedia Systems and Applications VI, Proceedings of SPIE, Orlando, FL, USA, vol. 5241 pp. 10–21. SPIE Publishers, September 7–11 2003

  16. Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, Proceedings of SPIE, vol. 4666, pp. 149–160. SPIE Publishers (2002)

  17. Meyer, J., Gadegast, F.: Security mechanisms for multimedia data with the example mpeg-1 video, Project description of SECMPEG, Technical University of Berlin. http://www.gadegast.de/frank/doc/secmeng.pdf

  18. Mihaljević M.J. (2003). On vulnerabilities and improvements of fast encryption algorithm for multimedia fea-m. IEEE Trans. Consum. Eletron. 49(4): 1199–1207

    Article  Google Scholar 

  19. Mihaljević M.J., Kohno R. (2002). Cryptanalysis of fast encryption algorithm for multimedia fea-m. IEEE Commun. Lett. 6(9): 382–384

    Article  Google Scholar 

  20. Qiao, L., Nahrstedt, K.: A new algorithm for mpeg video encryption. In: Proceedings of the First International Conference on Imaging Science, Systems and Technology (CISST ’97), pp. 21–29. Las Vegas CSREA Press, 30 June–3 July 1997

  21. Qiao, L., Nahrstedt, K., Tam, M.-C.: Is mpeg encryption by using random list instead of zigzag order secure? In: Proceedings of the IEEE International Symposium on Consumer Electronics pp. 226–229 2–4 December 1997. IEEE Computer Society, Singapore

  22. Shi, C., Bhargava, B.: A fast mpeg video encryption algorithm. In: Proceedings of the Sixth ACM International Multimedia Conference, Bristol, UK, ACM Electronic Proceedings, 12–16 September 1998. http://turing.acm.org/sigs/sigmm/MM98/electronic_proc eedings/shi/

  23. Socek, D., Ćulibrk, D.: On the security of a clipped hopfield neural network cryptosystem. In: Proceedings of the ACM Multimedia and Security Workshop (ACM-MM-Sec’05), pp. 71–75. ACM Press, New York City 2005, 1–2 August 2005

  24. Spanos, G.A., Maples, T.B.: Performance study of a selective encryption scheme for the security of networked, real-time video. In: Proceedings of the 4th International Conference on Computer Communications and networks (ICCCN ’95), pp. 2–10. IEEE Press, Las Vegas 20–23 September 1995

  25. Seidel T.E., Socek D., Sramka M. (2004). Cryptanalysis of video encryption algorithms. Tatra Mt. Math. Publ. 29: 1–9

    Google Scholar 

  26. Shi, C., Wang, S.-Y., Bhargava, B.: Mpeg video encryption in real-time using secret key cryptography. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’99), Las Vegas, NV, USA, vol. 6, pp. 2822–2828. CSREA Press, 28 June– 1 July 1999

  27. Tang, L.: Methods for encrypting and decrypting mpeg video data efficiently. In: Proceedings of the Fourth ACM International Multimedia Conference, pp. 219–230. Boston, ACM Press 18–22 November 1996

  28. Uhl, A., Pommer, A.: Image and video encryption: from digital rights management to secured personal communication. In: Advances in Information Security, vol. 15. Springer, New York (2005)

  29. Wu, H., Bao, F., Deng, R.H.: An efficient known plaintext attack on fea-m. In: Proceedings of the Fifth International Conference on Information and Communications Security (ICICS 2003), pp. 84–87. Huhehaote, China, vol. 2836. LNCS, Springer, Berlin, Germany 10–13 October 2003

  30. Youssef A.M., Tavares S.E. (2003). Comments on the security of fast encryption algorithm for multimedia (fea-m). IEEE Trans. Consum. Eletron. 49(1): 168–170

    Article  Google Scholar 

  31. Yi X., Tan C.H., Siew C.K., Syed M.R. (2001). Fast encryption for multimedia. IEEE Trans. Consumer Eletronics 47(1): 101–107

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Socek.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Socek, D., Kalva, H., Magliveras, S.S. et al. New approaches to encryption and steganography for digital videos. Multimedia Systems 13, 191–204 (2007). https://doi.org/10.1007/s00530-007-0083-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-007-0083-z

Keywords

Navigation