{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T05:11:37Z","timestamp":1654146697567},"reference-count":27,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"

With the wide use of H.264 in Internet and wireless network, many concerns have been made to the security of it. Aiming at providing an effective content protection method for H.264 video, a novel selective encryption scheme based on chaotic Qi system is proposed in this paper. The unpredictability of chaotic system is implemented to construct a pseudo-random number generator based on the 3-dimensional chaotic Qi system, and then some key data such as intra-prediction modes, residual coefficients and MVD are encrypted by the generated key stream. Experimental results and analysis show that the proposed scheme can achieve a good encryption result, a low computational complexity, little impact on compression ratio, and good format compatibility. It has a great potential to be applied in some real-time applications.<\/p>","DOI":"10.4018\/jdcf.2013040103","type":"journal-article","created":{"date-parts":[[2013,9,3]],"date-time":"2013-09-03T16:09:07Z","timestamp":1378224547000},"page":"35-49","source":"Crossref","is-referenced-by-count":1,"title":["An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System"],"prefix":"10.4018","volume":"5","author":[{"given":"Fei","family":"Peng","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Hunan University, Changsha, China"}]},{"given":"Xiao-wen","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Hunan University, Changsha, China"}]},{"given":"Min","family":"Long","sequence":"additional","affiliation":[{"name":"College of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]}],"member":"2432","reference":[{"key":"jdcf.2013040103-0","doi-asserted-by":"crossref","unstructured":"Ahn, J., Shim, H. J., Jeon, B., & Choi, I. (2004). Digital video scrambling method using intra prediction mode. In Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III, Tokyo, Japan.","DOI":"10.1007\/978-3-540-30543-9_49"},{"key":"jdcf.2013040103-1","doi-asserted-by":"crossref","unstructured":"Asghar, M. N., Ghanbari, M., & Reed, M. J. (2012). Sufficient encryption with codewords and bin-strings of H.264\/SVC. In Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 443-450).","DOI":"10.1109\/TrustCom.2012.268"},{"key":"jdcf.2013040103-2","doi-asserted-by":"crossref","unstructured":"Chen, G. (2003). Chaotification via feedback control: Theories, methods, and applications. In Proceedings of 2003 International Conference on Physics and Control (pp. 468-474).","DOI":"10.1109\/PHYCON.2003.1236867"},{"key":"jdcf.2013040103-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"jdcf.2013040103-4","unstructured":"Chen, Q., & Zhang, Z. (2012). New video compression and encryption algorithm based on hyper-chaos. In Proceedings of 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) (pp. 1869-1873)."},{"key":"jdcf.2013040103-5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"key":"jdcf.2013040103-6","doi-asserted-by":"crossref","unstructured":"Jiang, J., Xing, S., & Qi, M. (2009). An intra prediction mode-based video encryption algorithm in H.264. In Proceedings of International Conference on Multimedia Information Networking and Security (MINES '09) (pp. 478-482).","DOI":"10.1109\/MINES.2009.26"},{"key":"jdcf.2013040103-7","unstructured":"Joint Video Team (JVT) of ISO\/IEC MPEG and ITU-T VCEG, JVT-G050. (2005). Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264|ISO\/IEC 14496-10 AVC)."},{"key":"jdcf.2013040103-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.12.021"},{"key":"jdcf.2013040103-9","unstructured":"Mao, N., Zhuo, L., Zhang, J., & Li, X. (2012). Fast compression domain video encryption scheme for H.264\/AVC streaming. In Proceedings of 14th International Conference on Advanced Communication Technology (ICACT) (pp. 425-429)."},{"key":"jdcf.2013040103-10","author":"J.Meyer","year":"1995","journal-title":"Security mechanisms for multimedia data with the example MPEG-1 video. Project Description of SECMPEG"},{"key":"jdcf.2013040103-11","doi-asserted-by":"crossref","unstructured":"Qi, G., Chen, G., Du, S., Chen, Z., & Yuan, Z. (2005). Analysis of a new chaotic system. Physica A: Statistical Mechanics and its Applications, 352(2-4), 295-308.","DOI":"10.1016\/j.physa.2004.12.040"},{"key":"jdcf.2013040103-12","unstructured":"Qiao, L. T., & Nahrstedt, K. (1997). A new algorithm for MPEG video encryption. In Proceeding of The First International Conference on Imaging Science, Systems, and Technology (CISST' 97) (pp. 21-29)."},{"key":"jdcf.2013040103-13","doi-asserted-by":"crossref","unstructured":"Rukhin, A., & Soto, J. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic application. NIST Special Publication 800-22.","DOI":"10.6028\/NIST.SP.800-22"},{"key":"jdcf.2013040103-14","doi-asserted-by":"crossref","unstructured":"Shahid, Z., Chaumont, M., & Puech, W. (2009). Selective and scalable encryption of enhancement layers for dyadic scalable H.264\/AVC by scrambling of scan patterns. In Proceedings of 16th IEEE International Conference on Image Processing (ICIP) (pp. 1273-1276).","DOI":"10.1109\/ICIP.2009.5413605"},{"key":"jdcf.2013040103-15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2129090"},{"key":"jdcf.2013040103-16","doi-asserted-by":"crossref","unstructured":"Shang, F., Sun, K., & Cai, Y. (2008). An efficient MPEG video encryption scheme based on chaotic cipher. In Proceedings of Congress on Image and Signal Processing (CISP '08) (pp. 12-16).","DOI":"10.1109\/CISP.2008.462"},{"issue":"10","key":"jdcf.2013040103-17","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems.","volume":"28","author":"C. E.Shannon","year":"1949","journal-title":"The Bell System Technical Journal"},{"key":"jdcf.2013040103-18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5767-7"},{"key":"jdcf.2013040103-19","doi-asserted-by":"crossref","unstructured":"Stutz, T., & Uhl, A. (2008). Format-compliant encryption of H.264\/AVC and SVC. In Proceedings of Tenth IEEE International Symposium on Multimedia (pp. 446-451).","DOI":"10.1109\/ISM.2008.52"},{"key":"jdcf.2013040103-20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2162290"},{"key":"jdcf.2013040103-21","doi-asserted-by":"crossref","unstructured":"Tang, L. (1996). Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the Fourth ACM International Conference on Multimedia, Boston, MA.","DOI":"10.1145\/244130.244209"},{"key":"jdcf.2013040103-22","doi-asserted-by":"crossref","unstructured":"Tosun, A. S., & Feng, W. C. (2000). Efficient multi-layer coding and encryption of MPEG video streams. In Proceedings of IEEE International Conference on Multimedia and Expo(ICME 2000) (pp. 119-122).","DOI":"10.1109\/ICME.2000.869559"},{"key":"jdcf.2013040103-23","unstructured":"Tosun, A. S., & Feng, W. C. (2001). Lightweight security mechanisms for wireless video transmission. In Proceedings of the International Conference on Information Technology: Coding and Computing (pp. 157-161)."},{"key":"jdcf.2013040103-24","unstructured":"Wang, Y., O'Neill, M., & Kurugollu, F. (2012). The improved sign bit encryption of motion vectors for H.264\/AVC. In Proceedings of the 20th European Signal Processing Conference (EUSIPCO) (pp. 1752-1756)."},{"key":"jdcf.2013040103-25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2002.800321"},{"key":"jdcf.2013040103-26","doi-asserted-by":"crossref","unstructured":"Wu, C. P., & Kuo, C. C. J. (2001). Efficient multimedia encryption via entropy codec design. In Proceedings of SPIE 4314, Security and Watermarking of Multimedia Contents III (pp. 128-138).","DOI":"10.1117\/12.435392"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=83488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:24:05Z","timestamp":1654133045000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2013040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2013040103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}