Separable authentication in encrypted HEVC video

  • Yiqi Tew
  • KokSheik Wong
  • Raphael C.-W. Phan
  • King Ngi Ngan
Article
  • 9 Downloads

Abstract

A joint encryption and authentication scheme for HEVC compressed video is proposed in this work. It produces a HEVC format compliant video stream that permits the authentication process to be carried out irregardless of the video being in the encrypted or plaintext (i.e., decrypted) form. To achieve this separable property, one set of syntax elements within the HEVC standard is utilized to achieve authentication, while another set is exploited for encryption. Specifically, for authentication, information such as coding unit size in each video slice is utilized to generate the authentication code, which is then embedded into each video slice to detect the tampered regions. A two-level authentication method is implemented to facilitate the legitimacy verification process. On the other hand, for video encryption, syntax elements in the HEVC standard including Sign Bins, Transform Skip Bins and Suffix Bins are randomized to perceptually distort the video. Experiment results show that by using the proposed encryption modules, the perceptual quality of the plaintext video can be distorted, and the distorted video can be restored to the original HEVC compressed video. Furthermore, the proposed joint scheme is verified to be viable in detecting and localizing the tampered regions. Finally, a pragmatic comparison among the proposed and conventional joint schemes is performed.

Keywords

Separable HEVC Encryption Authentication Coding unit size Information hiding 

References

  1. 1.
    Alassaf N, Alkazemin B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in iot systems. Journal of Research in Engineering and Applied SciencesGoogle Scholar
  2. 2.
    Aljuaid N, Gutub A (2014a) 2-layer security system for hiding sensitive text data on personal computers. Lect Notes Inf Theory 2(2):151–157Google Scholar
  3. 3.
    Aljuaid N, Gutub A (2014b) Flexible stego-system for hiding text in images of personal computers based on user security priority. Proc 2014 Int Conf Adv Eng Technol 2(2):250–256Google Scholar
  4. 4.
    Aljuaid N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers. 12th Learning and Technology Conference: Wearable Tech / Wearable LearningGoogle Scholar
  5. 5.
    Atrey P K, Saddik A E, Kankanhalli M (2009) Digital video authentication hershey: IGI Global. United State of America, HersheyGoogle Scholar
  6. 6.
    Bjøntegaard G (2001) VCEG-M33: Calculation of average PSNR differences between RD curves. Technical report, Video Coding Experts Group (VCEG). United State of America, AustinGoogle Scholar
  7. 7.
    Gutub A A A (2010) Pixel indicator technique for rgb image steganography. J Emerg Technol Web Intell 2(1):56–64Google Scholar
  8. 8.
    Gutub AAA, Khan FAA (2012) Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. International Conference on Advanced Computer Science Applications and TechnologiesGoogle Scholar
  9. 9.
    Hofbauer H, Uhl A, Unterweger A (2014) Transparent encryption for HEVC using bit-stream-based selective coefficient sign encryption. In: Proceeding of IEEE International Conference on Acoustic, Speech, Signal Processing, pp 1986–1990Google Scholar
  10. 10.
    ISO (2013) Information technology – High efficiency coding and media delivery in heterogeneous environments – part 2: High efficiency video coding. ISO/IEC 23008-2:2013 International Organization for Standardization, Geneva, SwitzerlandGoogle Scholar
  11. 11.
    Karim M S A, Wong K (2015) Data embedding in random domain. Signal Process 108:56–68CrossRefGoogle Scholar
  12. 12.
    Khan F, Gutub A (2007) Message concealment techniques using image based steganography. 4th IEEE GCC Conference and ExhibitionGoogle Scholar
  13. 13.
    Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92:918–932CrossRefGoogle Scholar
  14. 14.
    Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensic Secur 10 (3):458–470CrossRefGoogle Scholar
  15. 15.
    NIST (2002) Secure Hash Standard. FIPS PUB 180-2, National Institute of Standards and Technology, GaithersburgGoogle Scholar
  16. 16.
    Ong S, Wong K, Qi X, Tanaka K (2015a) Beyond format-compliant encryption for {JPEG} image. Signal Process: Image Commun 31:47–60Google Scholar
  17. 17.
    Ong S, Wong K, Tanaka K (2015b) Scrambling-embedding for JPEG compressed image. Signal Process 109:38–53Google Scholar
  18. 18.
    Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans Circ Syst Video Technol 26(4):636–646CrossRefGoogle Scholar
  19. 19.
    Rad R M, Wong K, Guo J M (2014) A unified data embedding and scrambling method. IEEE Trans Image Process 23(4):1463–1475MathSciNetCrossRefMATHGoogle Scholar
  20. 20.
    Shahid Z, Puech W (2014) Visual protection of hevc video by selective encryption of cabac binstrings. IEEE Trans Multimed 16:24–36CrossRefGoogle Scholar
  21. 21.
    Stallings W (2010) Cryptography and network security: principles and practice, 5th edn. Prentice Hall Press, Upper Saddle RiverGoogle Scholar
  22. 22.
    Sullivan G J, Ohm J R, Han W J, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circ Syst Video Technol 22 (12):1649–1668CrossRefGoogle Scholar
  23. 23.
    Sze V, Budagavi M (2012) High throughput CABAC entropy coding in HEVC. IEEE Trans Circ Syst Video Technol 22:1778–1791CrossRefGoogle Scholar
  24. 24.
    Tew Y, Wong K (2014) Information hiding in HEVC standard using adaptive coding block size decision. In: IEEE International Conference on Image Processing (ICIP), pp 5502–5506Google Scholar
  25. 25.
    Tew Y, Wong K, Phan R C W, Ngan K N (2016) Multi-layer authentication scheme for hevc video based on embedded statistics. J Vis Commun Image Represent 40:502–515CrossRefGoogle Scholar
  26. 26.
    Vivienne Sze GJS, Budagavi M (2014) High efficieny video coding (HEVC): Algorithms and architectures, 1st edn. Springer International Publishing, BerlinGoogle Scholar
  27. 27.
    Waddilove R (2015) Best free video editing software 2016 uk. http://www.pcadvisor.co.uk/test-centre/photo-video/best-free-video-editing-software-2016-3614829/, [Accessed 1-April-2016]
  28. 28.
    Wien M (2014) High efficieny video coding: Coding tools and specification, 1st edn. Springer-Verlag, Berlin HeidelbergGoogle Scholar
  29. 29.
    Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensic Secur 7(2):826–832CrossRefGoogle Scholar
  30. 30.
    Zhou J, Sun W, Dong L, Liu X, Au O C, Tang Y Y (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26(3):441–452CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Yiqi Tew
    • 1
  • KokSheik Wong
    • 2
  • Raphael C.-W. Phan
    • 3
  • King Ngi Ngan
    • 4
  1. 1.Tunku Abdul Rahman University CollegeKuala LumpurMalaysia
  2. 2.Monash UniversitySelangorMalaysia
  3. 3.Multimedia UniversitySelangorMalaysia
  4. 4.Chinese University of Hong KongHong KongChina

Personalised recommendations