|
|
CABAC Based H.264 Video Perceptual Encryption Algorithm with Adjustable Visual Quality |
BAI Sen① GUO Yu①② ZHAO Bo① DAI Qinfang③ |
①(Chongqing Communication Institute, Chongqing 400035, China)
②(Unit 77108 of PLA, Chongzhou 611230, China)
③(Unit 78088 of PLA, Chongqing 400039, China) |
|
|
Abstract In Video on Demand (VoD) applications it is desired that the encrypted multimedia data are still partially perceptible after encryption in order to stimulate the purchase of the high-quality versions of the multimedia products. This perceptual encryption requires specific algorithms for encrypting the video data. In this paper, a Context-based Adaptive Binary Arithmetic Coding (CABAC) video perceptual encryption scheme is designed. The video quality of this encryption scheme is controllable. The important syntax elements and sensitive coded elements are chosen to encrypt using mathematical XOR operations with stream ciphers generated by 2D hyper chaos system. The encryption scheme is composed of encrypting Motion Vector Differences (MVD) sign, non-zero coefficients sign and significant_coeff_flag. Theoretical analysis and experimental results show that the proposed scheme has no impact on bit rate. With the 7‰ encoding time increasing, the video quality can be controlled by the change of the quality factor, which meets the requirement of the video perceptual encryption.
|
Received: 29 December 2015
Published: 26 August 2016
|
|
Fund: The National Natural Science Foundation of China (61272043), Basic & Frontier Project of Chongqing (cstc2013 jjB40009), Chongqing Enhancement Project on Research & Development Base (cstc2014pt-sy40003) |
Corresponding Authors:
BAI Sen
E-mail: baisencq@126.com
|
|
|
|
[1] |
张小红, 袁春经. 控制关键帧选择的H.264熵编码加密算法[J].中国图象图形学报, 2014, 19(3): 358-364. doi: 10.11834/jig. 20140303.
|
|
ZHANG Xiaohong and YUAN Chunjing. H.264 video entropy coding encryption by controlling key frames[J]. Journal of Image and Graphics, 2014, 19(3): 358-364. doi: 10.11834/jig.20140303.
|
[2] |
HAMIDOUCHE W, FARAJALLAH M, RAULET M, et al. Selective vide encryption using chaotic system in the SHVC extension[C]. International Conference on Acoustics, Speech and Signal Procesing (ICASSP), Sydney, Australia, 2015: 1762-1766. doi: 10.1109/ICASSP.2015.7178273.
|
[3] |
LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. Circuits and Systems for Video Technology, 2007, 17(2): 214-223. doi: 10.1109/TCSVT.2006.888840.
|
[4] |
WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H.264[J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15: 73-78. doi: 10.1016/S1005- 8885(08)60159-4.
|
[5] |
AU Yeung S K, ZHU S, and ZENG B. Design of new unitary transforms for perceptual video encryption[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(9): 1341-1345. doi: 10.1109/TCSVT.2011.2125630.
|
[6] |
AU Yeung S K and ZENG B. Visual quality control for perceptual video encryption with multiple transforms[C]. 2012 7th International ICST Conference on Communications and Networking, Kun ming, 2012: 189-192. doi: 10.1109/ ChinaCom.2012.6417473.
|
[7] |
ZENG B, AU YEUNG S K, ZHU S, et al. Perceptual encryption of H. 264 videos: embedding sign-flips into the integer-based transforms[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2): 309-320. doi: 10.1109/TIFS.2013. 2293955.
|
[8] |
AU YEUNG S K and ZENG B. A new design of multiple transforms for perceptual video encryption[C]. 2012 19th IEEE International Conference on Image Processing, Orlando, 2012: 2637-2640. doi: 10.1109/ICIP.2012.6467440.
|
[9] |
AU YEUNG S K and ZENG B. Improved perceptual video encryption using multiple 8×8 transforms in MPEG-4[C]. 2012 7th International ICST Conference on Communications and Networking, Kunming, 2012: 185-188. doi: 10.1109/ ChinaCom.2012.6417472.
|
[10] |
ZHANG X Y, DENG H C, and CHEN L W. The video encryption scheme based on perceptual encryption algorithm in H.264 standards[J]. Advaced Materials Research, 2013, 765/767: 615-619. doi: 4028/www. scientific.net/AMR.765- 767.615.
|
[11] |
SHEN H, ZHUO L, and LI Y. A prediction reference structure based hierarchical perceptual encryption algorithm for H.264 bitstream[J]. Intelligence Science and Big Data Engineering, 2013: 852-859. doi: 10.1007/978-3-642-42057- 3_107.
|
[12] |
ZHU H, ZHAO C, and ZHANG X. A novel image encryption- compression scheme using hyper-chaos and Chinese
|
|
remainder theorem[J]. Signal Processing: Image Communication, 2013, 28(6): 670-680. doi: 10.1016/j.image. 2013.02.004.
|
[13] |
ASGHAR M N, GHANBARI M, FLEURY M, et al. Confidentiality of a selectively encrypted H.264 coded video bit-stream[J]. Journal of Visual Communication & Image Representation, 2014, 25: 487-498. doi: 10.1016/j.jvcir.2013. 12.015.
|
[14] |
ZHUO L, MAO N S, ZHANG J, et al. Bit-sensitivity based video encryption scheme in compressed domain[J]. International Journal of Advancements in Computing Technology, 2012, 4(8): 155-164. doi: 10.4156/ijact.vol4. issue8.19.
|
[15] |
ASGHAR M N and GHANBARI M. An efficient security system for CABAC bin-strings of H.264/SVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(3): 425-437. doi: 10.1109/TCSVT.2012.2204941.
|
[16] |
ASGHAR M N, GHANBARI M, and REED M J. Sufficient encryption with codewords and bin-strings of H.264/SVC[C]. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012: 443-450. doi: 10.1109/TrustCom.2012.268.
|
[17] |
SHAHID Z, CHAUMONT M, and PUECH W. Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(5): 565-576. doi: 10.1109/TCSVT.2011.2129090.
|
[18] |
WANG Y, O,NEILL M, and KURUGOLLU F. A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(9): 1476-1490. doi: 10.1109/TCSVT.2013.2248588.
|
[19] |
MENEZES A J, VAN OORESCHOT P C, and VANSTONE S A. Handbook of Applied Cryptography[M]. Boca Raton: CRC Press, 1996. doi: 10.1201/9781439821916.
|
[20] |
WANG Z, LU L, and BOVIK A C. Video quality assessment based on structural distortion measurement[J]. Signal Processing: Image Communication, 2004, 19(2): 121-132. doi: 10.1016/S0923-5965(03)00076-6.
|
|
|
|