Skip to main content

An Optimized Selective Encryption for Video Confidentiality

  • Conference paper
  • First Online:
Image Analysis and Recognition (ICIAR 2015)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 9164))

Included in the following conference series:

Abstract

Selective Encryption (SE) offers effective and efficient protection of visual content for assuring video confidentiality. However, it is challenging to optimize SE’s computational overhead while maintaining encryption effectiveness. This paper suggests the study of classifying the targeted sign-flip Quantized Coefficients (QC) so as to minimize the Encryption Computation Overhead (ECO), while maximizing Perceptual Encryption Effectiveness (PEE) both across the H.264/AVC and the HEVC video coding standards. The evaluation of this min-max optimization is based on the number of encryption bits used to flip the targeted QC sign and the Peak Signal to Noise Ratio (PSNR) estimated post encryption for quantifying ECO and PEE respectively. Results of simulation on different video sequences indicate that the derived set of QC’s can reduce ECO cost by up to 78 % without affecting the video confidentiality when compared to state-of-the-art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    AES website: http://buchholz.hs-bremen.de/aes/aes.html.

  2. 2.

    Standard videos: Highway, News, Foreman, Bridge (Close), Carphone, Coastguard, Container, Hall Monitor, Highway and Mobile.

  3. 3.

    Standard Video Website: http://trace.eas.asu.edu/yuv/.

  4. 4.

    HEVC software repository (main at HHI), http://hevc.hhi.fraunhofer.de.

References

  1. Pande, A., Zambreno, J.: Securing Multimedia Content Using Joint Compression and Encryption, Embedded Multimedia Security Systems, vol. Part 1, pp. 23–30. Springer, London (2013)

    Google Scholar 

  2. Yang, S., Sun, S.: A video encryption method based on chaotic maps in DCT domain. Prog. Nat. Sci. 18(10), 1299–1304 (2008)

    Article  Google Scholar 

  3. Wei, Z., Wu, Y., Ding, X., Deng, R.H.: A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Sig. Process. Image Commun. 27(9), 1011–1024 (2012)

    Article  Google Scholar 

  4. Shahid, Z., Puech, W.: Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings. IEEE Trans. Multimedia 16(1), 24–36 (2014)

    Article  Google Scholar 

  5. Stutz, T., Uhl, A.: A survey of H.264 AVC/SVC encryption. IEEE Trans. Circuits Syst. Video Technol. 22(3), 325–339 (2012)

    Article  Google Scholar 

  6. Saini, M., Atrey, P., Mehrotra, S., Kankanhalli, M.: Anonymous surveillance. In: 2011 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–60 July 2011

    Google Scholar 

  7. Boho, A., Van Wallendael, G., Dooms, A., De Cock, J., Braeckman, G., Schelkens, P., Preneel, B., Van de Walle, R.: End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. IEEE Signal Process. Mag. 30(2), 97–107 (2013)

    Article  Google Scholar 

  8. Wang, Y., O’Neill, M., Kurugollu, F.: Adaptive binary mask for privacy region protection. In: 2012 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1127–1130 May 2012

    Google Scholar 

  9. Dufaux, F., Ebrahimi, T.: Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1168–1174 (2008)

    Article  Google Scholar 

  10. Tong, L., Dai, F., Zhang, Y., Li, J.: Restricted H.264/AVC video coding for privacy region scrambling. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2089–2092 September 2010

    Google Scholar 

  11. Yeung, S.-K.A., Zhu, S., Zeng, B.: Partial video encryption based on alternating transforms. IEEE Signal Process. Lett. 16(10), 893–896 (2009)

    Article  Google Scholar 

  12. Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264/AVC by selective encryption of CABAC. In: IEEE International Conference on Multimedia and Expo, 2009. ICME 2009, pp. 1038–1041 July 2009

    Google Scholar 

  13. Muhit, A., Pickering, M., Frater, M., Arnold, J.: Video coding using elastic motion model and larger blocks. IEEE Trans. Circuits Syst. Video Technol. 20(5), 661–672 (2010)

    Article  Google Scholar 

  14. Sullivan, G., Ohm, J., Han, W.-J., Wiegand, T.: Overview of the High Efficiency Video Coding (HEVC) standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649–1668 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khalfan Almarashda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Almarashda, K., Dawood, A., Martin, T., Al-Mualla, M., Bhaskar, H. (2015). An Optimized Selective Encryption for Video Confidentiality. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2015. Lecture Notes in Computer Science(), vol 9164. Springer, Cham. https://doi.org/10.1007/978-3-319-20801-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20801-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20800-8

  • Online ISBN: 978-3-319-20801-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics