Skip to main content
Log in

Sufficient encryption based on entropy coding syntax elements of H.264/SVC

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

While much attention has been paid to securing the transmission of single-layer video, multi-layer scalable video also deserves consideration. This paper presents a sufficient encryption (SE) scheme for the H.264 Scalable Video Coding (SVC) extension that maintains the compression efficiency and the decoder format compliancy of the bit-stream, without compromising its confidentiality. SE is achieved by applying encryption of carefully selected codewords or bin-strings of the Context-Adaptive Variable-Length Coding (CAVLC) and Context-Adaptive Binary Arithmetic Coding (CABAC) entropy coders respectively. The selection of exactly what to encrypt is what distinguishes this contribution from that of others. The performance of the scheme is tested on sequences with varying spatial resolutions, thus demonstrating the advantages of the scheme when compared to alternative techniques. These advantages include: minimal computational delay by encrypting partial data; no bit-rate escalation by keeping the compression ratio unchanged; and format compliancy of the bit-stream at the decoder. The detailed security and comparative evaluation of the scheme confirms that it is suitable for commercial, real-time applications. As there is a minimal increase in processing requirements, the scheme is highly suitable for video distribution to users who have subscribed to differing video qualities on end systems ranging from small handheld devices to those capable of high spatial resolutions and frame rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Asghar MN, Ghanbari M, Reed M (2012) Sufficient encryption with codewords and bin-strings of H.264/SVC. In: Proceedings of the IEEE Int. Conf. on Trust, Security, and Privacy in Computing and Communications, Liverpool, UK, pp 443–450

  2. Algin GB, Tunoli ET (2011) Scalable video encryption of H.264 SVC codec. J Visual Communication Image Represent 22(4):353–364

    Article  Google Scholar 

  3. Arkko J, Carrara E, Lindholm F, Naslund M, Norrman K (2004) MIKEY: Multimedia internet keying. IETF RFC:38–30

  4. Asghar MN, Ghanbari M (2012) MIKEY for keys management of H.264 scalable video coded layers. J KSU-Comput Inf Sci 24(2):107–116

    Google Scholar 

  5. Asghar MN, Ghanbari M, Fleury M, Reed MJ (2012) Analysis of channel error upon selectively encrypted H.264 video. In: Proceedings of the Computer Science and Electronic Engineering Conf, Colchester, UK, pp 139–144

  6. Bergeron C, Lamy-Bergot C (2005) Compliant selective encryption for H.264/AVC video streams. In: Proceedings of the 7th IEEE Workshop on Multimedia Signal Processing, Shanghai, China, pp 1–4

  7. Berbain C, Billet O, Canteaut A, Courtois N, Debraize B, Gilbert H, Goubin L, Gouget A, Granboulan L, Uradoux C, Minier M, Pornin T, Sibert H (2006) DECIM v2, eSTREAM report 2006/004, http://www.ecrypt.eu.org/stream/papers.html

  8. Chen TC, Huang YW, Tsai CY, Hsieh BY, Chen LG (2006) Architecture design of context-based adaptive variable-length coding for H.264/AVC. IEEE Trans Circuits Syst II, Exp Briefs 53(9):832–836

    Article  Google Scholar 

  9. Dubois L, Puech W, Blanc-Talon J (2011) Smart selective encryption of CAVLC for H.264/SVC video. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Iguazu Falls, Brazil, pp 1–6

  10. Engel HD, Kutil R, Uhl A (2006) A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. In: Proceedings of the ACM Multimedia and Security Workshop, Geneva, Switzerland, pp 202–207

  11. Fehr G (2013) The price of secure mobile video streaming. In: Proceedings of the IEEE International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, pp 126–131

  12. Fan Y, Wang J, Ikenaga T, Tsunoo Y, toto S (2008) An unequal secure encryption scheme for H.264/AVC video compression standard. IEICE Trans Fundam Electron Commun Comput Sci 91(1):12–21

    Article  Google Scholar 

  13. Fan Y, Wang J, Ikenaga T, Tsunoo Y, Goto S (2007) A new video encryption scheme for H.264/AVC. Adv Multimedia Inf Process LNCS 4810:246–255

    Google Scholar 

  14. Federal (2001) Information processing standards publication 197, November 26, 2001-ADVANCED ENCRYPTION STANDARD (AES), available from http://csrc.nist.gov/publicitions/fips/fips197/fips-197.pdf

  15. Ghanbari M (2011) Standard codecs: Image compression to advanced video coding, 3rd ed. IET Press, London, UK

    Book  Google Scholar 

  16. Huynh-Thu Q, Ghanbari M (2012) The accuracy of PSNR in predictive video quality for different scenes and frame rates. Telecommun Syst 49(1):35–48

    Article  Google Scholar 

  17. Kim Y, Jin SH, Bae TM, Ro YM (2007) A selective video encryption for the region of interest in scalable video coding. IEEE Region 10 Conference, pp. 14, Taipei, Taiwan

  18. Kuchar M (2000) Dispelling the myths of cryptography. Database Netw J 30(2):1–3

    Google Scholar 

  19. Lee H-J, Nam J (2006) Low complexity controllable scrambler/descrambIer for H.264/AVC in compressed domain. In: Proceedings of the 14th Annual ACM International Conference on Multimedia, Santa Barbara, CA, USA, pp 93–96

  20. Li C, Zhou X, Zong Y (2008) NAL level encryption for scalable video coding. In: Proceedings of the 9th Pacific Rim Conference on Multimedia, Tainan, Taiwan, pp 496–505

  21. Li C, Zhou X, Zong Y (2009) Layered encryption for scalable video coding. In: Proceedings of the IEEE International Congress on Image and Signal Proc, Tianjin, China, pp 1–4

  22. Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 15(7):2061–2075

    Article  Google Scholar 

  23. Magli E, Grangetto M, Olmo G (2007) Joint source, channel coding, and secrecy. EURASIP J. on Information Security, Article ID 79048, 7 pages

  24. Magli E, Grangetto M, Olmo G (2011) Transparent encryption techniques for H.264/AVC and H.264/SVC compressed video. J Signal Proc 91(5):1103–1114

    Article  Google Scholar 

  25. Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard. IEEE Trans Circuits Syst Video Technol 13(7):620–636

    Article  Google Scholar 

  26. Morelos-Zaragoza (2006) The art of error correcting codes, 3rd edn. Wiley, Chichester, UK

    Book  Google Scholar 

  27. Neji N, Jridi M, Alfalou A, Masmoudi N (2013) Evaluation and implementation of simultaneous binary arithmetic coder and encryption for HD H.264/AVC codec. In: Proceedings of the International Multi-Conference on Systems, Signals & Devices, Hammamet, Tunisia, pp 1–4

  28. National (2013) Institute of Standards and Technology (NIST) fact sheet about AES: http://web.fe.up.pt/jmcruz/etc/segur/aesfact.html (Accessed 24 Oct 2013)

  29. Park SW, Shin SU (2009) An efficient encryption and key management scheme for layered access control of H.264/Scalable Video Coding. IEICE Trans Inf Syst 92(5):851–858

    Article  MathSciNet  Google Scholar 

  30. Phande A, Mohapatra M, Zambreno J (2013) Securing multimedia content using joint compression and encryption. IEEE Multimed 20(4):50–61

    Article  Google Scholar 

  31. Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans Circuits Syst Video Technol 17(9):1103–1120

    Article  Google Scholar 

  32. Stütz T, Uhl A (2012) A survey of H.264 AVC/SVC encryption. IEEE Trans Circuits Syst. Video Technol 23(3):325–329

    Article  Google Scholar 

  33. Shahid Z, Chaumont M, Puech W (2009) Fast protection of H.264/AVC by selective encryption. In: Proceedings of the Singaporean-French IPAL Symposium. Fusionopolis, Singapore, pp 18–20

  34. Shahid Z, Chaumont M, Puech W (2011) Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I & P frames. IEEE Trans Circuits Syst Video Technol 21(5):565–576

    Article  Google Scholar 

  35. Sohn H, Anzaku ET, De Neve D, Ro YM, Plataniotis KN (2009) Privacy protection in video surveillance systems using scalable video coding. In: Proceedings of the IEEE Int. Conf. Adv. Video Signal Based Surveillance, Genoa, Italy, pp 424–429

  36. Sullivan GJ, Ohm J-R, Han W-J, Wiegand T (2012) Overview of the high efficiency video coding standard. IEEE Trans Circ Syst Video Coding Technolog 22(12):1649–1668

    Article  Google Scholar 

  37. Shahid Z, Puech W (2014) Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans Multimed 16(1):24–36

    Article  Google Scholar 

  38. Sullivan G, Topiwala P, Luthra A (2004) The H.264/AVC Advanced video coding standard: Overview and introduction to the fidelity range extensions. In: Proceedings of the SPIE Conference on Applications of Digital Image Processing XXVII, Denver, CO, USA, pp 454–474

  39. Teuhola J (1978) A compression method for clustered bit-vectors. Inf Proc Lett 7(6):308–311

    Article  MATH  Google Scholar 

  40. Wang D, Zhou Y, Zhao D, Mao J (2009) A partial video encryption scheme for mobile handheld devices with low power consideration. In: Proceedings of the International Conference on Multimedia Information Networking and Security, Hubei, China, pp 99–104

  41. Wang Z, Bovik AC, Sheikh HR, Simancelli EP (2004) Image quality assessment: From error measurement to structurol similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  42. Wang J, Fan Y, Ikenaga T, Goto S (2007) A partial scramble scheme for H.264 video. In: Proceedings of the International Conference on ASIC, Guilin, China, pp 802–805

  43. Wiegand T, Sullivan G, Sullivan J, Bjntegaard G, Luthra E (2003) Overview of the H. 264/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560–576

    Article  Google Scholar 

  44. Won YG, Bae TM, Ro YM (2006) Scalable protection and access control in full scalable video coding. In: Proceedings of the 5th International Workshop on Digital Watermarking. Jeju Island, S. Korea, pp 407–421

  45. Zheng B, Au Yeung S-K, Zhu S, Gabouj M (2014) Perceptul encryption of H.264 videos: Embedding sign flips into the integer-based transforms. IEEE Trans Info Forensics Secur 9(2):309–320

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Fleury.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Asghar, M.N., Ghanbari, M., Fleury, M. et al. Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multimed Tools Appl 74, 10215–10241 (2015). https://doi.org/10.1007/s11042-014-2160-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2160-6

Keywords

Navigation