Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
1996, sndss
…
8 pages
1 file
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision as specified in the standard. W e conducted an experimental study of previously proposed selective encryption schemes for MPEG video security. This study showed that these methods are inadequate for sensitive applications. W e discuss the tradeoffs between levels of security and computational and compression eficiency. commonly available software and hardware encryption mechanisms often cannot encrypt entire MPEG streams without severely degrading performance and quality of service. In this paper, we examine previously proposed selective encryption schemes for secure MPEG transmission. We find that these selective encryption schemes offers a limited level of security, especially for sensitive applications. For example, certain objects in the scene are clearly visible even if the video sequence is "encrypted". We suggest improvements to such schemes, evaluate their security, and discuss tradeoffs in higher encoding complexity and lower compression rate.
1996
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision is specified in the standard. We conducted an experimental study of previously proposed selective encryption schemes for MPEG video security. This study showed that these methods are inadequate for sensitive applications. We discuss the tradeoffs between levels of security and computational and compression efficiency. 1 Introduction and Motivation MPEG (Moving Pictures Expert Group) is an industrial standard for video processing. As network bandwidth becomes more abundant, MPEG and its variant video coding techniques are increasingly used in applications over the Internet, such as video dissemination and desktop conferencing. Awareness of security threats and incidents have prompted researchers to examine secure ways of encrypting MPEG traffic. No provision for encryption was included for MPEG transmissions. ...
International Journal of Computer Applications, 2024
Real-time video encryption is a critical need in today's digital era. With the proliferation of online activities like streaming, virtual meetings, and transmission of sensitive data, the demand for secure data transmission is at an all-time high. In this paper, a new algorithm is proposed for encrypting MPEG-4 video frames. This algorithm involves encrypting the DCT values of a macroblock XOR-ed with the encryption key to significantly enhance the encryption speed and robust security while reducing the computational cost.
International Journal of the Physical Sciences, 2011
This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for information dissemination over the networks. These include encryption, authentication, and digital signatures. For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. The proposed scheme was tested in the simulated environment using different video sequences. The experimental results show that the proposed method provides adequate security to video streams. It has no effect on compression ratio and does not reduce the original video compression efficiency. Moreover, it is a suitable technique for secure H.264 bitstreams that require transmission or storage in un-trusted intermediate devices.
PROCEEDING OF THE 1ST INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN PURE AND APPLIED SCIENCE (ICARPAS2021): Third Annual Conference of Al-Muthanna University/College of Science
Today, the transmission of video data with a huge size via limited bandwidth communication channels is considered a core challenge. Hence, the compression technology is widely used for video applications and one of the common efficient compression standards is H.264 that required to be protected. This paper focuses on classifying the selective video encryption techniques in terms of compression which is used for encrypted important or sensitive data on H.264 video using various encryption methods. The classification is consists of three classes: encryption beforecompression, encryption during-compression, and encryption after-compression. Moreover, the H.264/AVC structure is explained in detail. The features for each class will be discussed for determining the open challenges in this approach. Finally, we concluded the review with open challenges and future directions. This review may help researchers and serve as a reference in the field of the selective H.264 video encryption system.
2019
With an exponential growth of multimedia and high speed internet, many relevant services and software are available for common person. Out of which, one of the applications is that common man wants to send multimedia data on internet. H.264 codec is used to compress this data by the systems. But data on the internet can be hacked, pirated or tampered with. Hence some security is required for multimedia data. In this paper, two schemes are provided for securing the video streaming after compression. One is with the proposed algorithm and the other with the standard algorithm(AES). In the second scheme, FMO is applied to bitstream which adds error resilience to the data. Both the schemes are applied selectively to I frame only of AVC/SVC. Performance is evaluated by finding PSNR for quality measurement.Alsooverheadbitandencodingtimearecompared. Security is discussed for some attacks. After considering the results for PSNR and discussion for other parameters, it is concluded that the s...
International Journal of Advanced Computer Science and Applications, 2016
H.264 video coding standard is one of the most promising techniques for the future video communications. In fact, it supports a broad range of applications. Accordingly, with the continuous promotion of multimedia services, H.264 has been widely used in real-world applications. A major concern in the design of H.264 encryption algorithms is how to achieve a sufficiently high security level, while maintaining the efficiency of the underlying compression process. In this paper a new selective encryption scheme for the H.264 standard is presented. The aim of this work is to study the security of the H.264 standard in order to propose the appropriate design of a hardware cryptoprocessor based on a stream cipher algorithm. Since the proposed cryptosystem is mainly dedicated to the multimedia applications, it provides multiple security levels in order to satisfy the requirements of various applications for different purposes while ensuring higher coding efficiency. Different performance analyses were made in order to evaluate the new encryption system. The experimental results showed the reliability and the robustness of the proposed technique.
IEEE Access, 2022
versatile video coding (VVC) is the next generation video coding standard developed by the joint video experts team (JVET) and released in July 2020. VVC introduces several new coding tools providing a significant coding gain over the high efficiency video coding (HEVC) standard. It is well known that increasing the coding efficiency adds more dependencies in the video bitstream making format-compliant encryption with the standard more challenging. In this paper we tackle the problem of selective encryption of the VVC standard in format-compliant and constant bitrate. These two constraints ensure that the encrypted bitstream can be decoded by any VVC decoder while the bitrate remains unchanged by the encryption. The selective encryption of all possible VVC syntax elements is investigated. A new algorithm is proposed to encrypt in format-compliant and constant bitrate the transform coefficients (TCs) together with other syntax elements at the level of the entropy encoder. The proposed solution was integrated and assessed under the VVC reference software model version 6.0. Experimental results showed that encryption drastically decreases the video quality while the encryption is robust against several types of attacks. The encryption space is estimated in the range of 15% to 26% of the bitstream size resulting in a lightweight encryption process. The web page of this work is publicly available at https://gugautie.github.io/sevvc/. INDEX TERMS Versatile video coding, joint crypto-compression, selective encryption, video security.
Int. J. Comput. Electr. …, 2010
Proceedings International Workshop on Multimedia Software Development, 1996
Conventional cryptography deals with the encryption and decryption of traditional textual data. The advent of networked multimedia systems will make continuous media streams, such as real time audio and video, increasingly pervasive in future computing and communications environments. It is thus important to secure networked continuous media from potential eavesdroppers. In this paper, we consider the process of real-time encryption and decryption for video streams. We implement a software-only security enhanced MPEG player. The security enhanced player implements a protection hierarchy by specializing the encryption scheme based on MPEG's coding sequences. Encryption may be performed on only I frames, I and P frames, on all I, P and B frames. Increased protection incurs more overhead as more encryption is done. Our security enhanced MPEG player incurs small average overheads in terms of achievable frame rate compared with the unmodified MPEG player, depending on the MPEG frame size, encoding format, and encryption method used, with speeds fast enough for most multimedia Internet applications. This is demonstrated by its integration with Vosaic, a real time multimedia World Wide Web browser. We also observe that increased compression actually results in less cryptographical overhead, due to the fact that more compression means less data, as well as longer dependencies between MPEG frames. Our work shows that video streams can also be encrypted and decrypted while satisfying the real time requirements in the present day Internet.
1997
Abstract Continuous digital media such as video and audio are processed and communicated within networked infrastructures. The security of these media has become very important. If the encryption process is part of the video retrieval and playback process, then encryption and decryption must be performed in real time and the speed of the encryption/decryption algorithm matters.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Int. J. Comput. Theory Eng, 2010
IEEE Transactions on Consumer Electronics, 2013
2006 International Conference on Intelligent Information Hiding and Multimedia, 2006
Multimedia Tools and Applications, 2019
IEEE Transactions on Circuits and Systems for Video Technology, 2002
2009 International Conference on Networking and Media Convergence, 2009
EURASIP Journal on Information Security, 2008