Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection

被引:19
作者
Khlif, Naziha [1 ]
Masmoudi, Atef [1 ]
Kammoun, Fahmi [1 ]
Masmoudi, Nouri [1 ]
机构
[1] Sfax Univ, Dept Elect, Natl Engn Sch Sfax, Lab Elect & Informat Technol, Rd Soukra Km 3-5,BP 3038, Sfax, Tunisia
关键词
chaotic communication; video coding; cryptography; variable length codes; data compression; data protection; adaptive codes; secure chaotic dual encryption scheme; H; 264; AVC video conferencing protection; chaos-based crypto-compression scheme; advanced video coding protection; selective encryption approach; context adaptive variable length coding; inter-prediction encryption; intra-prediction encryption; format compliance; compression ratio; piecewise linear chaotic maps; pseudorandom bit generators; decision module; video compression standards; SELECTIVE ENCRYPTION; CAVLC; MAPS; COMPRESSION; CABAC;
D O I
10.1049/iet-ipr.2017.0022
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.
引用
收藏
页码:42 / 52
页数:11
相关论文
共 45 条
[31]  
Schneier B., 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[32]  
Shah J., 2011, INT J SCI, V8, P525
[33]   Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames [J].
Shahid, Zafar ;
Chaumont, Marc ;
Puech, William .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (05) :565-576
[34]   An efficient MPEG video encryption algorithm [J].
Shi, CG ;
Bhargava, B .
SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, :381-386
[35]   A Survey of H.264 AVC/SVC Encryption [J].
Stuetz, Thomas ;
Uhl, Andreas .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2012, 22 (03) :325-339
[36]  
Thomas N.M., 2007, IEEE P ICIP SEP, pIV
[37]  
Wang YS, 2013, IEEE INT SYMP CIRC S, P229, DOI 10.1109/ISCAS.2013.6571824
[38]   A Tunable Encryption Scheme and Analysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC [J].
Wang, Yongsheng ;
O'Neill, Maire ;
Kurugollu, Fatih .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2013, 23 (09) :1476-1490
[39]  
Wang YS, 2012, EUR SIGNAL PR CONF, P1752
[40]   Image quality assessment: From error visibility to structural similarity [J].
Wang, Z ;
Bovik, AC ;
Sheikh, HR ;
Simoncelli, EP .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (04) :600-612