Abstract
In this work we present and analyze a conceptually novel encryption method for digital videos. This type of encryption has several advantages over currently available video encryption algorithms. We analyze both security and performance aspects of our method, and show that the method is efficient and secure from a cryptographic point of view. Even though the approach is currently feasible only for a selected class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmission. In: Proc. IEEE Symposium on Network and Distributed System Security (SNDSS 1996), San Diego, CA, February 22-23, pp. 137–144. IEEE Computer Society, Los Alamitos (1996)
Chan, C.-K., Chan, C.-K., Lee, L.-P., Cheng, L.M.: Encryption System Based On Neural Network. In: Communications and Multimedia Security Issuses of the New Century, pp. 117–122. Kluwer Academic Publishers, Boston (2001)
Furht, B., Muharemagic, E.A., Socek, D.: Multimedia Security: Encryption and Watermarking, Multimedia Systems and Applications, vol. 28. Springer, Heidelberg (2005)
Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic Encryption Scheme for Real-Time Digital Video. In: Real-Time Imaging VI, Proc. SPIE, vol. 4666, pp. 149–160 (2002)
Li, S., Chen, G., Zheng, X.: Multimedia Security Handbook. In: Furht, B., Kirovski, D. (eds.) Chaos-Based Encryption for Digital Images and Videos. Internet and Communications Series, ch. 4. CRC Press, Boca Raton (2004)
Li, S., Li, C., Chen, G., Bourbakis, N.G.: A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms, IACR’s Cryptology ePrint Archive: Report 2004/374 (2004)
Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, November 17-19 (2003)
Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1 Video, Project Description of SECMPEG, Technical University of Berlin, Germany (May 1995), http://www.gadegast.de/frank/doc/secmeng.pdf
Mihaljević, M.J., Kohno, R.: Cryptanalysis of Fast Encryption Algorithm for Multimedia FEA-M. IEEE Trans. Comm. Letters 6(9), 382–384 (2002)
Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proc. First International Conference on Imaging Science, Systems and Technology (CISST 1997), Las Vegas, NV, June 30-July 3, pp. 21–29 (1997)
Qiao, L., Nahrstedt, K., Tam, M.-C.: Is MPEG Encryption by Using Random List Instead of Zigzag Order Secure? In: Proc. IEEE Intl. Symposium on Consumer Electronics, Singapore, pp. 226–229. IEEE Comp. Soc., Los Alamitos (1997)
Seidel, T.E., Socek, D., Sramka, M.: Cryptanalysis of Video Encryption Algorithms, vol. 29, pp. 1–9. Tatra Mountains Mathematical Publications (2004)
Bhargava, B., Shi, C., Wang, S.-Y.: MPEG Video Encryption Algorithms. Multimedia Tools and Applications 24(1), 57–79 (2004)
Socek, D., Culibrk, D.: On the Security of a Clipped Hopfield Neural Network Cryptosystem. In: Proc. of the ACM Multimedia and Security Workshop (ACM-MM-Sec 2005), New York City, NY, August 1-2, pp. 71–75 (2005)
Spanos, G.A., Maples, T.B.: Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications. In: Proc. IEEE 15th Intl. Phoenix Conf. on Computers and Communications, Scottsdale, AZ, March 27-29, pp. 72–78 (1996)
Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proc. Fourth ACM International Multimedia Conference, Boston, MA, November 18-22, pp. 219–230 (1996)
Yi, X., Tan, C.H., Siew, C.K., Syed, M.R.: Fast Encryption for Multimedia. IEEE Trans. Consumer Eletronics 47(1), 101–107 (2001)
Youssef, A.M., Tavares, S.E.: Comments on the Security of Fast Encryption Algorithm for Multimedia (FEA-M). IEEE Trans. Consumer Eletronics 49(1), 168–170 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Socek, D., Kalva, H., Magliveras, S.S., Marques, O., Ćulibrk, D., Furht, B. (2006). A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos. In: Campilho, A., Kamel, M.S. (eds) Image Analysis and Recognition. ICIAR 2006. Lecture Notes in Computer Science, vol 4141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11867586_51
Download citation
DOI: https://doi.org/10.1007/11867586_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44891-4
Online ISBN: 978-3-540-44893-8
eBook Packages: Computer ScienceComputer Science (R0)