Skip to main content
Log in

An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The challenge to which the encryption of multimedia data needs to respond is ensuring the security of data intensive video stream in an efficient way. Unlike full data encryption, selective encryption manages to achieve this by encrypting only a part of the data stream, while providing a satisfactory level of video security. This optimizes the processing time and the size of encrypted data. Regardless of the encryption technique, there is a lack of cryptographic synchronization when providing random access to the selected part of the encrypted multimedia stream. In this paper we propose a novel and efficient method of cryptographic synchronization as an extension to the H.265/HEVC crypto encoder in order to support random access in selectively encrypted video stream.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. * IntraPeriod parameter defines the number of images (frames) between two adjacent IRAP images.

References

  1. Baroncini V, Ohm JR, Sullivan G (2010) Report of subjective test results of responses to the joint call for proposals (CfP) on Video Coding Technology for High Efficiency Video Coding (HEVC). ITU-T/ISO/IEC Joint Collaborative Team on Video Coding (JCT-VC), Doc. JCTVC-A204, Geneva, CH, Tech. Rep

  2. Dubois L, Puech W, Blanc-Talon J (2011) Fast protection of H.264/AVC by reduced selective encryption of CAVLC. In: Proc. European Signal Processing Conference, Barcelona, Spain, pp 2185–2189. doi: 10.1109/TCSVT.2011.2129090

  3. High Efficiency Video Coding, ITU-TRec.H.265 and ISO/IEC23008–2 (MPEG-H, Part 2), Apr (2013) version 1

  4. Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Transactions on Multimedia 10(3):330–338. doi:10.1109/TMM.2008.917355

    Article  Google Scholar 

  5. Jiang MQJ, Xing S (2009) An intra prediction mode-based video encryption algorithm in H.264. In: proc. International Conference on Multimedia Information Networking and Security 1, pp 478–482. doi: 10.1109/MINES.2009.26

  6. Lee HJ, Nam J (2006) Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain. In: Proc. ACM International Conference on Multimedia, New York, N Y, USA pp 93–96. doi: 10.1145/1180639.1180668

  7. Lian S, Liu Z, Ren Z, Wang Z (2005) Selective video encryption based on advanced video coding. In: Lecture notes in Computer Science, vol 3768. Springer-verlag, pp 281–290. doi: 10.1007/11582267_25

  8. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology 17(6):774–778. doi:10.1109/TCSVT.2007.896635

    Article  Google Scholar 

  9. McCann K, Bross B, Han WJ, Kim IK, Sugimoto K, Sullivan GJ (2014) High Efficiency Video Coding (HEVC) Test Model 15 (HM 15) Encoder Description. JCTVC-Q1002, Valencia, Spain

  10. Ohm J-R, Sullivan GJ, Schwarz H, Tan TK, Wiegand T (2012) Comparison of the coding efficiency of video coding standards - including high efficiency video coding (HEVC). IEEE Trans Circuits Syst Video Technol 22(12):1668–1683. doi:10.1109/TCSVT.2012.2221192

    Google Scholar 

  11. Ouamri M, Faraoun KM (2014) Robust and fast selective encryption for HEVC videos. J Commun Softw Syst 10(4)

  12. Park S, Shin S (2009) An efficient encryption and key management scheme for layered access control of H.264/scalable video coding. IEICE Trans Inf Syst 92(5):851–858. doi:10.1587/transinf.E92.D.851

    Article  Google Scholar 

  13. Shahid Z, Puech W (2014) Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Transactions on Multimedia, vol 16:24–36. doi:10.1109/TMM.2013.2281029

    Article  Google Scholar 

  14. Sullivan GJ, Ohm J-R, Han W-J, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Circuits and Systems for Video Technology 22(12):1649–1668. doi:10.1109/TCSVT.2012.2221191

    Article  Google Scholar 

  15. Van Wallendael G, Boho A, De Cock J, Munteanu A, Van de Walle R (2013) Encryption for high efficiency video coding with video adaptation capabilities. IEEE Transaction on Consumer Electronics 59(3):634–642. doi:10.1109/TCE.2013.6626250

    Article  Google Scholar 

  16. Wang J, Fan Y, Ikenaga T, Goto S (2007) A partial scramble scheme for H.264 Video. In: Proc. 7th International Conference on ASIC, Guln, China, pp. 802–805. doi: 10.1109/ICASIC.2007.4415752

  17. Wu C, Kuo C (2005) Design of Integrated Multimedia Compression and Encryption Systems. IEEE Transactions on Multimedia 7:828–839. doi:10.1109/TMM.2005.854469

    Article  Google Scholar 

  18. Yeung SKA, Zhu S, Zeng B (2011a) Design of new unitary transforms for perceptual video encryption. IEEE Trans Circuits Syst Video Technol 21(9):1341–1345. doi:10.1109/TCSVT.2011.2125630

    Article  Google Scholar 

  19. Yeung SKA, Zhu S, Zeng B (2011b) Perceptual video encryption using multiple 8 × 8 transforms in H.264 and MPEG-4. In: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, pp 2436–2439. doi: 10.1109/ICASSP.2011.5946976

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Boriša Jovanović.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jovanović, B., Gajin, S. An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC video stream. Multimed Tools Appl 77, 1537–1553 (2018). https://doi.org/10.1007/s11042-017-4389-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4389-3

Keywords

Navigation