Selective Encryption Algorithm for Highly Confidential Real Time Video Applications

1068 Words3 Pages

1. Introduction
Conventional cryptographic algorithms, which are generally aimed at encrypting like text data (known as Naïve approach) not well suited for video encryption. This is due to the fact that conventional cryptographic algorithms cannot process the large volume of video data in real-time. Selective encryption of the H.264/AVC bitstream puts decoder to fully decode the encrypted video with degradation in video quality. This perceptual encryption has low encryption and decryption time. The video data are compressed to reduce the storage space required and to save bandwidth for transmission. Video compression removes redundancy, so that it is difficult to guess about a portion of a compressed bitstream to another. In addition, decompression algorithms depend upon some part of the syntax of compression than other for reconstruction. The combination of these properties suggests selective encryption, the idea that a compressed bitstream can be adequately secured from attackers with only part of the bitstream encrypted. The reduction of the fraction of encryption can help to reduce the overall complexity of the application leading to reduced encryption and decryption time. Selective encryption has been suggested for a number of specific real time applications [1, 2]. The survey given by F. Liu and H. Koenig [2], shows that almost all proposed selective video encryption algorithms have a relatively low security level. After that, Shahid et al. proposed encrypting non-zero quantized coefficients by using permutation of codes with the same level_suffix length for CAVLC in H.264/AVC [3]. Compared to encrypting sign bits of non-zero coefficients, this method encrypts higher bits, which seems to provide better scrambling effect and ...

... middle of paper ...

...7/s11042-007-0150-7.
[6] S. Lian, X. Chen, Secure and traceable multimedia distribution for convergent mobile TV services, Computer Communications 33 (14) (2010) 1664-1673. doi:10.1016/j.comcom.2010.03.015.
[7] B. Bhargava, C. Shi, S.-Y. Wang, MPEG video encryption algorithms, Multimedia Tools and Applications 24 (1) (2004), 57-79. doi:10.1023/B:MTAP.0000033983.62130.00.
[8] A. Boho, G. Van Wallendael, A. Dooms, J. De Cock, G. Braeckman, P. Schelkens, B. Preneel, R. Van de Walle, End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation, Signal Processing Magazine, IEEE 30 (2) (2013), 97-107. doi:10.1109/MSP.2012.2230220.
[9] L. Varlakshmi, G. Sudha, G. Jaikishan, An efficient scalable video encryption scheme for real time applications, Procedia Engineering 30 (0) (2012), 852 - 860. doi:10.1016/j.proeng.2012.01.937.

More about Selective Encryption Algorithm for Highly Confidential Real Time Video Applications

Open Document