计算机科学 ›› 2022, Vol. 49 ›› Issue (1): 314-320.doi: 10.11896/jsjkx.201100089
梁剑, 何军辉
LIANG Jian, HE Jun-hui
摘要: 云存储的发展使人们愿意将个人视频数据传输至云端,但伴随而来的数据安全问题日益突出,选择加密是对视频进行隐私保护的有效手段之一。针对目前H.264/AVC视频选择加密方法普遍存在安全性不足的问题,文中提出了一种基于宏块编码信息自适应置换的H.264/AVC视频加密方法。该方法根据宏块的编码类型逐帧自适应生成伪随机序列,利用伪随机序列将宏块编码信息中的残差编码方案(Coded Block Pattern,CBP)和残差数据(Residual)在宏块间进行随机置换,同时还对I宏块的帧内预测模式以及P宏块与B宏块的运动向量差值的符号进行加密。实验结果表明,该方法可保证加密视频兼容H.264/AVC编码标准,并具有加密空间大、密钥敏感性好、视频码率变化小的特点。与现有的主流加密方案相比,所提方法在视觉安全性和抵抗最新提出的轮廓攻击方面表现更佳。
中图分类号:
[1]TABASH F K,IZHARUDDIN M.Encryption techniques forH.264/AVC videos:A literature review[J].Journal of Information Security and Applications,2019,45(APR.):20-34. [2]BOHO A,WALLENDAEL G V,DOOMS A,et al.End-to-end security for video distribution[J].IEEE Signal Processing Ma-gazine,2013,30(2):97-107. [3]AHN J,SHIM H J,JEON B,et al.Digital VideoScramblingMethod Using Intra Prediction Mode[C]//Conference on Advances in Multimedia Information Processing-PCM.2004:386-393. [4]LI Y,LIANG L,SU Z,et al.A New Video Encryption Algorithm for H.264[C]//IEEE International Conference on Information,2005:1121-1124. [5]KHLIF N,DAMAK T,KAMMOUN F,et al.Motion vectorssigns encryption for H.264/AVC[C]//IEEE International Conference on Advanced Technologies for Signal & Image Proces-sing,2014:1-6. [6]SU P C,HSU C W,WU C Y.A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting[J].Multimedia Tools & Applications,2011,52(2/3):529-549. [7]SHEN H,ZHUO L,ZHAO Y.An efficient motion referencestructure based selective encryption algorithm for H.264 videos[J].IET Information Security,2014,8(3):199-206. [8]WANG Y,O'NEILL M,KURUGOLLU F.Partial encryption by randomized zig-zag scanning for video encoding[C]//IEEE International Symposium on Circuits & Systems.2013:229-232. [9]DING X,DENG Y,YANG G,et al.Design of new scan orders for perceptual encryption of H.264/AVC videos[J].IET Information Security,2017,11(2):55-65. [10]DI X Q,WANG Y Z,LI J Q,et al.Video encryption methodbased on hyperchaos of quantum cellular neural network[J].Journal of Jilin University (Engineering and Technology Edition),2018,48(3):919-928. [11]BAI S,GUO Y,ZHAO B,et al.H.264 video perceptual encryption algorithm with controllable visual quality based on CABAC[J].Journal of Electronics and Information,2016,38(10):2582-2589. [12]WANG Y S,O'NEILL.A Tunable Encryption Scheme andAnalysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC[J].IEEE Transactions on Circuits & Systems for Video Technology,2013,23(9):1476-1490. [13]PENG F,GONG X Q,LONG M,et al.A selective encryptionscheme for protecting H.264/AVC video in multimedia social network[J].Multimedia Tools and Applications,2017,76(3):3235-3253. [14]XU D,WANG R,SHI Y Q.Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution[J].IEEE Tran-sactions on Information Forensics and Security,2014,9(4):596-606. [15]KHLIF N,MASMOUDI A,KAMMOUN F,et al.Secure chao-tic dual encryption scheme for H.264/AVC video conferencing protection[J].IET Image Processing,2018,12(1):42-52. [16]LIU S,RHO S,JIFARA W,et al.A hybrid framework of data hiding and encryption in H.264/SVC[J].Discrete Applied Mathematics,2018,241:48-57. [17]MINEMURA K,WONG K.A novel sketch attack for H.264/AVC format-compliant encrypted video[J].IEEE Transactions on Circuits and Systems for Video Technology,2017,27(11):2309-2321. [18]WIEGAND T,SULLIVAN G J,BJONTEGAARD G,et al.Overview of the H.264/AVC video coding standard[J].IEEE Transactions on Circuits & Systems for Video Technology,2003,13(7):560-576. [19]LIU B,BAAS B M.Parallel AES Encryption Engines for Many-Core Processor Arrays[J].IEEE Transactions on Computers,2013,62(3):536-547. [20]SKARLATOS D,YAN M,GOPIREDDY B,et al.MicroScope:Enabling Microarchitectural Replay Attacks[C]//ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA).2019:318-331. [21]KARATZAS D,SHAFAIT F,UCHIDA S,et al.ICDAR 2013robust reading competition[C]//12th International Conference on Document Analysis and Recognition (ICDAR).2013:1484-1493. [22]WANG H,GAN W,HU S,et al.MCL-JCV:A JND-based H.264/AVC video quality assessment dataset[C]//IEEE International Conference on Image Processing (ICIP).2016:1509-1513. [23]OU T S,HUANG Y H,CHEN H H.SSIM-Based PerceptualRate Control for Video Coding[J].IEEE Transactions on Circuits and Systems for Video Technology,2011,21(5):682-691. [24]LI Z,AARON A,KATSAVOUNIDISI,et al.Toward A Practical Perceptual Video Quality Metric[EB/OL].(2016-06-06).http://techblog.netflix.com/2016/06/toward-practical-percep-tual-video.html. [25]CANNY J.A Computational Approach To Edge Detection[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1986,PAMI-8(6):679-698. [26]OTSU N.A threshold selection method from gray level histo-gram[J].IEEE Transactions on Systems,Man,and Cyberne-tics,1979,9(1):62-66. [27]WU Y,NOONAN J S,AGAIAN S.NPCR and UACI Randomness Tests for Image Encryption[J].Cyber Journals:Multidisciplinary Journals in Science and Technology,Journal of Selected Areas in Telecommunications,2011(April):31-38. |
[1] | 蒋慧敏, 蒋哲远. 企业云服务体系结构的参考模型与开发方法 Reference Model and Development Methodology for Enterprise Cloud Service Architecture 计算机科学, 2021, 48(2): 13-22. https://doi.org/10.11896/jsjkx.200300044 |
[2] | 王勤, 魏立斐, 刘纪海, 张蕾. 基于云服务器辅助的多方隐私交集计算协议 Private Set Intersection Protocols Among Multi-party with Cloud Server Aided 计算机科学, 2021, 48(10): 301-307. https://doi.org/10.11896/jsjkx.210300308 |
[3] | 高子妍, 王勇. 面向云服务的分布式消息系统负载均衡策略 Load Balancing Strategy of Distributed Messaging System for Cloud Services 计算机科学, 2020, 47(6A): 318-324. https://doi.org/10.11896/JsJkx.191100012 |
[4] | 贾志淳, 李想, 于湛麟, 卢元, 邢星. 基于二阶隐马尔科夫模型的云服务QoS满意度预测 QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model 计算机科学, 2019, 46(9): 321-324. https://doi.org/10.11896/j.issn.1002-137X.2019.09.049 |
[5] | 刘明聪, 王娜, 周宁. 基于依赖分析的云组合服务信息流控制机制 Dependency Analysis Based Cloud Composition Service Information Flow Control Mechanism 计算机科学, 2019, 46(4): 189-196. https://doi.org/10.11896/j.issn.1002-137X.2019.04.030 |
[6] | 杨璐,叶晓俊. 云服务环境下的密钥管理问题和挑战 Key Management Issues and Challenges in Cloud 计算机科学, 2017, 44(3): 3-9. https://doi.org/10.11896/j.issn.1002-137X.2017.03.002 |
[7] | 徐爱萍,吴笛,徐武平,陈军. 在线多任务异构云服务器负载均衡算法研究 Research on Online Multi-task Load Balance Algorithm in Cloud Server Cluster 计算机科学, 2016, 43(6): 50-54. https://doi.org/10.11896/j.issn.1002-137X.2016.06.010 |
[8] | 朱华旻,吴礼发,康红凯. 基于SecLA的云服务商选择方法研究 Research of Cloud Provider Selection Method Based on SecLA 计算机科学, 2016, 43(5): 100-107. https://doi.org/10.11896/j.issn.1002-137X.2016.05.019 |
[9] | 陈红松,王钢,傅忠传. 基于分段模型检测的云服务跨域认证协议的形式化分析与验证 Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check 计算机科学, 2016, 43(4): 140-144. https://doi.org/10.11896/j.issn.1002-137X.2016.04.028 |
[10] | 沈张果,楼俊钢,马小龙,麻旺勇. 一种基于机制理论的云市场多类型资源分配定价机制 Resource Allocation and Pricing Mechanism for Multi-type Resources of Cloud Market Based on Mechanism Theory 计算机科学, 2014, 41(6): 59-62. https://doi.org/10.11896/j.issn.1002-137X.2014.06.012 |
[11] | 王晋东,卫波,张恒巍,何嘉婧. 云计算环境下服务信任评估方法研究 Research on Service Trust Evaluation Approach under Cloud Computing Environment 计算机科学, 2014, 41(12): 38-42. https://doi.org/10.11896/j.issn.1002-137X.2014.12.009 |
[12] | 梁员宁,陈建良,叶笠. 云服务可靠性优化方法研究 Research on Reliability Optimal Method of Cloud Service 计算机科学, 2013, 40(8): 129-135. |
[13] | 刘志中,王志坚,薛霄,鲁保云. 基于文化社会认知算法的云服务优化组合研究 Research on Cloud Service Composition Based on Culture Social Cognitive Optimization Algorithm 计算机科学, 2013, 40(5): 103-106. |
[14] | 仲伟波,孟艳茹. 基于时空相关的H.264多参考帧快速选择算法 Fast Multiple Reference Frame Selection Algorithm for H.264 Based on Temporal and Spatial Correlation 计算机科学, 2013, 40(5): 93-96. |
[15] | 张拥军,史殿习,肖玺,吴振东,丁博. 基于代理的移动云服务访问机制的研究与实现 Research and Implementation of Mobile Cloud Services Access Mechanism Based on Proxy 计算机科学, 2013, 40(5): 58-61. |
|