Multimedia Tools and Applications

, Volume 76, Issue 5, pp 7473–7496 | Cite as

Partial frame content scrambling in H.264/AVC by information hiding

  • Po-Chyi Su
  • Tzung-Fu Tsai
  • Yu-Chien Chien


A partial frame content scrambling scheme for H.264/AVC compressed videos is proposed in this research. Some areas of video frames, which are identified as sensitive or privacy regions, will be scrambled to become unintelligible for restricting the access from general public or regular users. The scrambling is achieved by directly modifying or removing the selected data in the H.264/AVC bitstream, which will be embedded and transmitted along with the video via the information hiding technique. The authorized users are able to restore these regions by retrieving the hidden data. The design principle of the proposed scheme is to ensure that the scrambled regions are unrecognizable and can be recovered while other parts are still viewable without being affected much. In addition, the size of video stream has to be maintained reasonably well for fulfilling the requirements of related applications. Experimental results will show the feasibility of the proposed scheme.


Digital video Video coding Partial scrambling H.264/AVC Information hiding Privacy protection 



This research is supported by the Ministry of Science and Technology in Taiwan, ROC, under Grants MOST 102-2221-E-008-073 and 104-2221-E-008-075.


  1. 1.
    Ahn J, Shim H, Jeon B, Choi I (2004) Digital video scrambling method using intra prediction mode. In: IEEE pacific rim conference on multimedia. IEEE, pp 386–393Google Scholar
  2. 2.
    Dufaux F, Ebrahimi T (2004) Video surveillance using JPEG2000 , Proceeding SPIE Applications of Digital Image Processing XXVII. SPIEGoogle Scholar
  3. 3.
    Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. In: IEEE workshop on privacy research in vision. IEEEGoogle Scholar
  4. 4.
    Dufaux F, Ebrahimi T (2008) H.264/AVC video scrambling for privacy protection. In: The 15th IEEE international conference on image processing. IEEE, pp 1688–1691Google Scholar
  5. 5.
    Korus P, Szmuc W, Dziech A (2010) A scheme for censorship of sensitive image content with high-quality reconstruction ability. In: IEEE international conference on multimedia and expo. IEEE, pp 1073–1078Google Scholar
  6. 6.
    Krikor L, Bab S, Ari T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Eur J Sci Res 32(1):47–57Google Scholar
  7. 7.
    Lee HJ, Nam J (2006) Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain. In: Proceedings of the 14th annual ACM international conference on Multimedia, ACM, pp 93–96Google Scholar
  8. 8.
    Lian S, Sun J, Wang Z (2004) A novel image encryption scheme based-on JPEG encoding. In: The 8th international conference on information visualisation. IEEE, pp 217–220Google Scholar
  9. 9.
    Lian S, Liu Z, Ren Z, Wang H (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consum Electron 52(2):621–629CrossRefGoogle Scholar
  10. 10.
    Minemura K, Koksheik W (2014) Sketch attacks: a note on designing video encryption method in H.264/AVC. In: APSIPA annual summit and conference. APSIPA, pp 1–7Google Scholar
  11. 11.
    Minemura K, Moayed Z, Wong K, Qi X, Tanaka K (2012) JPEG image scrambling without expansion in bitstream size. In: International conference on image processing. IEEE, pp 261–264Google Scholar
  12. 12.
    Newton E, Sweeney L, Malin B (2003) Preserving privacy by de-identifying facial images. Carnegie Mellon University Technical Report, CMU-CS-03-119Google Scholar
  13. 13.
    Senior A (2009) Protecting privacy in video surveillance. SpringerGoogle Scholar
  14. 14.
    Senior A, Pankanti S, Hampapur A, Brown L, Tian Y-L, Ekin A (2003) Blinkering surveillance: enabling video privacy through computer vision. IBM Technical Report 22886Google Scholar
  15. 15.
    Su P-C, Hsu C-W, Wu C-Y (2011) A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting. Multimedia Tools and Applications 52(2):529–549CrossRefGoogle Scholar
  16. 16.
    Tong L, Dai F, Zhang Y, Li J (2010) Restricted H.264/AVC video coding for privacy region scrambling. In: International conference on image processing (ICIP). IEEE, pp 2089–2092Google Scholar
  17. 17.
    Tong L, Dai F, Zhang Y, Li J (2010) Prediction restricted H.264/AVC video scrambling for privacy protection. Electron Lett 46(1):47–49CrossRefGoogle Scholar
  18. 18.
    Wang J, Fan Y, Ikenaga T, Goto S (2007) A partial scramble scheme for H.264 video. In: The 7th international conference on ASIC. IEEE, pp 802–805Google Scholar
  19. 19.
    Westfeld A (2001) F5 - a steganographic algorithm. In: Information hiding. Springer, pp 289–302Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Central UniversityJhongliTaiwan

Personalised recommendations