Efficient encryption technique for H.264/AVC videos based on CABAC and logistic map

被引:8
作者
Tabash, Fatma K. [1 ]
Izharuddin, Muhammed [1 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Engn, Aligarh 202002, UP, India
关键词
Encryption; Video coding; CABAC; H; 264; AVC; SELECTIVE ENCRYPTION; SCHEME;
D O I
10.1007/s11042-018-6494-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the use of real time video communication is growing with a rapid pace. For example, Search and Rescue (SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in highway and surveillance are some of the applications of real time video communication. Most of these video communications require secure transmission of signals. For real time video communication, the processing time is considered as the most important metric to be optimized. Thus, finding a simple and time efficient encryption technique for securing the transmitted data becomes mandatory. The motive behind this work is to design a system that can process the video signal in real time providing a secure communication. In this paper, we present an efficient encryption technique which has low computation complexity. The proposed technique is based on Context-Adaptive Binary Arithmetic Coding (CABAC) where the bin-string of Intra-Prediction Mode, Motion Vector Difference (MVD) and residue coefficients are encrypted with the random behavior of chaotic systems. The random bit streams used for encryption are generated with chaotic systems using Logistic map. The experimental results show that the proposed technique is very effective for real-time applications and robust against different types of attacks.
引用
收藏
页码:7365 / 7379
页数:15
相关论文
共 18 条
  • [1] [Anonymous], 2012, AUD MULT SYST INFR H
  • [2] Bodke N, 2015, INT J COMPUT APPL, V128, P6
  • [3] A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
    Li, Xiong
    Ma, Jian
    Wang, Wendong
    Xiong, Yongping
    Zhang, Junsong
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 85 - 95
  • [4] Li Y, 2005, Proceedings of 2005 International Conference on Innovation & Management, P1120
  • [5] Security analysis of a chaos-based image encryption algorithm
    Lian, SG
    Sun, JS
    Wang, ZQ
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) : 645 - 661
  • [6] Efficient video encryption scheme based on advanced video coding
    Lian, Shiguo
    Sun, Jinsheng
    Liu, Guangjie
    Wang, Zhiquan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2008, 38 (01) : 75 - 89
  • [7] Secure advanced video coding based on selective encryption algorithms
    Lian, Shiguo
    Liu, Zhongxuan
    Ren, Zhen
    Wang, Haila
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2006, 52 (02) : 621 - 629
  • [8] Liao X, 2017, J SIGNAL PROCESSING, V58, P156, DOI DOI 10.1016/j.image.2017.03.002
  • [9] New cubic reference table based image steganography
    Liao, Xin
    Guo, Sujing
    Yin, Jiaojiao
    Wang, Huan
    Li, Xiong
    Sangaiah, Arun Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) : 10033 - 10050
  • [10] LIU Y, 2007, ICACT, V1, P583, DOI DOI 10.1109/ICACT.2007.358423