Privacy-Preserving H.264 Video Encryption Scheme

被引:8
作者
Choi, SuGil [1 ]
Han, Jong-Wook [1 ]
Cho, Hyunsook
机构
[1] ETRI, Software Res Lab, Knowledge Based Informat Secur & Safety Res Div, Convergence Serv Secur Res Team, Taejon, South Korea
关键词
H.264 video encryption; privacy protection; video surveillance; block shuffling;
D O I
10.4218/etrij.11.0110.0644
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating the security by counting the number of brute-force trials is not proper for measuring the security of video encryption algorithms, considering that attackers can devise specially crafted attacks for specific purposes by exploiting the characteristics of the target video codec. In this paper, we introduce a new attack for recovering contour information from encrypted H.264 video. The attack can thus be used to extract face outlines for the purpose of personal identification. We analyze the security of previous video encryption schemes against the proposed attack and show that the security of these schemes is lower than expected in terms of privacy protection. To enhance security, an advanced block shuffling method is proposed, an analysis of which shows that it is more secure than the previous method and can be an improvement against the proposed attack.
引用
收藏
页码:935 / 944
页数:10
相关论文
共 25 条
[1]  
Abomhara Mohamed., 2010, International Journal of Computer Theory and Engineering, V2, P103, DOI DOI 10.7763/IJCTE.2010.V2.123
[2]  
[Anonymous], 2002, Introduction to MPEG-7: Multimedia Content Description Interface
[3]  
[Anonymous], 2009, BOARD WIR SEC VID SU
[4]  
[Anonymous], 2003, 159386 ISOIEC
[5]  
Bergeron C., 2005, INT WORKSH MULT PROC, P477
[6]  
Bradski GR, 2000, PROC CVPR IEEE, P796, DOI 10.1109/CVPR.2000.854964
[7]   REGISTRATION OF TRANSLATED AND ROTATED IMAGES USING FINITE FOURIER-TRANSFORMS [J].
DECASTRO, E ;
MORANDI, C .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1987, 9 (05) :700-703
[8]   Scrambling for privacy protection in video surveillance systems [J].
Dufaux, Frederic ;
Ebrahimi, Touradj .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (08) :1168-1174
[9]  
ITU-T and ISO/IEC JTC 1, 2007, ADV VID COD GEN AUD
[10]  
Kondo H., 2004, INT C AUT ROB AG DEC, P240