Open Access Open Access  Restricted Access Subscription or Fee Access

Perceptual Attack Resistance Selective Encryption after Video Compression H.264/AVC for Real Time Applications

Jay M. Joshi, Upena D. Dalal

Abstract


Selective encryption is a technique to save computational complexity or enable new system functionality by only encrypting a portion of a compressed bitstream of H.264/AVC. Selective encryptions are used for real time video streaming applications like, video conferencing, Live TV etc. The applications also need the perceptual encryption. During AVC encoding, such sensitive data as NZs in CAVLC, intra-prediction slice and motion vector are encrypted with the use of standard AES algorithm. This encryption scheme keeps secure against brute-force attack or any other classical attacks, combines encryption process with compression process with low cost, and keeps the file format unchanged (video codec compliance) with some direct operations (such as displaying, time seeking, copying, cutting, etc. means data operability). Many perceptual encryptions provide the lower encryption time, which are more suitable for real time applications. However, it cannot provide perception security. It is easy for cryptanalyst to reconstruct the video by applying perceptual attack and get better quality video without using key. This paper summarizes the result of these methods and proposed the better encryption method to resist the perceptual attack. All simulations are carried out in Intel Core i5 processor having 2.4GHz frequency, 4GB RAM with 64-bit window 7 operating system.

Keywords


AES, CAVLC, ISMACryp, Motion Vectors.

Full Text:

PDF

References


FIPS PUBS 197, Advanced Encryption Standard, 2001.

Jay Joshi and Upena Dalal,”Enhancing selective ISMACryp video encryption for real time applications in handheld devices”, IEEE Int. Conf. TENCON 2011, Bali, Indonesia, Nov, 2011, pp. 663–667.

Wang Li-feng, Wang Wen-dong, MA Jian, XIAO Chen and WANG Kong-qiao, “Perceptual video encryption scheme for mobile application based on H.264”, The Journal of China Universities of Posts and Telecommunications: Science Direct, 15(Suppl.): pp 73–78, September 2008.

ISMA Encryption and Authentication, Version 1.1; AREA / Task Force: DRM, September 2006.

ISMA Encryption and Authentication Version 2.0; External Proposed Specification ; AREA / Task Force: DRM, November 2007

ITU-T, “Advanced video coding for generic audiovisual services,” ITU-T Rec. H.264; v11: March. 2009.

Myounghoon Kim, Hoonjae Lee, and Sanghoon Sull, “Spatial Error Concealment for H.264 Using Sequential Directional Interpolation”, IEEE Transactions on Consumer Electronics, Vol. 54, No. 4, p 1811-1818, November 2008.

Wu C-P, Kuo C-CJ, “Design of integrated multimedia compression and encryption systems”, IEEE Transactions on Multimedia, October 2005; 7(5):828–839.

Z. Shahid, M. Chaumont and W. Puech, “Fast Protection of H.264/AVC by Selective Encryption”, WSPC – Proceedings : Singaporean-French IPAL Symposium, SinFra 2009, Fusionopolis, September 2009.

Jakimoski G, Subbalakshmi KP, “Cryptanalysis of some multimedia encryption schemes”, IEEE Transactions on Multimedia, 2008; 10(3):330–338

Qiao L, Nahrstedt K. “Is MPEG encryption by using random list instead of zigzag order secure?” IEEE international symposium on consumer electronics, Singapore, Dec. 1997. p. 226–229.

Shi C, Bhargava B, “A fast MPEG video encryption algorithm” In: Proceedings of 6th ACM international conference on multimedia; 1998. p. 81–88.

Shi C, Bhargava B, “An efficient MPEG video encryption algorithm” In: Proceedings of IEEE symposium on reliable distributed systems; 1998. p. 381–386.

Wu C-P, Kuo C-CJ, “Design of integrated multimedia compression and encryption systems”, IEEE Transactions on Multimedia, October 2005; 7(5):828–839.

Jakimoski G, Subbalakshmi KP, “Cryptanalysis of some multimedia encryption schemes”, IEEE Transactions on Multimedia, 2008; 10(3):330–338.

Zhang Qian, Wu Jin-mu, Zhao Hai-xia, “Efficiency Video Encryption Scheme Based on H.264 Coding Standard and Permutation Code Algorithm”, 2009 World Congress on Computer Science and Information Engineering, IEEE Computer Society, p 674-678.

Niansheng Mao, Li Zhuo, Xiaoguang Li, Jing Zhang, “A Video Encryption Algorithm in H.264 Compressed Domain for Resource-Limited Systems”, Proceeding of International Journal of Intelligent Information Processing, Volume 2, Number 1: 83-92, March 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.