Abstract
Selective Encryption (SE) offers effective and efficient protection of visual content for assuring video confidentiality. However, it is challenging to optimize SE’s computational overhead while maintaining encryption effectiveness. This paper suggests the study of classifying the targeted sign-flip Quantized Coefficients (QC) so as to minimize the Encryption Computation Overhead (ECO), while maximizing Perceptual Encryption Effectiveness (PEE) both across the H.264/AVC and the HEVC video coding standards. The evaluation of this min-max optimization is based on the number of encryption bits used to flip the targeted QC sign and the Peak Signal to Noise Ratio (PSNR) estimated post encryption for quantifying ECO and PEE respectively. Results of simulation on different video sequences indicate that the derived set of QC’s can reduce ECO cost by up to 78 % without affecting the video confidentiality when compared to state-of-the-art approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
AES website: http://buchholz.hs-bremen.de/aes/aes.html.
- 2.
Standard videos: Highway, News, Foreman, Bridge (Close), Carphone, Coastguard, Container, Hall Monitor, Highway and Mobile.
- 3.
Standard Video Website: http://trace.eas.asu.edu/yuv/.
- 4.
HEVC software repository (main at HHI), http://hevc.hhi.fraunhofer.de.
References
Pande, A., Zambreno, J.: Securing Multimedia Content Using Joint Compression and Encryption, Embedded Multimedia Security Systems, vol. Part 1, pp. 23–30. Springer, London (2013)
Yang, S., Sun, S.: A video encryption method based on chaotic maps in DCT domain. Prog. Nat. Sci. 18(10), 1299–1304 (2008)
Wei, Z., Wu, Y., Ding, X., Deng, R.H.: A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Sig. Process. Image Commun. 27(9), 1011–1024 (2012)
Shahid, Z., Puech, W.: Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings. IEEE Trans. Multimedia 16(1), 24–36 (2014)
Stutz, T., Uhl, A.: A survey of H.264 AVC/SVC encryption. IEEE Trans. Circuits Syst. Video Technol. 22(3), 325–339 (2012)
Saini, M., Atrey, P., Mehrotra, S., Kankanhalli, M.: Anonymous surveillance. In: 2011 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–60 July 2011
Boho, A., Van Wallendael, G., Dooms, A., De Cock, J., Braeckman, G., Schelkens, P., Preneel, B., Van de Walle, R.: End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. IEEE Signal Process. Mag. 30(2), 97–107 (2013)
Wang, Y., O’Neill, M., Kurugollu, F.: Adaptive binary mask for privacy region protection. In: 2012 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1127–1130 May 2012
Dufaux, F., Ebrahimi, T.: Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1168–1174 (2008)
Tong, L., Dai, F., Zhang, Y., Li, J.: Restricted H.264/AVC video coding for privacy region scrambling. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2089–2092 September 2010
Yeung, S.-K.A., Zhu, S., Zeng, B.: Partial video encryption based on alternating transforms. IEEE Signal Process. Lett. 16(10), 893–896 (2009)
Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264/AVC by selective encryption of CABAC. In: IEEE International Conference on Multimedia and Expo, 2009. ICME 2009, pp. 1038–1041 July 2009
Muhit, A., Pickering, M., Frater, M., Arnold, J.: Video coding using elastic motion model and larger blocks. IEEE Trans. Circuits Syst. Video Technol. 20(5), 661–672 (2010)
Sullivan, G., Ohm, J., Han, W.-J., Wiegand, T.: Overview of the High Efficiency Video Coding (HEVC) standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649–1668 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Almarashda, K., Dawood, A., Martin, T., Al-Mualla, M., Bhaskar, H. (2015). An Optimized Selective Encryption for Video Confidentiality. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2015. Lecture Notes in Computer Science(), vol 9164. Springer, Cham. https://doi.org/10.1007/978-3-319-20801-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-20801-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20800-8
Online ISBN: 978-3-319-20801-5
eBook Packages: Computer ScienceComputer Science (R0)