Multimedia Tools and Applications

, Volume 76, Issue 3, pp 3235–3253 | Cite as

A selective encryption scheme for protecting H.264/AVC video in multimedia social network



Aiming to protect H.264/AVC video in multimedia social network, a selective encryption scheme is put forward. In the scheme, after analyzing the impact of quantization parameter (QP) on the encryption of the sign of T1 s and the impact of encrypting inter-macroblock non-zero coefficients, the sign of intra-macroblock non-zero DCT coefficients, the sign of trailing ones (T1 s), the intra prediction modes (IPMs) and the sign of motion vector difference (MVD) are encrypted to protect the texture and motion information of H.264/AVC. Experimental results and analysis show that the computation cost is low and the bitrate increment is negligible, and it can achieve good performance in resisting brute-force attacks, histogram-based attacks and replacement attacks. Based on the encryption scheme, a framework of its implementation in multimedia social network is put forward. It has great potential to be implemented for the video data protection in multimedia social network.


Multimedia security Selective encryption H.264/AVC, multimedia social network 


  1. 1.
    Ahn J, Shim H, Jeon B, Choi I (2004) Digital video scrambling method using intra prediction mode,” in Proc. PCM, LNCS 3333. pp. 386–393Google Scholar
  2. 2.
    Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Au-Yeung SK, Zhu S, Zeng B (2009) Partial video encryption based on alternating transforms. IEEE Signal Process Lett 16(10):893–896CrossRefGoogle Scholar
  4. 4.
    Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264/ISO/IEC 1449610 AVC), document JVT-G050, Joint Video Team (JVT), Mar. 2003Google Scholar
  5. 5.
    Friedman WF (1987) The index of coincidence and its applications in cryptanalysis. Aegean Park Press, CaliforniaGoogle Scholar
  6. 6.
    Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B(1):190–200CrossRefGoogle Scholar
  7. 7.
    Furht B, Socek D, Eskicioglu A (2004) Multimedia security handbook. CRC Press, Boca Raton, pp. 93–131CrossRefGoogle Scholar
  8. 8.
    Goldreich O (2009) Foundations of cryptography volume II basic applications. Cambridge University Press, New York, pp. 373–481MATHGoogle Scholar
  9. 9.
    Hong G, Yuan C, Wang Y, Zhong Y (2006) A quality-controllable encryption for H.264/AVC video coding, in Proc. PCM, LNCS 4261. pp. 510–517Google Scholar
  10. 10.
    JM Reference Software, ver. 10.2 (2011) [Online]. Available:
  11. 11.
    Kwon S, Choi W, Jeon B (2005) Digital video scrambling using motion vector and slice relocation, in Proc. 2nd Int. Conf., ICIAR, pp. 207–214Google Scholar
  12. 12.
    Li Y, Jiang J, Liang L (2007) Research and improvement of the video encryption algorithm for H.264. Acta Electron Sin 35(9):1724–1727Google Scholar
  13. 13.
    Li X, Feng Z, Hu Y (2009) Video encrypting scheme based on H.264 CAVLC entropy coding. Comput Eng Appl 45(34):114–117Google Scholar
  14. 14.
    Lian S, Sun J, Wang Z (2004) Quality analysis of several typical MPEG video encryption algorithms. J Image Graph 9(4):483–490Google Scholar
  15. 15.
    Lian S, Liu Z, Ren Z, Wang H (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consum Electron 52(2):621–629CrossRefGoogle Scholar
  16. 16.
    Lian S, Sun J, Liu G, Wang Z (2008) Efficient video encryption scheme based on advanced video coding. Multimed Tools Appl 38(1):75–89CrossRefGoogle Scholar
  17. 17.
    Liu F, Koenig H (2010) A survey of video encryption algorithms. Comput Secur 29(1):3–15CrossRefGoogle Scholar
  18. 18.
    Liu Z, Li X (2004) Motion vector encryption in multimedia streaming, in Proc. 10th Int. Multimedia Modelling Conf., pp. 64–71Google Scholar
  19. 19.
    Liu Y, Yuan C, Zhong Y (2007) A new digital rights management system in mobile applications using H.264 encryption, in Proc. 9th Int. Conf. Advanced Communication Technology, pp. 583–586.Google Scholar
  20. 20.
    Peng F, Zhu X, Long M (2013) An ROI privacy protection scheme for H.264 video based on FMO and chaos. IEEE Trans. Inf Forensics Secur 8(10):1688–1699CrossRefGoogle Scholar
  21. 21.
    Podesser M, Schmidt H, Uhl A (2002) Selective bitplane encryption for secure transmission of image data in mobile environments, in Proc. 5th IEEE Nordic Signal Process. Symp., pp. 4–6Google Scholar
  22. 22.
    Raju C, Srinathan K, Jawahar C (2008) A real-time video encryption exploiting the distribution of the DCT coefficients, in Proc. IEEE Region 10 Conf. (TENCON 2008), pp. 1–6Google Scholar
  23. 23.
    Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323Google Scholar
  24. 24.
    Shahid Z, Chaumont M, Puech W (2009) Fast protection of H.264/AVC by selective encryption, in Proc. SinFra IPAL Symp., pp. 11–21Google Scholar
  25. 25.
    Shahid Z, Chaumont M, Puech W (2011) Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans Circuits Syst Video Technol 21(5):565–576CrossRefGoogle Scholar
  26. 26.
    Stallings W (2011) Cryptography and network security, principles and practice, Fifth edn. Pearson, Upper Saddle RiverGoogle Scholar
  27. 27.
    Video Trace Library (2011) [Online]. Available:
  28. 28.
    Wang Z, Bovik A (2009) Mean squared error: love it or leave it? A new look at signal fidelity measures. IEEE Signal Process Mag 26(1):98–117CrossRefGoogle Scholar
  29. 29.
    Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  30. 30.
    Wang Y, Cai M, Tang F (2007) Design of a new selective video encryption scheme based on H.264, in Proc. Int. Conf. Computational Intelligence and Security, pp. 883–887Google Scholar
  31. 31.
    Wang Y, O’Neill M, Kurugollu F (2013) A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC. IEEE Trans Circuits Syst Video Technol 23(9):1476–1490CrossRefGoogle Scholar
  32. 32.
    Wiegand T, Sullivan G, Bjontegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560–576CrossRefGoogle Scholar
  33. 33.
    Xing S, Jiang J, Qi M (2009) An intra prediction mode-based video encryption algorithm in H.264, in Proc. Int. Conf. Multimedia Information Networking and Security (MINES ‘09), pp. 478–482Google Scholar
  34. 34. Video Test Media (2013) [Online]. Available:
  35. 35.
    Zhang Z (2011) Digital rights management ecosystem and its usage controls: a survey. Int J Digital Content Technol Appl 5(3):255–272CrossRefGoogle Scholar
  36. 36.
    Zhang Z (2012) Frontier and methodologies on digital rights management for multimedia social networks. Int J Digital Content Technol Appl 6(9):245–249CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Fei Peng
    • 1
  • Xiao-qing Gong
    • 1
  • Min Long
    • 2
  • Xing-ming Sun
    • 3
  1. 1.School of Computer Science and Electronic EngineeringHunan UniversityChangshaChina
  2. 2.College of Computer and Communication EngineeringChangsha University of Science and TechnologyChangshaChina
  3. 3.School of Computer and SoftwareNanjing University of Information Science & TechnologyNanjingChina

Personalised recommendations