Selective Encryption for Hierarchical MPEG

  • Heinz Hofbauer
  • Thomas Stütz
  • Andreas Uhl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4237)


Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional functionality, which is of great benefit for streaming and networking applications. The MPEG-2 and MPEG-4 standards provide a scalability profile in which a resolution scalable mode is specified. In this paper we evaluate a selective encryption approach on the basis of our hierarchical MPEG video codec.


Motion Vector Video Stream Advanced Encryption Standard Replacement Attack Selective Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Kunkelmann, T.: Applying encryption to video communication. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia 1998, Bristol, England, pp. 41–47 (1998)Google Scholar
  2. 2.
    Dittmann, J., Steinmetz, R.: A technical approach to the transparent encryption of MPEG-2 video. In: Katsikas, S.K. (ed.) Communications and Multimedia Security, IFIP TC6/TC11 Third Joint Working Conference, CMS 1997, pp. 215–226. Chapman and Hall, Athens, Greece (1997)Google Scholar
  3. 3.
    Bhargava, B., Shi, C., Wang, Y.: MPEG video encryption algorithms. Multimedia Tools and Applications 24(1), 57–79 (2004)CrossRefGoogle Scholar
  4. 4.
    Qiao, L., Nahrstedt, K.: Comparison of MPEG encryption algorithms. International Journal on Computers and Graphics 22(3), 437–444 (1998) (Special Issue on Data Security in Image Communication and Networks)CrossRefGoogle Scholar
  5. 5.
    Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  6. 6.
    Stütz, T., Uhl, A.: Image confidentiality using Progressive JPEG. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, Springer, Heidelberg (2005)Google Scholar
  7. 7.
    Fisch, M.M., Stögner, H., Uhl, A.: Layered encryption techniques for DCT-coded visual data. In: Proceedings (CD-ROM) of the European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria (2004)Google Scholar
  8. 8.
    Wee, S., Apostolopoulos, J.: Secure scalable video streaming for wireless networks. In: Proceedings of the 2001 International Conference on Acoustics, Speech and Signal Processing (ICASSP 2001), Salt Lake City, Utah, USA (2001) (invited paper)Google Scholar
  9. 9.
    Wee, S., Apostolopoulos, J.: Secure scalable streaming enabling transcoding without decryption. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2001), Thessaloniki, Greece (2001)Google Scholar
  10. 10.
    Wee, S., Apostolopoulos, J.: Secure scalable streaming and secure transcoding with JPEG2000. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2003), Barcelona, Spain, vol. I, pp. 547–551 (2003)Google Scholar
  11. 11.
    Pennebaker, W., Mitchell, J.: JPEG – Still image compression standard. Van Nostrand Reinhold, New York (1993)Google Scholar
  12. 12.
    National Institute of Standards and Technology: FIPS-197 - advanced encryption standard (AES) (2001)Google Scholar
  13. 13.
    Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’04). IEEE Signal Processing Society, Singapore (2004)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • Heinz Hofbauer
    • 1
  • Thomas Stütz
    • 1
  • Andreas Uhl
    • 1
  1. 1.Department of Computer SciencesUniversity of SalzburgAustria

Personalised recommendations