Topic > Selective encryption algorithm for highly confidential data...

1. IntroductionConventional cryptographic algorithms, which generally aim to encrypt text-like data (known as the Naïve approach), are not suitable for video encryption. This is due to the fact that conventional cryptographic algorithms are unable to process large amounts of video data in real time. Selective encryption of the H.264/AVC bitstream allows the decoder to fully decode the encrypted video with little degradation in video quality. This perceptive encryption has low encryption and decryption time. Video data is compressed to reduce the storage space required and to save bandwidth for transmission. Video compression removes redundancy, so it's difficult to guess one portion of a compressed bitstream versus another. Furthermore, decompression algorithms depend on some parts of the compression syntax rather than others for reconstruction. The combination of these properties suggests selective encryption, the idea that a compressed bitstream can be adequately protected from attackers by encrypting only a portion of the bitstream. Reducing the encryption fraction can help reduce the overall complexity of the application, resulting in reduced encryption and decryption times. Selective encryption has been suggested for a number of specific real-time applications [1, 2]. The investigation conducted by F. Liu and H. Koenig [2] shows that almost all proposed selective video encryption algorithms have a relatively low level of security. Subsequently, Shahid et al. proposed to encrypt non-zero quantized coefficients using permutation of codes with the same length level_suffix for CAVLC in H.264/AVC [3]. Compared with sign bit encryption with non-zero coefficients, this method encrypts higher bits, which seems to provide better encryption effect and......half of the paper......7/s11042- 007-0150-7. [6] S. Lian, X. Chen, Secure and traceable media distribution for converged mobile TV services, Computer Communications 33 (14) (2010) 1664-1673. doi:10.1016/j.comcom.2010.03.015.[7] B. Bhargava, C. Shi, S.-Y. Wang, MPEG Video Encryption Algorithms, Multimedia Tools and Applications 24 (1) (2004), 57-79. doi:10.1023/B:MTAP.0000033983.62130.00.[8] A. Boho, G. Van Wallendael, A. Dooms, J. De Cock, G. Braeckman, P. Schelkens, B. Preneel, R. Van de Walle, End-to-end security for video distribution: combining cryptography, watermarking and video adaptation, Signal Processing Magazine, IEEE 30 (2) (2013), 97-107. doi:10.1109/MSP.2012.2230220.[9] L. Varlakshmi, G. Sudha, G. Jaikishan, A scalable and efficient video encryption scheme for real-time applications, Procedia Engineering 30 (0) (2012), 852 - 860. doi:10.1016/j.proeng.2012.01.937.