Advertisement

Multimedia Systems

, Volume 13, Issue 3, pp 191–204 | Cite as

New approaches to encryption and steganography for digital videos

  • Daniel SocekEmail author
  • Hari Kalva
  • Spyros S. Magliveras
  • Oge Marques
  • Dubravko Culibrk
  • Borko Furht
Regular Paper

Abstract

In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an extended classification of digital video encryption algorithms in order to clarify these advantages. We analyze both security and performance aspects of the proposed method, and show that the method is efficient and secure from a cryptographic point of view. Even though the method is currently feasible only for a certain class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability. Finally, we extend our approach into a novel type of digital video steganography where it is possible to disguise a given video with another video.

Keywords

Digital Video Encryption Algorithm Video Codec Video Encryption Selective Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alattar, A.M., Al-Regib, G.I.: Evaluation of selective encryption techniques for secure transmission of mpeg video bit-streams. In: Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS ’99), 30 May–2 June 1999, Orlando, FL, USA, vol. 4, pp. 340–343. IEEE Computer SocietyGoogle Scholar
  2. 2.
    Agi, I., Gong, L.: An empirical study of secure mpeg video transmission. In: Proceedings of the IEEE Symposium on Network and Distributed System Security (SNDSS ’96), 22–23 February 1996, San Diego, CA, USA, pp. 137–144. IEEE Computer SocietyGoogle Scholar
  3. 3.
    Bhargava B., Shi C., Wang S.-Y. (2004). Mpeg video encryption algorithms. Multimed. Tools Appl. 24(1): 57–79 CrossRefGoogle Scholar
  4. 4.
    Chan, C.-K., Chan, C.-K., Lee, L.-P., Cheng, L.-M.: Encryption system based on neural network. In: Proceedings of the IFIP TC6/TC11 5th Joint Working Conference on Communications and Multimedua Security (CMS ’01), Darmstadt, Germany, in Communications and Multimedia Security Issuses of the New Century pp. 117–122. Kluwer, Boston 21–22 May 2001Google Scholar
  5. 5.
    Ćulibrk, D., Socek, D., Sramka, M.: Cryptanalysis of the block cipher based on the hopfield neural network. In: Proceedings of the Fifth Central European Conference on Cryptology (MoraviaCrypt ’05), 15–17 June 2005, Brno, Czech Republic, Tatra Mountains Mathematical Publications (2005, to appear)Google Scholar
  6. 6.
    Eskicioglu, A.M.: Protecting intellectual property in digital multimedia networks. IEEE Computer, Special Issue on Piracy and Privacy (2003), 39–45Google Scholar
  7. 7.
    Furht, B., Muharemagic, E.A., Socek, D.: Multimedia security: encryption and watermarking. Multimedia Systems and Applications, vol. 28, Springer, December 2005Google Scholar
  8. 8.
    Furht, B., Socek, D., Eskicioglu, A.M.: Multimedia security handbook, Internet and Communications Series, vol. 4, chap. Fundamentals of Multimedia Encryption Techniques pp. 95–132. CRC Press (2004)Google Scholar
  9. 9.
    Guo D., Cheng L.-M., Cheng L.L. (1999). A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intelli. 10: 71–84 CrossRefGoogle Scholar
  10. 10.
    Knuth, D.E.: The art of computer programming, 2nd edn., vol. 3: Sorting and Searching, pp. 113–122. Addison–Wesley, Reading, MA (1998)Google Scholar
  11. 11.
    Li, S., Chen, G., Zheng, X.: Multimedia security handbook. Internet and Communications Series, vol. 4, chap. Chaos-Based Encryption for Digital Images and Videos, pp. 133–167. CRC Press, West Palm Beach (2004)Google Scholar
  12. 12.
    Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: Proceedings of the Second IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), pp. 527–533. Scottsdale, AZ, USA, IASTED, 17–19 November 2003Google Scholar
  13. 13.
    Li, S., Lo, K.-T.: Security problems with improper implementations of improved fea-m. J. Syst. Softw. (2006). http://dx.doi.org/10.1016/j.jss.2006.05.002Google Scholar
  14. 14.
    Li, S., Li, C., Chen, G., Bourbakis, N.G.: A general cryptanalysis of permutation-only multimedia encryption algorithms, IACR’s Cryptology ePrint Archive: Report 2004/374, 2004Google Scholar
  15. 15.
    Lookabaugh, T.D., Sicker, D.C., Keaton, D.M., Guo, W.Y., Vedula, I.: Security analysis of selectively encrypted mpeg-2 streams. Multimedia Systems and Applications VI, Proceedings of SPIE, Orlando, FL, USA, vol. 5241 pp. 10–21. SPIE Publishers, September 7–11 2003Google Scholar
  16. 16.
    Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, Proceedings of SPIE, vol. 4666, pp. 149–160. SPIE Publishers (2002)Google Scholar
  17. 17.
    Meyer, J., Gadegast, F.: Security mechanisms for multimedia data with the example mpeg-1 video, Project description of SECMPEG, Technical University of Berlin. http://www.gadegast.de/frank/doc/secmeng.pdfGoogle Scholar
  18. 18.
    Mihaljević M.J. (2003). On vulnerabilities and improvements of fast encryption algorithm for multimedia fea-m. IEEE Trans. Consum. Eletron. 49(4): 1199–1207 CrossRefGoogle Scholar
  19. 19.
    Mihaljević M.J., Kohno R. (2002). Cryptanalysis of fast encryption algorithm for multimedia fea-m. IEEE Commun. Lett. 6(9): 382–384 CrossRefGoogle Scholar
  20. 20.
    Qiao, L., Nahrstedt, K.: A new algorithm for mpeg video encryption. In: Proceedings of the First International Conference on Imaging Science, Systems and Technology (CISST ’97), pp. 21–29. Las Vegas CSREA Press, 30 June–3 July 1997Google Scholar
  21. 21.
    Qiao, L., Nahrstedt, K., Tam, M.-C.: Is mpeg encryption by using random list instead of zigzag order secure? In: Proceedings of the IEEE International Symposium on Consumer Electronics pp. 226–229 2–4 December 1997. IEEE Computer Society, SingaporeGoogle Scholar
  22. 22.
    Shi, C., Bhargava, B.: A fast mpeg video encryption algorithm. In: Proceedings of the Sixth ACM International Multimedia Conference, Bristol, UK, ACM Electronic Proceedings, 12–16 September 1998. http://turing.acm.org/sigs/sigmm/MM98/electronic_proc eedings/shi/Google Scholar
  23. 23.
    Socek, D., Ćulibrk, D.: On the security of a clipped hopfield neural network cryptosystem. In: Proceedings of the ACM Multimedia and Security Workshop (ACM-MM-Sec’05), pp. 71–75. ACM Press, New York City 2005, 1–2 August 2005Google Scholar
  24. 24.
    Spanos, G.A., Maples, T.B.: Performance study of a selective encryption scheme for the security of networked, real-time video. In: Proceedings of the 4th International Conference on Computer Communications and networks (ICCCN ’95), pp. 2–10. IEEE Press, Las Vegas 20–23 September 1995Google Scholar
  25. 25.
    Seidel T.E., Socek D., Sramka M. (2004). Cryptanalysis of video encryption algorithms. Tatra Mt. Math. Publ. 29: 1–9 Google Scholar
  26. 26.
    Shi, C., Wang, S.-Y., Bhargava, B.: Mpeg video encryption in real-time using secret key cryptography. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’99), Las Vegas, NV, USA, vol. 6, pp. 2822–2828. CSREA Press, 28 June– 1 July 1999Google Scholar
  27. 27.
    Tang, L.: Methods for encrypting and decrypting mpeg video data efficiently. In: Proceedings of the Fourth ACM International Multimedia Conference, pp. 219–230. Boston, ACM Press 18–22 November 1996Google Scholar
  28. 28.
    Uhl, A., Pommer, A.: Image and video encryption: from digital rights management to secured personal communication. In: Advances in Information Security, vol. 15. Springer, New York (2005)Google Scholar
  29. 29.
    Wu, H., Bao, F., Deng, R.H.: An efficient known plaintext attack on fea-m. In: Proceedings of the Fifth International Conference on Information and Communications Security (ICICS 2003), pp. 84–87. Huhehaote, China, vol. 2836. LNCS, Springer, Berlin, Germany 10–13 October 2003Google Scholar
  30. 30.
    Youssef A.M., Tavares S.E. (2003). Comments on the security of fast encryption algorithm for multimedia (fea-m). IEEE Trans. Consum. Eletron. 49(1): 168–170 CrossRefGoogle Scholar
  31. 31.
    Yi X., Tan C.H., Siew C.K., Syed M.R. (2001). Fast encryption for multimedia. IEEE Trans. Consumer Eletronics 47(1): 101–107 CrossRefGoogle Scholar

Copyright information

© Springer-Verlag 2007

Authors and Affiliations

  • Daniel Socek
    • 1
    Email author
  • Hari Kalva
    • 1
  • Spyros S. Magliveras
    • 2
  • Oge Marques
    • 1
  • Dubravko Culibrk
    • 1
  • Borko Furht
    • 1
  1. 1.Department of Computer Science and EngineeringFlorida Atlantic UniversityBoca RatonUSA
  2. 2.Department of Mathematical SciencesFlorida Atlantic UniversityBoca RatonUSA

Personalised recommendations