scispace - formally typeset
Search or ask a question
Journal Article

Quality Analysis of Several Typical MPEG Video Encryption Algorithms

TL;DR: In this paper, the existed MPEG video encryption algorithms are classified into four types according to the relationship between encryption process and compression process, and each is evaluated from the four aspects: security, compression ratio, computing complexity and operationality.
Abstract: Video encryption is a suitable method to protect video data. In this paper, the existed MPEG video encryption algorithms are classified into four types according to the relationship between encryption process and compression process. They are complete encryption algorithm, partial encryption algorithm, DCT coefficient encryption algorithm and entropy encoding encryption algorithm. Each of them is evaluated from the four aspects: security, compression ratio, computing complexity and operationality. Theoretical analyses and experimental results are presented to compare these algorithms. And their application fields are given, which are consistent with their properties. According to the development direction of video application, the encryption algorithms combining with encoding process will be studied deeply in the future, such as DCT coefficient encryption algorithm, entropy encoding encryption algorithm or novel algorithm combining with error correcting code and so on.
Citations
More filters
Journal ArticleDOI
01 Sep 2007
TL;DR: To prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed and can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.
Abstract: Focusing on the encryption of digital image and video, an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms is reported. This serious weakness of DCT-based encryptions is analysed theoretically and then demonstrated practically. As an instance, a novel attack algorithm is proposed to acquire the sketch information from encrypted data without any prior knowledge of the encryption algorithm. The quality of the extracted sketch is then evaluated by comparing with the original picture edge. Thereafter, to prevent this kind of attack, a full inter-block shuffle (FIBS) approach is proposed. This method can be employed to improve the encryption security in all DCT-based algorithms, such as JPEG, MPEG video and H.26x video.

50 citations


Cites background from "Quality Analysis of Several Typical..."

  • ...signs flipping [6], DC and non-zero ACs scramble [7], intra-block shuffle [8], DC splitting and intra-block shuffle [8], and inter-block shuffle [9, 10]....

    [...]

  • ...Shuffling more bands will give a higher security level; and • Inter-block shuffle [9, 10]: another shuffle method is inter-block shuffle....

    [...]

Journal ArticleDOI
TL;DR: Experimental results and analysis show that the computation cost is low and the bitrate increment is negligible, and it can achieve good performance in resisting brute-force attacks, histogram-based attacks and replacement attacks.
Abstract: Aiming to protect H.264/AVC video in multimedia social network, a selective encryption scheme is put forward. In the scheme, after analyzing the impact of quantization parameter (QP) on the encryption of the sign of T1 s and the impact of encrypting inter-macroblock non-zero coefficients, the sign of intra-macroblock non-zero DCT coefficients, the sign of trailing ones (T1 s), the intra prediction modes (IPMs) and the sign of motion vector difference (MVD) are encrypted to protect the texture and motion information of H.264/AVC. Experimental results and analysis show that the computation cost is low and the bitrate increment is negligible, and it can achieve good performance in resisting brute-force attacks, histogram-based attacks and replacement attacks. Based on the encryption scheme, a framework of its implementation in multimedia social network is put forward. It has great potential to be implemented for the video data protection in multimedia social network.

35 citations

Journal ArticleDOI
TL;DR: Experimental results show that the improved H.264/AVC comprehensive video encryption scheme is efficient in computing, the encryption process does not affect the compression ratio greatly, and the encryption/decryption process hardly affects the video quality.
Abstract: An improved H.264/AVC comprehensive video encryption scheme is proposed. In the proposed scheme, the intra-prediction mode, motion vector difference, and quantization coefficients are encrypted. A novel hierarchical key generation method is likewise proposed, in which the encryption keys are generated based on the cryptographic hash function. Generated frame keys are consistent with the corresponding frame serial numbers, which can ensure frame synchronization in the decrypting process when frame loss occurs. This function provides the property that our scheme is secure against some special attacks for video, such as the frame regrouping attack and frame erasure attack. Our method not only avoids the distribution of encryption keys, but also increases the security. Experimental results show that the proposed scheme is efficient in computing, the encryption process does not affect the compression ratio greatly, and the encryption/decryption process hardly affects the video quality.

34 citations


Cites background or methods from "Quality Analysis of Several Typical..."

  • ...In their works [1,2], the performance of video encryption algorithms is evaluated from four aspects: security, compression ratio, efficiency, and operability....

    [...]

  • ...[1], existing video encryption algorithms are classified into four types according to the relationship between the encryption and compression processes....

    [...]

  • ...Considering the main requirement for video encryption, namely, security, compression ratio, efficiency, and format compliance, we compare our method with the listed algorithms in Table 4 of [1]....

    [...]

Book ChapterDOI
10 Sep 2015
TL;DR: This paper proposes taking a whole-of-system approach to achieve system/collective lightweightness, outsource expensive computations from resource-constrained field devices to neighboring devices and equipments that have more computational capacity, and selectively protect critical data partial/selective protection of Data of Interest.
Abstract: Cyber-physical systems CPS are a key component in industrial control systems ICS, which are widely used in the critical infrastructure sectors. The increasing reliance on CPS, however, affords exploitative opportunities for malicious actors targeting our critical infrastructure. The real-time requirement of control systems, coupled with the deployment of resource-constrained field devices, complicate efforts to secure our critical infrastructure. A key technical limitation for security solutions is that they should be lightweight. While lightweight cryptography is useful to some extent, enforcement of asymmetric key cryptographic primitives in control systems is known to be problematic. In this paper, we suggest investigating the enforcement of lightweight security solutions in ICS from a different perspective. Rather than focusing on designing lightweight individual cryptographic primitives, we propose taking a whole-of-system approach to 1 achieve system/collective lightweightness, 2 outsource expensive computations from resource-constrained field devices to neighboring devices and equipments that have more computational capacity, and 3 selectively protect critical data partial/selective protection of Data of Interest.

24 citations

Journal ArticleDOI
TL;DR: Results of experiment show that the proposed video encryption scheme has better security and encryption efficiency than other methods tested, which are compared to each other.
Abstract: With the increasing popularity of multimedia data on the internet and our daily life, the way people get information is becoming more diverse, video is becoming an important part of our dailylife and work. At the same time, the popularity of video also brings new security risks and challenges, more and more people are paying attention to video security issues. Based on hyperchaotic system, this paper proposes and implements a video encryption scheme. The encryption algorithm divide a video stream into a color image stream and an audio stream. Color image is composed of three-dimensional channels of Y, Cb, and Cr, the amount of practical information carried by three channels is different. Therefore, an Anorld transforms and a DNA encoding algorithm is used for the Y channel with more information. The Cb and Cr channels with less information are encrypted by Lorenz hyperchaotic map. Audio information is encrypted by Logistic chaotic map. The paper thoroughly tested the feasibility of the process of encryption and decryption, analyzed the resistance of statistical attacks and completed tests on the histogram, information entropy, and correlation of neighboring pixels. The paper also tested the scheme’s ability to resist violent attacks and completed the analysis of key space, key sensitivity, signal-to-noise ratio, spectrogram, variance, and mean. At the end of the article we test the comparison of capability and efficiency of our scheme and other two methods. Results of experiment show that our scheme has better security and encryption efficiency.

13 citations