Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Proceedings of Internet Society Symposium on Network and Distributed Systems Security
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision as specified in the standard. W e conducted an experimental study of previously proposed selective encryption schemes for MPEG video security. This study showed that these methods are inadequate for sensitive applications. W e discuss the tradeoffs between levels of security and computational and compression eficiency. commonly available software and hardware encryption mechanisms often cannot encrypt entire MPEG streams without severely degrading performance and quality of service. In this paper, we examine previously proposed selective encryption schemes for secure MPEG transmission. We find that these selective encryption schemes offers a limited level of security, especially for sensitive applications. For example, certain objects in the scene are clearly visible even if the video sequence is "encrypted". We suggest improvements to such schemes, evaluate their security, and discuss tradeoffs in higher encoding complexity and lower compression rate.
1996
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision is specified in the standard. We conducted an experimental study of previously proposed selective encryption schemes for MPEG video security. This study showed that these methods are inadequate for sensitive applications. We discuss the tradeoffs between levels of security and computational and compression efficiency. 1 Introduction and Motivation MPEG (Moving Pictures Expert Group) is an industrial standard for video processing. As network bandwidth becomes more abundant, MPEG and its variant video coding techniques are increasingly used in applications over the Internet, such as video dissemination and desktop conferencing. Awareness of security threats and incidents have prompted researchers to examine secure ways of encrypting MPEG traffic. No provision for encryption was included for MPEG transmissions. ...
International Journal of Computer Applications, 2024
Real-time video encryption is a critical need in today's digital era. With the proliferation of online activities like streaming, virtual meetings, and transmission of sensitive data, the demand for secure data transmission is at an all-time high. In this paper, a new algorithm is proposed for encrypting MPEG-4 video frames. This algorithm involves encrypting the DCT values of a macroblock XOR-ed with the encryption key to significantly enhance the encryption speed and robust security while reducing the computational cost.
International Journal of the Physical Sciences, 2011
This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for information dissemination over the networks. These include encryption, authentication, and digital signatures. For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. The proposed scheme was tested in the simulated environment using different video sequences. The experimental results show that the proposed method provides adequate security to video streams. It has no effect on compression ratio and does not reduce the original video compression efficiency. Moreover, it is a suitable technique for secure H.264 bitstreams that require transmission or storage in un-trusted intermediate devices.
PROCEEDING OF THE 1ST INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN PURE AND APPLIED SCIENCE (ICARPAS2021): Third Annual Conference of Al-Muthanna University/College of Science
Today, the transmission of video data with a huge size via limited bandwidth communication channels is considered a core challenge. Hence, the compression technology is widely used for video applications and one of the common efficient compression standards is H.264 that required to be protected. This paper focuses on classifying the selective video encryption techniques in terms of compression which is used for encrypted important or sensitive data on H.264 video using various encryption methods. The classification is consists of three classes: encryption beforecompression, encryption during-compression, and encryption after-compression. Moreover, the H.264/AVC structure is explained in detail. The features for each class will be discussed for determining the open challenges in this approach. Finally, we concluded the review with open challenges and future directions. This review may help researchers and serve as a reference in the field of the selective H.264 video encryption system.
2019
With an exponential growth of multimedia and high speed internet, many relevant services and software are available for common person. Out of which, one of the applications is that common man wants to send multimedia data on internet. H.264 codec is used to compress this data by the systems. But data on the internet can be hacked, pirated or tampered with. Hence some security is required for multimedia data. In this paper, two schemes are provided for securing the video streaming after compression. One is with the proposed algorithm and the other with the standard algorithm(AES). In the second scheme, FMO is applied to bitstream which adds error resilience to the data. Both the schemes are applied selectively to I frame only of AVC/SVC. Performance is evaluated by finding PSNR for quality measurement.Alsooverheadbitandencodingtimearecompared. Security is discussed for some attacks. After considering the results for PSNR and discussion for other parameters, it is concluded that the s...
International Journal of Advanced Computer Science and Applications, 2016
H.264 video coding standard is one of the most promising techniques for the future video communications. In fact, it supports a broad range of applications. Accordingly, with the continuous promotion of multimedia services, H.264 has been widely used in real-world applications. A major concern in the design of H.264 encryption algorithms is how to achieve a sufficiently high security level, while maintaining the efficiency of the underlying compression process. In this paper a new selective encryption scheme for the H.264 standard is presented. The aim of this work is to study the security of the H.264 standard in order to propose the appropriate design of a hardware cryptoprocessor based on a stream cipher algorithm. Since the proposed cryptosystem is mainly dedicated to the multimedia applications, it provides multiple security levels in order to satisfy the requirements of various applications for different purposes while ensuring higher coding efficiency. Different performance analyses were made in order to evaluate the new encryption system. The experimental results showed the reliability and the robustness of the proposed technique.
IEEE Access, 2022
versatile video coding (VVC) is the next generation video coding standard developed by the joint video experts team (JVET) and released in July 2020. VVC introduces several new coding tools providing a significant coding gain over the high efficiency video coding (HEVC) standard. It is well known that increasing the coding efficiency adds more dependencies in the video bitstream making format-compliant encryption with the standard more challenging. In this paper we tackle the problem of selective encryption of the VVC standard in format-compliant and constant bitrate. These two constraints ensure that the encrypted bitstream can be decoded by any VVC decoder while the bitrate remains unchanged by the encryption. The selective encryption of all possible VVC syntax elements is investigated. A new algorithm is proposed to encrypt in format-compliant and constant bitrate the transform coefficients (TCs) together with other syntax elements at the level of the entropy encoder. The proposed solution was integrated and assessed under the VVC reference software model version 6.0. Experimental results showed that encryption drastically decreases the video quality while the encryption is robust against several types of attacks. The encryption space is estimated in the range of 15% to 26% of the bitstream size resulting in a lightweight encryption process. The web page of this work is publicly available at https://gugautie.github.io/sevvc/. INDEX TERMS Versatile video coding, joint crypto-compression, selective encryption, video security.
Int. J. Comput. Electr. …, 2010
Proceedings International Workshop on Multimedia Software Development, 1996
Conventional cryptography deals with the encryption and decryption of traditional textual data. The advent of networked multimedia systems will make continuous media streams, such as real time audio and video, increasingly pervasive in future computing and communications environments. It is thus important to secure networked continuous media from potential eavesdroppers. In this paper, we consider the process of real-time encryption and decryption for video streams. We implement a software-only security enhanced MPEG player. The security enhanced player implements a protection hierarchy by specializing the encryption scheme based on MPEG's coding sequences. Encryption may be performed on only I frames, I and P frames, on all I, P and B frames. Increased protection incurs more overhead as more encryption is done. Our security enhanced MPEG player incurs small average overheads in terms of achievable frame rate compared with the unmodified MPEG player, depending on the MPEG frame size, encoding format, and encryption method used, with speeds fast enough for most multimedia Internet applications. This is demonstrated by its integration with Vosaic, a real time multimedia World Wide Web browser. We also observe that increased compression actually results in less cryptographical overhead, due to the fact that more compression means less data, as well as longer dependencies between MPEG frames. Our work shows that video streams can also be encrypted and decrypted while satisfying the real time requirements in the present day Internet.
1997
Abstract Continuous digital media such as video and audio are processed and communicated within networked infrastructures. The security of these media has become very important. If the encryption process is part of the video retrieval and playback process, then encryption and decryption must be performed in real time and the speed of the encryption/decryption algorithm matters.
Int. J. Comput. Theory Eng, 2010
IEEE Transactions on Consumer Electronics, 2013
Video encryption techniques enable applications like digital rights management and video scrambling. Applying encryption on the entire video stream can be computationally costly and prevents advanced video modifications by an untrusted middlebox in the network, like splicing, quality monitoring, watermarking, and transcoding. Therefore, encryption techniques are proposed which influence a small amount of the video stream while keeping the video compliant with its compression standard, High Efficiency Video Coding. Encryption while guaranteeing standard compliance can cause degraded compression efficiency, so depending on their bitrate impact, a selection of encrypted syntax elements should be made. Each element also impacts the quality for untrusted decoders differently, so this aspect should also be considered. In this paper, multiple techniques for partial video encryption are investigated, most of them having a low impact on rate-distortion performance and having a broad range in scrambling performance 1. Index Terms-High Efficiency Video Coding, encryption, transcoding, video scrambling I. INTRODUCTION Applications using video encryption can range from pay TV up to confidential military applications. When confidentiality is of the highest priority, encryption of the entire video stream is advised. In a scenario of television distribution, some disadvantages can be associated with full video encryption. First, useful technical information, irrelevant for end users, becomes obscured. For example, a video stream contains
1998
Over the last three years, several encryption algorithms, applied to MPEG video streams, emerged. Most of the algorithms tried to optimize the encryption process with respect to the encryption speed due to the temporal properties of video retieval and display process.
2006 International Conference on Intelligent Information Hiding and Multimedia, 2006
Currently, the requirements on MPEG encryption algorithms include: fast speed, format compliance, a wide range of security levels, easy implementation, etc. However, promising candidates that possess all these properties have not appeared. In this work we design a selective encryption algorithm for MPEG video with the aim to address all these problems.
IJSRD, 2014
In the recent years, there has been a tremendous improvement and emergence of technologies for communications and digital multimedia. Such an environment has allowed for the realization of many fascinating multimedia applications. Almost instantaneous delivery of entertainment videos, pictures, and music are available to everyone who is connected to a multimedia distribution system. Hence there is a need for multimedia security for multimedia applications. We investigate the novelty of secure data for e.g. Multimedia data Transmission using cryptographic techniques. Over the last few years several encryption algorithms have applied to secure video transmission. Comparison between Symmetric and Asymmetric methods and representative video algorithms were presented. After comparison we propose encryption algorithm that is the International Data Encryption Algorithm a Symmetric Block Cipher for protection of the multimedia data. Advantages of our encryption algorithms not only lie in fast and easy implementation but also in providing considerable security. A software tool MATLAB will be used to implement algorithm for comparing video encryption methods.
In the recent years, there has been a tremendous improvement and emergence of technologies for communications and digital multimedia. Such an environment has allowed for the realization of many fascinating multimedia applications. Almost instantaneous delivery of entertainment videos, pictures, and music are available to everyone who is connected to a multimedia distribution system. Hence there is a need for multimedia security for multimedia applications.
The modern view of multimedia communications like the video transmission and video streaming allows the people to access the stored media using the network around the world. Video streaming is a type of multimedia that is constantly received and presented to an end-user while being delivered by a video service provider or sender. This existing system is a secure Redundancy Elimination protocol to leverage encrypted in-network caching for video delivery without knowing the underlying video content and fingerprint. In case of large media size, then the video encryption requires large video handling time and video delivery time such as transmission latency and packet transmission Jitter. In a novel video content encryption approach based on video frames, which encrypts the individual frame and attaches the corresponding macro block information by eliminating the redundant frame. It handles the videos frames using H-264 encoding model, the actual videos frame content is divided into I, P and B-frames providing the video information in terms of Intra Coded Pictures, Predicted pictures and Bi-directionally predicted pictures. The process is repeated by processing the complete file into number of video frames. The proposed frame based encryption system achieves the better performances compare to chunk based encryption in terms of Transmission latency, Communication reliability and Packet Jitter.
It is an assumption that selective encryption does not strongly protect confidentiality owing to the partial visibility of some video data. This is because, though encryption keys may be difficult to derive, an enhanced version of selectively encrypted video sequence might be found from knowledge of the unencrypted parts of the sequence. An efficient selective encryption method for syntax elements of H.264 encoded video was recently proposed at the entropy coding stage of an H.264 encoder. Using this recent scheme as an example, the purpose of this paper is a comprehensive cryptanalysis of selectively encrypted H.264 bit-streams to contradict the previous assumption that selective encryption is vulnerable. The novel cryptanalysis methods presented in this paper analyze the ability of an attacker to improve the quality of the encrypted video stream to make it watchable. The conclusion is drawn that if the syntax elements for selective encryption are chosen using statistical and structural characteristics of the video, then the selective encryption method is secure. The cryptanalysis is performed by taking into account the probability distribution of syntax elements within the video sequence, the relationship of syntax elements with linear regression analysis and the probability of successfully attacking them in order to enhance the visual quality. The results demonstrate the preservation of distorted video quality even after considering many possible attacks on: the whole video sequence; each video frame; and on small video segments known as slices.
An explosion in the internet and other sharing technologies has made transfer and distribution of video content extremely easy. Unimpeded transfer of video and other multimedia content has lead to violation of several antipiracy laws today. Hence, the need to prevent unauthorized distribution and protection of video data is on the rise. This paper demonstrates the lossless video encryption and decryption techniques. For encrypting the frames of the video, column and row shifting method is used, that is transposition cipher is generated. Further a password is used to encrypt the video as well.
Emerging High efficiency video coding (HEVC) is expected to be widely adopted in network applications for high definition devices and mobile terminals. Thus, construction of HEVC's encryption schemes that maintain format compliance and bit rate of encrypted bitstream becomes an active security's researches area. This paper presents a novel selective encryption technique for HEVC videos, based on enciphering the bins of selected Golomb–Rice code’s suffixes with the Advanced Encryption Standard (AES) in a CBC operating mode. The scheme preserves format compliance and size of the encrypted HEVC bitstream, and provides high visual degradation with optimized encryption space defined by selected Golomb–Rice suffixes. Experimental results show reliability and robustness of the proposed technique.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.