scispace - formally typeset
Open AccessPosted Content

Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm

Reads0
Chats0
TLDR
In this article, the authors demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered, and discuss modifications that can make the algorithm resistant to our attack.
Abstract
One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

An Overview of Video Encryption Techniques

TL;DR: A description and comparison between encryption methods and representative video algorithms were presented and a trade-off between quality of video streaming and choice of encryption algorithm were shown.
Posted Content

Video Encryption: A Survey

TL;DR: Analysis and Comparison of various video encryption algorithms with respect to various parameters like visual degradation, encryption ratio, speed, compression friendliness, format compliance and cryptographic security is presented.
Journal ArticleDOI

Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream

TL;DR: The proposed scheme can withstand the ciphertext-only attack as well as the known/chosen plaintext attack and is an ideal choice in secure media applications where a large amount of multimedia data has to be encrypted/decrypted in real time.
Journal ArticleDOI

Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study

TL;DR: In this paper, an innovative encryption algorithm for videos compressed using H.264 was proposed to safely exchange highly confidential videos, which shuffles the video frames along with the audio, and then AES is used to selectively encrypt the sensitive video codewords.
References
More filters
Proceedings ArticleDOI

Methods for encrypting and decrypting MPEG video data efficiently

TL;DR: One of the methods is almost as e@cient as the existing video encoding and decoding process while providing considerable level of security without affeciing the quality of images when decrypted, and based on the wideiy used JPEG and MPEG standards.
Proceedings ArticleDOI

Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video

G.A. Spanos, +1 more
TL;DR: The performance of Aegis (utilizing MPEG video compression across an ATM network) is explored through an extensive simulation study, which demonstrates the delay performance, as well as, the queue requirements for the Aegis encryption scheme versus the full encryption and no encryption schemes.
Proceedings ArticleDOI

An empirical study of secure MPEG video transmissions

I. Agi, +1 more
TL;DR: This study showed that previously proposed selective encryption schemes for MPEG video security are inadequate for sensitive applications and discusses the tradeoffs between levels of security and computational and compression efficiency.
Proceedings ArticleDOI

Security enhanced MPEG player

TL;DR: It is shown that video streams can also be encrypted and decrypted while satisfying the real-time requirements of the present-day Internet, as well as longer dependencies between MPEG frames.
Proceedings ArticleDOI

Is MPEG encryption by using random list instead of zigzag order secure

TL;DR: The problems of the MPEG video encryption algorithm are discussed by using a random permutation list instead of a zigzag order within the MPEG compression process, showing that the encryption method causes a significant size increase of the video stream, hence defeats the purpose of compression.