计算机科学 ›› 2022, Vol. 49 ›› Issue (1): 314-320.doi: 10.11896/jsjkx.201100089

• 信息安全 • 上一篇    下一篇

基于宏块编码信息自适应置换的H.264/AVC视频加密方法

梁剑, 何军辉   

  1. 华南理工大学计算机科学与工程学院 广州510006
  • 收稿日期:2020-11-12 修回日期:2021-03-05 出版日期:2022-01-15 发布日期:2022-01-18
  • 通讯作者: 何军辉(hejh@scut.edu.cn)
  • 作者简介:doc.liang@qq.com
  • 基金资助:
    广东省自然科学基金(2019A1515011231)

H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information

LIANG Jian, HE Jun-hui   

  1. School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,China
  • Received:2020-11-12 Revised:2021-03-05 Online:2022-01-15 Published:2022-01-18
  • About author:LIANG Jian,born in 1996,postgra-duate.His main research interests include cyber security and multimedia signal processing.
    HE Jun-hui,born in 1976,Ph.D,asso-ciate professor.His main research in-terests include cyber security and multimedia signal processing.
  • Supported by:
    Natural Science Foundation of Guangdong Province(2019A1515011231).

摘要: 云存储的发展使人们愿意将个人视频数据传输至云端,但伴随而来的数据安全问题日益突出,选择加密是对视频进行隐私保护的有效手段之一。针对目前H.264/AVC视频选择加密方法普遍存在安全性不足的问题,文中提出了一种基于宏块编码信息自适应置换的H.264/AVC视频加密方法。该方法根据宏块的编码类型逐帧自适应生成伪随机序列,利用伪随机序列将宏块编码信息中的残差编码方案(Coded Block Pattern,CBP)和残差数据(Residual)在宏块间进行随机置换,同时还对I宏块的帧内预测模式以及P宏块与B宏块的运动向量差值的符号进行加密。实验结果表明,该方法可保证加密视频兼容H.264/AVC编码标准,并具有加密空间大、密钥敏感性好、视频码率变化小的特点。与现有的主流加密方案相比,所提方法在视觉安全性和抵抗最新提出的轮廓攻击方面表现更佳。

关键词: H.264/AVC, 编码信息, 选择加密, 云服务, 自适应置换

Abstract: The development of cloud storage makes people willing to upload personal video to the cloud,but the data security problems brought by it have become increasingly prominent,selective encryption is one of the effective ways to protect video privacy.Aiming at the problem of insufficient security in the current H.264/AVC video selective encryption method,a novel H.264/AVC video selective encryption method based on adaptive permutation of macroblock coding information is proposed.The method adaptively generates pseudo-random sequence frame by frame according to the macroblock types,uses the pseudo-random sequence to randomly permute the coded block pattern (CBP) and the residual data in the coding information of a macroblock between macroblocks,changes the intra prediction modes of I macroblocks,and flips the signs of motion vector differences of P macroblocks and B macroblocks.Experimental results show that the proposed method can preserve format compatibility with H.264/AVC coding standard,and has characteristics of large encryption space,good key sensitivity,and small video bitrate variation.Compared with the existing encryption schemes,the proposed method performs better in terms of visual security and resistance to state of the art of sketch attack.

Key words: Adaptive permutation, Cloud service, Coding information, H.264/AVC, Selective encryption

中图分类号: 

  • TP309
[1]TABASH F K,IZHARUDDIN M.Encryption techniques forH.264/AVC videos:A literature review[J].Journal of Information Security and Applications,2019,45(APR.):20-34.
[2]BOHO A,WALLENDAEL G V,DOOMS A,et al.End-to-end security for video distribution[J].IEEE Signal Processing Ma-gazine,2013,30(2):97-107.
[3]AHN J,SHIM H J,JEON B,et al.Digital VideoScramblingMethod Using Intra Prediction Mode[C]//Conference on Advances in Multimedia Information Processing-PCM.2004:386-393.
[4]LI Y,LIANG L,SU Z,et al.A New Video Encryption Algorithm for H.264[C]//IEEE International Conference on Information,2005:1121-1124.
[5]KHLIF N,DAMAK T,KAMMOUN F,et al.Motion vectorssigns encryption for H.264/AVC[C]//IEEE International Conference on Advanced Technologies for Signal & Image Proces-sing,2014:1-6.
[6]SU P C,HSU C W,WU C Y.A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting[J].Multimedia Tools & Applications,2011,52(2/3):529-549.
[7]SHEN H,ZHUO L,ZHAO Y.An efficient motion referencestructure based selective encryption algorithm for H.264 videos[J].IET Information Security,2014,8(3):199-206.
[8]WANG Y,O'NEILL M,KURUGOLLU F.Partial encryption by randomized zig-zag scanning for video encoding[C]//IEEE International Symposium on Circuits & Systems.2013:229-232.
[9]DING X,DENG Y,YANG G,et al.Design of new scan orders for perceptual encryption of H.264/AVC videos[J].IET Information Security,2017,11(2):55-65.
[10]DI X Q,WANG Y Z,LI J Q,et al.Video encryption methodbased on hyperchaos of quantum cellular neural network[J].Journal of Jilin University (Engineering and Technology Edition),2018,48(3):919-928.
[11]BAI S,GUO Y,ZHAO B,et al.H.264 video perceptual encryption algorithm with controllable visual quality based on CABAC[J].Journal of Electronics and Information,2016,38(10):2582-2589.
[12]WANG Y S,O'NEILL.A Tunable Encryption Scheme andAnalysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC[J].IEEE Transactions on Circuits & Systems for Video Technology,2013,23(9):1476-1490.
[13]PENG F,GONG X Q,LONG M,et al.A selective encryptionscheme for protecting H.264/AVC video in multimedia social network[J].Multimedia Tools and Applications,2017,76(3):3235-3253.
[14]XU D,WANG R,SHI Y Q.Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution[J].IEEE Tran-sactions on Information Forensics and Security,2014,9(4):596-606.
[15]KHLIF N,MASMOUDI A,KAMMOUN F,et al.Secure chao-tic dual encryption scheme for H.264/AVC video conferencing protection[J].IET Image Processing,2018,12(1):42-52.
[16]LIU S,RHO S,JIFARA W,et al.A hybrid framework of data hiding and encryption in H.264/SVC[J].Discrete Applied Mathematics,2018,241:48-57.
[17]MINEMURA K,WONG K.A novel sketch attack for H.264/AVC format-compliant encrypted video[J].IEEE Transactions on Circuits and Systems for Video Technology,2017,27(11):2309-2321.
[18]WIEGAND T,SULLIVAN G J,BJONTEGAARD G,et al.Overview of the H.264/AVC video coding standard[J].IEEE Transactions on Circuits & Systems for Video Technology,2003,13(7):560-576.
[19]LIU B,BAAS B M.Parallel AES Encryption Engines for Many-Core Processor Arrays[J].IEEE Transactions on Computers,2013,62(3):536-547.
[20]SKARLATOS D,YAN M,GOPIREDDY B,et al.MicroScope:Enabling Microarchitectural Replay Attacks[C]//ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA).2019:318-331.
[21]KARATZAS D,SHAFAIT F,UCHIDA S,et al.ICDAR 2013robust reading competition[C]//12th International Conference on Document Analysis and Recognition (ICDAR).2013:1484-1493.
[22]WANG H,GAN W,HU S,et al.MCL-JCV:A JND-based H.264/AVC video quality assessment dataset[C]//IEEE International Conference on Image Processing (ICIP).2016:1509-1513.
[23]OU T S,HUANG Y H,CHEN H H.SSIM-Based PerceptualRate Control for Video Coding[J].IEEE Transactions on Circuits and Systems for Video Technology,2011,21(5):682-691.
[24]LI Z,AARON A,KATSAVOUNIDISI,et al.Toward A Practical Perceptual Video Quality Metric[EB/OL].(2016-06-06).http://techblog.netflix.com/2016/06/toward-practical-percep-tual-video.html.
[25]CANNY J.A Computational Approach To Edge Detection[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1986,PAMI-8(6):679-698.
[26]OTSU N.A threshold selection method from gray level histo-gram[J].IEEE Transactions on Systems,Man,and Cyberne-tics,1979,9(1):62-66.
[27]WU Y,NOONAN J S,AGAIAN S.NPCR and UACI Randomness Tests for Image Encryption[J].Cyber Journals:Multidisciplinary Journals in Science and Technology,Journal of Selected Areas in Telecommunications,2011(April):31-38.
[1] 蒋慧敏, 蒋哲远.
企业云服务体系结构的参考模型与开发方法
Reference Model and Development Methodology for Enterprise Cloud Service Architecture
计算机科学, 2021, 48(2): 13-22. https://doi.org/10.11896/jsjkx.200300044
[2] 王勤, 魏立斐, 刘纪海, 张蕾.
基于云服务器辅助的多方隐私交集计算协议
Private Set Intersection Protocols Among Multi-party with Cloud Server Aided
计算机科学, 2021, 48(10): 301-307. https://doi.org/10.11896/jsjkx.210300308
[3] 高子妍, 王勇.
面向云服务的分布式消息系统负载均衡策略
Load Balancing Strategy of Distributed Messaging System for Cloud Services
计算机科学, 2020, 47(6A): 318-324. https://doi.org/10.11896/JsJkx.191100012
[4] 贾志淳, 李想, 于湛麟, 卢元, 邢星.
基于二阶隐马尔科夫模型的云服务QoS满意度预测
QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model
计算机科学, 2019, 46(9): 321-324. https://doi.org/10.11896/j.issn.1002-137X.2019.09.049
[5] 刘明聪, 王娜, 周宁.
基于依赖分析的云组合服务信息流控制机制
Dependency Analysis Based Cloud Composition Service Information Flow Control Mechanism
计算机科学, 2019, 46(4): 189-196. https://doi.org/10.11896/j.issn.1002-137X.2019.04.030
[6] 杨璐,叶晓俊.
云服务环境下的密钥管理问题和挑战
Key Management Issues and Challenges in Cloud
计算机科学, 2017, 44(3): 3-9. https://doi.org/10.11896/j.issn.1002-137X.2017.03.002
[7] 徐爱萍,吴笛,徐武平,陈军.
在线多任务异构云服务器负载均衡算法研究
Research on Online Multi-task Load Balance Algorithm in Cloud Server Cluster
计算机科学, 2016, 43(6): 50-54. https://doi.org/10.11896/j.issn.1002-137X.2016.06.010
[8] 朱华旻,吴礼发,康红凯.
基于SecLA的云服务商选择方法研究
Research of Cloud Provider Selection Method Based on SecLA
计算机科学, 2016, 43(5): 100-107. https://doi.org/10.11896/j.issn.1002-137X.2016.05.019
[9] 陈红松,王钢,傅忠传.
基于分段模型检测的云服务跨域认证协议的形式化分析与验证
Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check
计算机科学, 2016, 43(4): 140-144. https://doi.org/10.11896/j.issn.1002-137X.2016.04.028
[10] 沈张果,楼俊钢,马小龙,麻旺勇.
一种基于机制理论的云市场多类型资源分配定价机制
Resource Allocation and Pricing Mechanism for Multi-type Resources of Cloud Market Based on Mechanism Theory
计算机科学, 2014, 41(6): 59-62. https://doi.org/10.11896/j.issn.1002-137X.2014.06.012
[11] 王晋东,卫波,张恒巍,何嘉婧.
云计算环境下服务信任评估方法研究
Research on Service Trust Evaluation Approach under Cloud Computing Environment
计算机科学, 2014, 41(12): 38-42. https://doi.org/10.11896/j.issn.1002-137X.2014.12.009
[12] 梁员宁,陈建良,叶笠.
云服务可靠性优化方法研究
Research on Reliability Optimal Method of Cloud Service
计算机科学, 2013, 40(8): 129-135.
[13] 刘志中,王志坚,薛霄,鲁保云.
基于文化社会认知算法的云服务优化组合研究
Research on Cloud Service Composition Based on Culture Social Cognitive Optimization Algorithm
计算机科学, 2013, 40(5): 103-106.
[14] 仲伟波,孟艳茹.
基于时空相关的H.264多参考帧快速选择算法
Fast Multiple Reference Frame Selection Algorithm for H.264 Based on Temporal and Spatial Correlation
计算机科学, 2013, 40(5): 93-96.
[15] 张拥军,史殿习,肖玺,吴振东,丁博.
基于代理的移动云服务访问机制的研究与实现
Research and Implementation of Mobile Cloud Services Access Mechanism Based on Proxy
计算机科学, 2013, 40(5): 58-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!