Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
1996
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision is specified in the standard. We conducted an experimental study of previously proposed selective encryption schemes for MPEG video security. This study showed that these methods are inadequate for sensitive applications. We discuss the tradeoffs between levels of security and computational and compression efficiency. 1 Introduction and Motivation MPEG (Moving Pictures Expert Group) is an industrial standard for video processing. As network bandwidth becomes more abundant, MPEG and its variant video coding techniques are increasingly used in applications over the Internet, such as video dissemination and desktop conferencing. Awareness of security threats and incidents have prompted researchers to examine secure ways of encrypting MPEG traffic. No provision for encryption was included for MPEG transmissions. ...
sndss, 1996
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision as specified in the standard. W e conducted an experimental study of previously proposed selective encryption schemes for MPEG video security. This study showed that these methods are inadequate for sensitive applications. W e discuss the tradeoffs between levels of security and computational and compression eficiency. commonly available software and hardware encryption mechanisms often cannot encrypt entire MPEG streams without severely degrading performance and quality of service. In this paper, we examine previously proposed selective encryption schemes for secure MPEG transmission. We find that these selective encryption schemes offers a limited level of security, especially for sensitive applications. For example, certain objects in the scene are clearly visible even if the video sequence is "encrypted". We suggest improvements to such schemes, evaluate their security, and discuss tradeoffs in higher encoding complexity and lower compression rate.
2019
With an exponential growth of multimedia and high speed internet, many relevant services and software are available for common person. Out of which, one of the applications is that common man wants to send multimedia data on internet. H.264 codec is used to compress this data by the systems. But data on the internet can be hacked, pirated or tampered with. Hence some security is required for multimedia data. In this paper, two schemes are provided for securing the video streaming after compression. One is with the proposed algorithm and the other with the standard algorithm(AES). In the second scheme, FMO is applied to bitstream which adds error resilience to the data. Both the schemes are applied selectively to I frame only of AVC/SVC. Performance is evaluated by finding PSNR for quality measurement.Alsooverheadbitandencodingtimearecompared. Security is discussed for some attacks. After considering the results for PSNR and discussion for other parameters, it is concluded that the s...
IEEE Access, 2022
versatile video coding (VVC) is the next generation video coding standard developed by the joint video experts team (JVET) and released in July 2020. VVC introduces several new coding tools providing a significant coding gain over the high efficiency video coding (HEVC) standard. It is well known that increasing the coding efficiency adds more dependencies in the video bitstream making format-compliant encryption with the standard more challenging. In this paper we tackle the problem of selective encryption of the VVC standard in format-compliant and constant bitrate. These two constraints ensure that the encrypted bitstream can be decoded by any VVC decoder while the bitrate remains unchanged by the encryption. The selective encryption of all possible VVC syntax elements is investigated. A new algorithm is proposed to encrypt in format-compliant and constant bitrate the transform coefficients (TCs) together with other syntax elements at the level of the entropy encoder. The proposed solution was integrated and assessed under the VVC reference software model version 6.0. Experimental results showed that encryption drastically decreases the video quality while the encryption is robust against several types of attacks. The encryption space is estimated in the range of 15% to 26% of the bitstream size resulting in a lightweight encryption process. The web page of this work is publicly available at https://gugautie.github.io/sevvc/. INDEX TERMS Versatile video coding, joint crypto-compression, selective encryption, video security.
Multimedia Tools and Applications, 2019
To avoid delays arising from a need to decrypt a video prior to transcoding and then re-encrypt it afterwards, this paper assesses a selective encryption (SE) content protection scheme. The scheme is suited to both recent standardized codecs, namely H.264/Advanced Video Coding (AVC) and High Efficiency Video Coding (HEVC). Specifically, the paper outlines a joint cryptotranscoding scheme for secure transrating of a video bitstream. That is to say it generates new video bitrates, possibly as part of an HTTP Adaptive Streaming (HAS) content delivery network. The scheme will reduce the bitrate to one or more lower desired bitrate without consuming time in the encryption/decryption process, which would be the case when full encryption is used. In addition, the decryption key no longer needs to be exposed at intermediate middleboxes, including when transrating is performed in a cloud datacenter. The effectiveness of the scheme is variously evaluated: by examination of the SE generated visual distortion; by the extent of computational and bitrate overheads; and by choice of cipher when encrypting the selected elements within the bitstream. Results indicate that there remains: a content; quantization level (after transrating of an encrypted video); and codectype dependency to any distortion introduced. A further recommendation is that the Advanced Encryption Standard (AES) is preferred for SE to lightweight XOR encryption, despite it being taken up elsewhere as a real-time encryption method.
International Journal of the Physical Sciences, 2011
This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for information dissemination over the networks. These include encryption, authentication, and digital signatures. For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. The proposed scheme was tested in the simulated environment using different video sequences. The experimental results show that the proposed method provides adequate security to video streams. It has no effect on compression ratio and does not reduce the original video compression efficiency. Moreover, it is a suitable technique for secure H.264 bitstreams that require transmission or storage in un-trusted intermediate devices.
IJSRD, 2014
In the recent years, there has been a tremendous improvement and emergence of technologies for communications and digital multimedia. Such an environment has allowed for the realization of many fascinating multimedia applications. Almost instantaneous delivery of entertainment videos, pictures, and music are available to everyone who is connected to a multimedia distribution system. Hence there is a need for multimedia security for multimedia applications. We investigate the novelty of secure data for e.g. Multimedia data Transmission using cryptographic techniques. Over the last few years several encryption algorithms have applied to secure video transmission. Comparison between Symmetric and Asymmetric methods and representative video algorithms were presented. After comparison we propose encryption algorithm that is the International Data Encryption Algorithm a Symmetric Block Cipher for protection of the multimedia data. Advantages of our encryption algorithms not only lie in fast and easy implementation but also in providing considerable security. A software tool MATLAB will be used to implement algorithm for comparing video encryption methods.
IEEE Transactions on Consumer Electronics, 2013
Video encryption techniques enable applications like digital rights management and video scrambling. Applying encryption on the entire video stream can be computationally costly and prevents advanced video modifications by an untrusted middlebox in the network, like splicing, quality monitoring, watermarking, and transcoding. Therefore, encryption techniques are proposed which influence a small amount of the video stream while keeping the video compliant with its compression standard, High Efficiency Video Coding. Encryption while guaranteeing standard compliance can cause degraded compression efficiency, so depending on their bitrate impact, a selection of encrypted syntax elements should be made. Each element also impacts the quality for untrusted decoders differently, so this aspect should also be considered. In this paper, multiple techniques for partial video encryption are investigated, most of them having a low impact on rate-distortion performance and having a broad range in scrambling performance 1. Index Terms-High Efficiency Video Coding, encryption, transcoding, video scrambling I. INTRODUCTION Applications using video encryption can range from pay TV up to confidential military applications. When confidentiality is of the highest priority, encryption of the entire video stream is advised. In a scenario of television distribution, some disadvantages can be associated with full video encryption. First, useful technical information, irrelevant for end users, becomes obscured. For example, a video stream contains
International Journal of Computer Applications, 2024
Real-time video encryption is a critical need in today's digital era. With the proliferation of online activities like streaming, virtual meetings, and transmission of sensitive data, the demand for secure data transmission is at an all-time high. In this paper, a new algorithm is proposed for encrypting MPEG-4 video frames. This algorithm involves encrypting the DCT values of a macroblock XOR-ed with the encryption key to significantly enhance the encryption speed and robust security while reducing the computational cost.
In the recent years, there has been a tremendous improvement and emergence of technologies for communications and digital multimedia. Such an environment has allowed for the realization of many fascinating multimedia applications. Almost instantaneous delivery of entertainment videos, pictures, and music are available to everyone who is connected to a multimedia distribution system. Hence there is a need for multimedia security for multimedia applications.
Proceedings International Workshop on Multimedia Software Development, 1996
Conventional cryptography deals with the encryption and decryption of traditional textual data. The advent of networked multimedia systems will make continuous media streams, such as real time audio and video, increasingly pervasive in future computing and communications environments. It is thus important to secure networked continuous media from potential eavesdroppers. In this paper, we consider the process of real-time encryption and decryption for video streams. We implement a software-only security enhanced MPEG player. The security enhanced player implements a protection hierarchy by specializing the encryption scheme based on MPEG's coding sequences. Encryption may be performed on only I frames, I and P frames, on all I, P and B frames. Increased protection incurs more overhead as more encryption is done. Our security enhanced MPEG player incurs small average overheads in terms of achievable frame rate compared with the unmodified MPEG player, depending on the MPEG frame size, encoding format, and encryption method used, with speeds fast enough for most multimedia Internet applications. This is demonstrated by its integration with Vosaic, a real time multimedia World Wide Web browser. We also observe that increased compression actually results in less cryptographical overhead, due to the fact that more compression means less data, as well as longer dependencies between MPEG frames. Our work shows that video streams can also be encrypted and decrypted while satisfying the real time requirements in the present day Internet.
PROCEEDING OF THE 1ST INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN PURE AND APPLIED SCIENCE (ICARPAS2021): Third Annual Conference of Al-Muthanna University/College of Science
Today, the transmission of video data with a huge size via limited bandwidth communication channels is considered a core challenge. Hence, the compression technology is widely used for video applications and one of the common efficient compression standards is H.264 that required to be protected. This paper focuses on classifying the selective video encryption techniques in terms of compression which is used for encrypted important or sensitive data on H.264 video using various encryption methods. The classification is consists of three classes: encryption beforecompression, encryption during-compression, and encryption after-compression. Moreover, the H.264/AVC structure is explained in detail. The features for each class will be discussed for determining the open challenges in this approach. Finally, we concluded the review with open challenges and future directions. This review may help researchers and serve as a reference in the field of the selective H.264 video encryption system.
1997
Abstract Continuous digital media such as video and audio are processed and communicated within networked infrastructures. The security of these media has become very important. If the encryption process is part of the video retrieval and playback process, then encryption and decryption must be performed in real time and the speed of the encryption/decryption algorithm matters.
1998
Over the last three years, several encryption algorithms, applied to MPEG video streams, emerged. Most of the algorithms tried to optimize the encryption process with respect to the encryption speed due to the temporal properties of video retieval and display process.
The modern view of multimedia communications like the video transmission and video streaming allows the people to access the stored media using the network around the world. Video streaming is a type of multimedia that is constantly received and presented to an end-user while being delivered by a video service provider or sender. This existing system is a secure Redundancy Elimination protocol to leverage encrypted in-network caching for video delivery without knowing the underlying video content and fingerprint. In case of large media size, then the video encryption requires large video handling time and video delivery time such as transmission latency and packet transmission Jitter. In a novel video content encryption approach based on video frames, which encrypts the individual frame and attaches the corresponding macro block information by eliminating the redundant frame. It handles the videos frames using H-264 encoding model, the actual videos frame content is divided into I, P and B-frames providing the video information in terms of Intra Coded Pictures, Predicted pictures and Bi-directionally predicted pictures. The process is repeated by processing the complete file into number of video frames. The proposed frame based encryption system achieves the better performances compare to chunk based encryption in terms of Transmission latency, Communication reliability and Packet Jitter.
Int. J. Comput. Electr. …, 2010
2011 8th International ISC Conference on Information Security and Cryptology, 2011
Scalable multi-layered coded video requires its individual layer security, as every layer has its own characteristics i.e. bit-rate, frame rate, resolution and quality. We investigate a problem of individual layer cryptographic key management issues in scalable video coding (H.264/SVC) and propose a top down hierarchical keys generation and distribution system by using a standard key management protocol MIKEY (Multimedia Internet Keying Protocol). The research goal is to enhance the security, while reducing the multiple encryption keys overhead for scalable video content retrieval, and derive a mechanism in which every entitled user needs to hold single encryption key to watch his subscribed layer data, but this key can open the doors of all layers below. The timing results are calculated for SVC bit-stream encryption/decryption and hierarchical keys generation to prove the suitability of the proposed scheme. We combine a standard protocol with the DRM (Digital Rights Management) techniques to accomplish the security demands of scalable video content on the application level.
2009 International Conference on Networking and Media Convergence, 2009
Recently, multimedia security is becoming more important with the continuous increase of digital communications on the internet. Moreover, special and reliable security is needed in many digital applications (such as video conferencing and medical imaging systems). The classical techniques for data security are not appropriate for the current multimedia usage. As a result, we need to develop new security protocols or adapt the available security protocols to be applicable for securing the multimedia applications. Encryption of MPEG-4 video streaming using AES has not been studied. In this paper, the performance of AES in encrypting MPEG-4 video is considered. The performance of AES is compared to two symmetric encryption techniques namely; RC4 and XOR. Three data types (text, audio and video) are used to test the effectiveness of AES in encrypting MPEG-4. Simulations showed the efficiency of the AES encryption technique in such application for the different data type given.
sersc.org
Security and privacy issues of the transmitted data have become an important concern in multimedia technology. In this paper, we propose a computationally efficient and secure video encryption algorithm. This makes secure video encryption feasible for real-time applications without any extra dedicated hardware. We achieve computational efficiency by exploiting the frequently occurring patterns in the DCT coefficients of the video data. Computational complexity of the encryption is made proportional to the influence of the DCT coefficients on the visual content. On an average, our algorithm takes only 2 ms of encryption time per frame. This paper deals with the issues of color videos in-compression encryption, this done by using the optimized multiple Huffman table (OMHT) technique, will be elucidated upon in order to compress and encrypt both color images and videos. Only visual processing will be discussed (no audio processing). OMHT produces an encrypted coded sequence with an improved quality for the high compression ratios when compared to the existing standards in addition to the ability of encryption. The performance of the proposed technique is compared with that of the standard encryptions and it gives a very good perceptual quality especially at lower bit rates. We present experimental results which show that OMHT outperforms many traditional and selective techniques for video over wireless applications.
International Journal of Advanced Computer Science and Applications, 2016
H.264 video coding standard is one of the most promising techniques for the future video communications. In fact, it supports a broad range of applications. Accordingly, with the continuous promotion of multimedia services, H.264 has been widely used in real-world applications. A major concern in the design of H.264 encryption algorithms is how to achieve a sufficiently high security level, while maintaining the efficiency of the underlying compression process. In this paper a new selective encryption scheme for the H.264 standard is presented. The aim of this work is to study the security of the H.264 standard in order to propose the appropriate design of a hardware cryptoprocessor based on a stream cipher algorithm. Since the proposed cryptosystem is mainly dedicated to the multimedia applications, it provides multiple security levels in order to satisfy the requirements of various applications for different purposes while ensuring higher coding efficiency. Different performance analyses were made in order to evaluate the new encryption system. The experimental results showed the reliability and the robustness of the proposed technique.
Int. J. Comput. Theory Eng, 2010
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.