Computer Science ›› 2022, Vol. 49 ›› Issue (1): 314-320.doi: 10.11896/jsjkx.201100089

• Information Security • Previous Articles     Next Articles

H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information

LIANG Jian, HE Jun-hui   

  1. School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,China
  • Received:2020-11-12 Revised:2021-03-05 Online:2022-01-15 Published:2022-01-18
  • About author:LIANG Jian,born in 1996,postgra-duate.His main research interests include cyber security and multimedia signal processing.
    HE Jun-hui,born in 1976,Ph.D,asso-ciate professor.His main research in-terests include cyber security and multimedia signal processing.
  • Supported by:
    Natural Science Foundation of Guangdong Province(2019A1515011231).

Abstract: The development of cloud storage makes people willing to upload personal video to the cloud,but the data security problems brought by it have become increasingly prominent,selective encryption is one of the effective ways to protect video privacy.Aiming at the problem of insufficient security in the current H.264/AVC video selective encryption method,a novel H.264/AVC video selective encryption method based on adaptive permutation of macroblock coding information is proposed.The method adaptively generates pseudo-random sequence frame by frame according to the macroblock types,uses the pseudo-random sequence to randomly permute the coded block pattern (CBP) and the residual data in the coding information of a macroblock between macroblocks,changes the intra prediction modes of I macroblocks,and flips the signs of motion vector differences of P macroblocks and B macroblocks.Experimental results show that the proposed method can preserve format compatibility with H.264/AVC coding standard,and has characteristics of large encryption space,good key sensitivity,and small video bitrate variation.Compared with the existing encryption schemes,the proposed method performs better in terms of visual security and resistance to state of the art of sketch attack.

Key words: Adaptive permutation, Cloud service, Coding information, H.264/AVC, Selective encryption

CLC Number: 

  • TP309
[1]TABASH F K,IZHARUDDIN M.Encryption techniques forH.264/AVC videos:A literature review[J].Journal of Information Security and Applications,2019,45(APR.):20-34.
[2]BOHO A,WALLENDAEL G V,DOOMS A,et al.End-to-end security for video distribution[J].IEEE Signal Processing Ma-gazine,2013,30(2):97-107.
[3]AHN J,SHIM H J,JEON B,et al.Digital VideoScramblingMethod Using Intra Prediction Mode[C]//Conference on Advances in Multimedia Information Processing-PCM.2004:386-393.
[4]LI Y,LIANG L,SU Z,et al.A New Video Encryption Algorithm for H.264[C]//IEEE International Conference on Information,2005:1121-1124.
[5]KHLIF N,DAMAK T,KAMMOUN F,et al.Motion vectorssigns encryption for H.264/AVC[C]//IEEE International Conference on Advanced Technologies for Signal & Image Proces-sing,2014:1-6.
[6]SU P C,HSU C W,WU C Y.A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting[J].Multimedia Tools & Applications,2011,52(2/3):529-549.
[7]SHEN H,ZHUO L,ZHAO Y.An efficient motion referencestructure based selective encryption algorithm for H.264 videos[J].IET Information Security,2014,8(3):199-206.
[8]WANG Y,O'NEILL M,KURUGOLLU F.Partial encryption by randomized zig-zag scanning for video encoding[C]//IEEE International Symposium on Circuits & Systems.2013:229-232.
[9]DING X,DENG Y,YANG G,et al.Design of new scan orders for perceptual encryption of H.264/AVC videos[J].IET Information Security,2017,11(2):55-65.
[10]DI X Q,WANG Y Z,LI J Q,et al.Video encryption methodbased on hyperchaos of quantum cellular neural network[J].Journal of Jilin University (Engineering and Technology Edition),2018,48(3):919-928.
[11]BAI S,GUO Y,ZHAO B,et al.H.264 video perceptual encryption algorithm with controllable visual quality based on CABAC[J].Journal of Electronics and Information,2016,38(10):2582-2589.
[12]WANG Y S,O'NEILL.A Tunable Encryption Scheme andAnalysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC[J].IEEE Transactions on Circuits & Systems for Video Technology,2013,23(9):1476-1490.
[13]PENG F,GONG X Q,LONG M,et al.A selective encryptionscheme for protecting H.264/AVC video in multimedia social network[J].Multimedia Tools and Applications,2017,76(3):3235-3253.
[14]XU D,WANG R,SHI Y Q.Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution[J].IEEE Tran-sactions on Information Forensics and Security,2014,9(4):596-606.
[15]KHLIF N,MASMOUDI A,KAMMOUN F,et al.Secure chao-tic dual encryption scheme for H.264/AVC video conferencing protection[J].IET Image Processing,2018,12(1):42-52.
[16]LIU S,RHO S,JIFARA W,et al.A hybrid framework of data hiding and encryption in H.264/SVC[J].Discrete Applied Mathematics,2018,241:48-57.
[17]MINEMURA K,WONG K.A novel sketch attack for H.264/AVC format-compliant encrypted video[J].IEEE Transactions on Circuits and Systems for Video Technology,2017,27(11):2309-2321.
[18]WIEGAND T,SULLIVAN G J,BJONTEGAARD G,et al.Overview of the H.264/AVC video coding standard[J].IEEE Transactions on Circuits & Systems for Video Technology,2003,13(7):560-576.
[19]LIU B,BAAS B M.Parallel AES Encryption Engines for Many-Core Processor Arrays[J].IEEE Transactions on Computers,2013,62(3):536-547.
[20]SKARLATOS D,YAN M,GOPIREDDY B,et al.MicroScope:Enabling Microarchitectural Replay Attacks[C]//ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA).2019:318-331.
[21]KARATZAS D,SHAFAIT F,UCHIDA S,et al.ICDAR 2013robust reading competition[C]//12th International Conference on Document Analysis and Recognition (ICDAR).2013:1484-1493.
[22]WANG H,GAN W,HU S,et al.MCL-JCV:A JND-based H.264/AVC video quality assessment dataset[C]//IEEE International Conference on Image Processing (ICIP).2016:1509-1513.
[23]OU T S,HUANG Y H,CHEN H H.SSIM-Based PerceptualRate Control for Video Coding[J].IEEE Transactions on Circuits and Systems for Video Technology,2011,21(5):682-691.
[24]LI Z,AARON A,KATSAVOUNIDISI,et al.Toward A Practical Perceptual Video Quality Metric[EB/OL].(2016-06-06).http://techblog.netflix.com/2016/06/toward-practical-percep-tual-video.html.
[25]CANNY J.A Computational Approach To Edge Detection[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1986,PAMI-8(6):679-698.
[26]OTSU N.A threshold selection method from gray level histo-gram[J].IEEE Transactions on Systems,Man,and Cyberne-tics,1979,9(1):62-66.
[27]WU Y,NOONAN J S,AGAIAN S.NPCR and UACI Randomness Tests for Image Encryption[J].Cyber Journals:Multidisciplinary Journals in Science and Technology,Journal of Selected Areas in Telecommunications,2011(April):31-38.
[1] JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22.
[2] GAO Zi-yan and WANG Yong. Load Balancing Strategy of Distributed Messaging System for Cloud Services [J]. Computer Science, 2020, 47(6A): 318-324.
[3] JIA Zhi-chun, LI Xiang, YU Zhan-lin, LU Yuan, XING Xing. QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model [J]. Computer Science, 2019, 46(9): 321-324.
[4] LIU Ming-cong, WANG Na, ZHOU Ning. Dependency Analysis Based Cloud Composition Service Information Flow Control Mechanism [J]. Computer Science, 2019, 46(4): 189-196.
[5] YANG Lu and YE Xiao-jun. Key Management Issues and Challenges in Cloud [J]. Computer Science, 2017, 44(3): 3-9.
[6] CHEN Hong-song, WANG Gang and FU Zhong-chuan. Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check [J]. Computer Science, 2016, 43(4): 140-144.
[7] SHEN Zhang-guo,LOU Jun-gang,MA Xiao-long and MA Wang-yong. Resource Allocation and Pricing Mechanism for Multi-type Resources of Cloud Market Based on Mechanism Theory [J]. Computer Science, 2014, 41(6): 59-62.
[8] WANG Jin-dong,WEI Bo,ZHANG Heng-wei and He Jia-jing. Research on Service Trust Evaluation Approach under Cloud Computing Environment [J]. Computer Science, 2014, 41(12): 38-42.
[9] LIANG Yuan-ning,CHEN Jian-liang and YE Li. Research on Reliability Optimal Method of Cloud Service [J]. Computer Science, 2013, 40(8): 129-135.
[10] LIU Zhi-zhong,WANG Zhi-jian,XUE Xiao and LU Bao-yun. Research on Cloud Service Composition Based on Culture Social Cognitive Optimization Algorithm [J]. Computer Science, 2013, 40(5): 103-106.
[11] ZHONG Wei-bo and MENG Yan-ru. Fast Multiple Reference Frame Selection Algorithm for H.264 Based on Temporal and Spatial Correlation [J]. Computer Science, 2013, 40(5): 93-96.
[12] ZHANG Yong-jun,SHI Dian-xi,XIAO Xi,WU Zhen-dong and DING Bo. Research and Implementation of Mobile Cloud Services Access Mechanism Based on Proxy [J]. Computer Science, 2013, 40(5): 58-61.
[13] . Survey on Embedded Urban Computing [J]. Computer Science, 2013, 40(3): 8-15.
[14] . Research on RFID Process Definition Language Based on Cloud Service [J]. Computer Science, 2012, 39(Z11): 114-118.
[15] . Stochastic Model Checking Composed Services in Cloud Computing Environment [J]. Computer Science, 2012, 39(10): 31-34.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!