Efficient encryption technique for H.264/AVC videos based on CABAC and logistic map

  • Fatma K. TabashEmail author
  • Muhammed Izharuddin


Nowadays, the use of real time video communication is growing with a rapid pace. For example, Search and Rescue (SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in highway and surveillance are some of the applications of real time video communication. Most of these video communications require secure transmission of signals. For real time video communication, the processing time is considered as the most important metric to be optimized. Thus, finding a simple and time efficient encryption technique for securing the transmitted data becomes mandatory. The motive behind this work is to design a system that can process the video signal in real time providing a secure communication. In this paper, we present an efficient encryption technique which has low computation complexity. The proposed technique is based on Context-Adaptive Binary Arithmetic Coding (CABAC) where the bin-string of Intra-Prediction Mode, Motion Vector Difference (MVD) and residue coefficients are encrypted with the random behavior of chaotic systems. The random bit streams used for encryption are generated with chaotic systems using Logistic map. The experimental results show that the proposed technique is very effective for real-time applications and robust against different types of attacks.


Encryption Video coding CABAC H.264/AVC 



  1. 1.
    Bodke N, Khule J, Shinde P, Kapse S, Kumavat K (2015) A Novel Approach for Codeword Substitution using Encrypted H.264/AVC Video Streams for Data Hiding. Int J Comput Appl 128(4):6–10Google Scholar
  2. 2.
    ITU-T Recommendation H.264 (2012) Series H: Audiovisual and multimedia systems. Infrastructure of audiovisual services - Coding of moving video. Advanced video coding for generic audiovisual servicesGoogle Scholar
  3. 3.
    Li Y, Liang L, Su Z, Jiang J (2005) A new video encryption algorithm for H.264. In: Proc. 5th ICICS, pp. 1121–1124Google Scholar
  4. 4.
    Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A Novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Math Comput Model ELSEVIER 58:85–95CrossRefGoogle Scholar
  5. 5.
    Lian S, Liu Z, Ren Z, Wang H (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consumer Electron 52(2):621–629CrossRefGoogle Scholar
  6. 6.
    Lian S, Sun J, Liu G, Wang Z (2008) Efficient video encryption scheme based on advanced video coding. Multimedia Tools Applicat 38(1):75–89CrossRefGoogle Scholar
  7. 7.
    Lian S, Sun J, Wang Z et al (2005) Security analysis of a chaos-based image encryption algorithm. Physica A: Statistical Mechanics and its Applications 351(2–4):645–661CrossRefGoogle Scholar
  8. 8.
    Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) Cubic reference table based image steganography. Journal of Multimedia Tools and Applications, Springer 77:10033–10050CrossRefGoogle Scholar
  9. 9.
    Liao X, Zheng Q, Ding L (2017) Data embedding in digital images using critical functions. Journal of Signal Processing: Image Communication, Elsevier 58:156–156Google Scholar
  10. 10.
    Liu Y, Yuan C, Zhong Y (2007) A new digital rights management system in mobile applications using H.264 encryption. Proc 9th Int Conf Adv Commun Technol 1:583–586CrossRefGoogle Scholar
  11. 11.
    Magli E, Grangetto M, Olmo G (2006) Conditional access to H.264/AVC video with drift control. In: Proc. IEEE ICME, pp. 1353–1356Google Scholar
  12. 12.
    Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard. IEEE Trans Circuits Syst Video Technol 13(7):620–636CrossRefGoogle Scholar
  13. 13.
    Podesser M, Schmidt H, Uhl A (2002) Selective bitplane encryption for secure transmission of image data in mobile environments. In CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, NorwayGoogle Scholar
  14. 14.
    Shahid Z, Chaumont M, Puech W (2011) Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P frames. IEEE Trans Circuits Syst Video Technol 21(5):565–576CrossRefGoogle Scholar
  15. 15.
    Su P-C, Hsu C-W, Wu C-Y (2011) A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting. Multimedia Tools Applicat 52(2–3):529–549CrossRefGoogle Scholar
  16. 16.
    Tong L, Dai F, Zhang Y, Li J (2010) Prediction restricted H.264/AVC video scrambling for privacy protection. Electron Lett 46(1):47–49CrossRefGoogle Scholar
  17. 17.
    Wang Y, O’Neill M, Kurugollu F (2012) The Improved sign bit Encryption of Motion Vectors for H.264/AVC. EURASIP, 20th European Signal Processing Conference (EUSIPCO 2012), Bucharest, pp. 1752-1756Google Scholar
  18. 18.
    Yeung S-KA, Zhu S, Zeng B (2009) Partial video encryption based on alternating transforms. IEEE Signal Process Lett 16(10):893–896CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer EngineeringAligarh Muslim UniversityAligarhIndia

Personalised recommendations