Skip to main content
Log in

A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital Rights Management (DRM) of videos is an important issue nowadays. Considering that H.264/AVC videos will be widely used in various applications, we propose a practical design, which combines the methodologies of selective encryption and fingerprinting, for effective DRM of H.264/AVC streaming videos. A selective encryption scheme is first presented to scramble the video content by encrypting a small amount of data in the compressed bit-stream. The scrambled video is H.264-compliant to reduce the complexity of decoder since it can still be played without triggering errors in the decoding process. A fingerprinting scheme is then introduced to provide further protection. We extract a reasonable amount of data from the video and embed the watermark acting as the fingerprint of the video recipient. To acquire the high-quality video for viewing, the user has to decrypt the video obtained from a video server and then combine it with the watermarked data provided from a user information server. The resulting viewable video is thus fingerprinted to deter the user from illegally redistributing the content. Experimental results will demonstrate the feasibility of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Anderson R, Manifavas C (1997) Chamleon: a new kind of stream cipher. In: Lecture notes in computer science, fast software encryption, pp 107–113

  2. Bergeron C, Lamy-Bergot C (2005) Compliant selective encryption for H.264/AVC video streams. In: IEEE 7th workshop on multimedia signal processing, Shanghai, China, pp 1–4

  3. Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  4. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673–1687

    Article  Google Scholar 

  5. Jeon B, Ahn J, Shim H, Choi I (2004) Digital video scrambling method using intra prediction mode. Lect Notes Comput Sci 3333:386–393

    Article  Google Scholar 

  6. Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG (2003) Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264 | ISO/IEC 14496-10 AVC). ITU-T, Doc. JVT-G050r1

  7. Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92(6):918–932

    Article  Google Scholar 

  8. Lemma A, Katzenbeisser S, Celik M, van der Veen M (2006) Secure watermark embedding through partial encryption. In: International workshop on digital watermarking, Jeju Island, Korea, pp 433–445

  9. Lian S, Liu Z, Ren Z (2005) Selective video encryption based on advanced video coding. In: Pacific-rim conference on multimedia (PCM), Jeju Island, Korea, pp 281–290

  10. Lian S, Liu Z, Ren Z, Wang H (2006) Secure distribution scheme for compressed data streams. In: IEEE conference on image processing, ICIP, Atlanta, GA, pp 1953–1956

  11. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774–778

    Article  Google Scholar 

  12. Mian C, Jia J, Lei Y (2007) An H.264 video encryption algorithm based on entropy coding. In: The third international conference on intelligent information hiding and multimedia signal processing, IIHMSP, Kaohsiung, Taiwan, vol 2, pp 41–44

  13. Park S-W, Shin S-U (2008) Efficient selective encryption scheme for the H.264/scalable video coding(SVC). In: The fourth international conference on networked computing and advanced information management, Gyeongju, Korea, vol 1, pp 371–376

  14. Parnes P, Parviainen R (2001) Large scale distributed watermarking of multicast media through encryption. In: IFIP international conference on communications and multimedia security issues of the new century, pp 17–20

  15. Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In: 6th ACM international multimedia conference, Bristol, UK, pp 81–88

  16. Shi T, King B, Salama P (2006) Selective encryption for H.264/AVC video coding. In: Proceedings of the SPIE, security, steganography, and watermarking of multimedia contents VIII, San Jose, CA, pp 461–469

  17. Spinsante S, Chiaraluce F, Gambi E (2005) Masking video information by partial encryption of H.264/AVC coding parameters. In: The 13th European signal processing conference, Antalya, Turkey

  18. Tang L (1996) Methods for encrypting and decrypting MPEG video data efficiently. In: Fourth ACM international multimedia conference (ACM) multimedia, Boston, MA, pp 219–230

  19. Wang J, Fan Y, Ikenaga T, Goto S (2007) A partial scramble scheme for H.264 video. In: The 7th international conference on ASIC (ASICON), Guilin, China, pp 802–805

  20. Yen J-C, Guo J-I (1999) A new MPEG encryption system and its VLSI architecture. In: IEEE workshop on signal processing systems, Taipei, Taiwan, pp 430–437

Download references

Acknowledgement

This research was supported by the National Science Council in Taiwan, R.O.C., under Grants NSC96-2221-E-008-098- and NSC97-2752-E-008-001-PAE.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Po-Chyi Su.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Su, PC., Hsu, CW. & Wu, CY. A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting. Multimed Tools Appl 52, 529–549 (2011). https://doi.org/10.1007/s11042-009-0458-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-009-0458-6

Keywords

Navigation