Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames

被引:110
作者
Shahid, Zafar [1 ]
Chaumont, Marc [1 ]
Puech, William [1 ]
机构
[1] Univ Montpellier 2, Lab Informat Robot & Microelect, F-34392 Montpellier, France
关键词
AES algorithm; CABAC; CAVLC; selective encryption; stream cipher; video security; PRIVACY PROTECTION; VIDEO; COMPRESSION; IMAGES;
D O I
10.1109/TCSVT.2011.2129090
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a novel method for the protection of bitstreams of state-of-the-art video codec H.264/AVC. The problem of selective encryption (SE) is addressed along with the compression in the entropy coding modules. H.264/AVC supports two types of entropy coding modules. Context-adaptive variable length coding (CAVLC) is supported in H.264/AVC baseline profile and context-adaptive binary arithmetic coding (CABAC) is supported in H.264/AVC main profile. SE is performed in both types of entropy coding modules of this video codec. For this purpose, in this paper the encryption step is done simultaneously with the entropy coding CAVLC or CABAC. SE is performed by using the advanced encryption standard (AES) algorithm with the cipher feedback mode on a subset of codewords/binstrings. For CAVLC, SE is performed on equal length codewords from a specific variable length coding table. In case of CABAC, it is done on equal length binstrings. In our scheme, entropy coding module serves the purpose of encryption cipher without affecting the coding efficiency of H.264/AVC by keeping exactly the same bitrate, generating completely compliant bitstream and utilizing negligible computational power. Owing to no escalation in bitrate, our encryption algorithm is better suited for real-time multimedia streaming over heterogeneous networks. It is perfect for playback on handheld devices because of negligible increase in processing power. Nine different benchmark video sequences containing different combinations of motion, texture, and objects are used for experimental evaluation of the proposed algorithm.
引用
收藏
页码:565 / 576
页数:12
相关论文
共 39 条
[1]  
[Anonymous], 2005, Cryptography: Theory and Practice
[2]  
[Anonymous], ICIP 2005
[3]  
[Anonymous], 2010, INT J COMPUT ELECT E, DOI DOI 10.7763/IJCEE.2010.V2.141
[4]  
Bellarc M, 2009, LECT NOTES COMPUT SC, V5867, P295, DOI 10.1007/978-3-642-05445-7_19
[5]  
BJONTEGAARD G, 2002, JVTC028
[6]  
CARRILLO P, 2009, EURASIP J INFORM SEC, P13
[7]   Partial encryption of compressed images and videos [J].
Cheng, H ;
Li, XB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) :2439-2451
[8]  
Daemen J., 2002, Technical Report
[9]  
DROOGENBROECK MV, 2002, P ADV CONC INT VIS S, P90
[10]   Scrambling for privacy protection in video surveillance systems [J].
Dufaux, Frederic ;
Ebrahimi, Touradj .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (08) :1168-1174