CABAC Based H.264 Video Perceptual Encryption Algorithm with Adjustable Visual Quality
BAI Sen① GUO Yu①② ZHAO Bo① DAI Qinfang③
①(Chongqing Communication Institute, Chongqing 400035, China) ②(Unit 77108 of PLA, Chongzhou 611230, China) ③(Unit 78088 of PLA, Chongqing 400039, China)
In Video on Demand (VoD) applications it is desired that the encrypted multimedia data are still partially perceptible after encryption in order to stimulate the purchase of the high-quality versions of the multimedia products. This perceptual encryption requires specific algorithms for encrypting the video data. In this paper, a Context-based Adaptive Binary Arithmetic Coding (CABAC) video perceptual encryption scheme is designed. The video quality of this encryption scheme is controllable. The important syntax elements and sensitive coded elements are chosen to encrypt using mathematical XOR operations with stream ciphers generated by 2D hyper chaos system. The encryption scheme is composed of encrypting Motion Vector Differences (MVD) sign, non-zero coefficients sign and significant_coeff_flag. Theoretical analysis and experimental results show that the proposed scheme has no impact on bit rate. With the 7‰ encoding time increasing, the video quality can be controlled by the change of the quality factor, which meets the requirement of the video perceptual encryption.
柏森,郭雨,赵波,代勤芳. 基于CABAC的视觉质量可控的H.264视频感知加密算法[J]. 电子与信息学报, 2016, 38(10): 2582-2589.
BAI Sen, GUO Yu, ZHAO Bo, DAI Qinfang. CABAC Based H.264 Video Perceptual Encryption Algorithm with Adjustable Visual Quality. JEIT, 2016, 38(10): 2582-2589.
ZHANG Xiaohong and YUAN Chunjing. H.264 video entropy coding encryption by controlling key frames[J]. Journal of Image and Graphics, 2014, 19(3): 358-364. doi: 10.11834/jig.20140303.
[2]
HAMIDOUCHE W, FARAJALLAH M, RAULET M, et al. Selective vide encryption using chaotic system in the SHVC extension[C]. International Conference on Acoustics, Speech and Signal Procesing (ICASSP), Sydney, Australia, 2015: 1762-1766. doi: 10.1109/ICASSP.2015.7178273.
[3]
LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. Circuits and Systems for Video Technology, 2007, 17(2): 214-223. doi: 10.1109/TCSVT.2006.888840.
[4]
WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H.264[J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15: 73-78. doi: 10.1016/S1005- 8885(08)60159-4.
[5]
AU Yeung S K, ZHU S, and ZENG B. Design of new unitary transforms for perceptual video encryption[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(9): 1341-1345. doi: 10.1109/TCSVT.2011.2125630.
[6]
AU Yeung S K and ZENG B. Visual quality control for perceptual video encryption with multiple transforms[C]. 2012 7th International ICST Conference on Communications and Networking, Kun ming, 2012: 189-192. doi: 10.1109/ ChinaCom.2012.6417473.
[7]
ZENG B, AU YEUNG S K, ZHU S, et al. Perceptual encryption of H. 264 videos: embedding sign-flips into the integer-based transforms[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2): 309-320. doi: 10.1109/TIFS.2013. 2293955.
[8]
AU YEUNG S K and ZENG B. A new design of multiple transforms for perceptual video encryption[C]. 2012 19th IEEE International Conference on Image Processing, Orlando, 2012: 2637-2640. doi: 10.1109/ICIP.2012.6467440.
[9]
AU YEUNG S K and ZENG B. Improved perceptual video encryption using multiple 8×8 transforms in MPEG-4[C]. 2012 7th International ICST Conference on Communications and Networking, Kunming, 2012: 185-188. doi: 10.1109/ ChinaCom.2012.6417472.
[10]
ZHANG X Y, DENG H C, and CHEN L W. The video encryption scheme based on perceptual encryption algorithm in H.264 standards[J]. Advaced Materials Research, 2013, 765/767: 615-619. doi: 4028/www. scientific.net/AMR.765- 767.615.
[11]
SHEN H, ZHUO L, and LI Y. A prediction reference structure based hierarchical perceptual encryption algorithm for H.264 bitstream[J]. Intelligence Science and Big Data Engineering, 2013: 852-859. doi: 10.1007/978-3-642-42057- 3_107.
[12]
ZHU H, ZHAO C, and ZHANG X. A novel image encryption- compression scheme using hyper-chaos and Chinese
ASGHAR M N, GHANBARI M, FLEURY M, et al. Confidentiality of a selectively encrypted H.264 coded video bit-stream[J]. Journal of Visual Communication & Image Representation, 2014, 25: 487-498. doi: 10.1016/j.jvcir.2013. 12.015.
[14]
ZHUO L, MAO N S, ZHANG J, et al. Bit-sensitivity based video encryption scheme in compressed domain[J]. International Journal of Advancements in Computing Technology, 2012, 4(8): 155-164. doi: 10.4156/ijact.vol4. issue8.19.
[15]
ASGHAR M N and GHANBARI M. An efficient security system for CABAC bin-strings of H.264/SVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(3): 425-437. doi: 10.1109/TCSVT.2012.2204941.
[16]
ASGHAR M N, GHANBARI M, and REED M J. Sufficient encryption with codewords and bin-strings of H.264/SVC[C]. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012: 443-450. doi: 10.1109/TrustCom.2012.268.
[17]
SHAHID Z, CHAUMONT M, and PUECH W. Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(5): 565-576. doi: 10.1109/TCSVT.2011.2129090.
[18]
WANG Y, O,NEILL M, and KURUGOLLU F. A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(9): 1476-1490. doi: 10.1109/TCSVT.2013.2248588.
[19]
MENEZES A J, VAN OORESCHOT P C, and VANSTONE S A. Handbook of Applied Cryptography[M]. Boca Raton: CRC Press, 1996. doi: 10.1201/9781439821916.
[20]
WANG Z, LU L, and BOVIK A C. Video quality assessment based on structural distortion measurement[J]. Signal Processing: Image Communication, 2004, 19(2): 121-132. doi: 10.1016/S0923-5965(03)00076-6.