Abstract
In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an extended classification of digital video encryption algorithms in order to clarify these advantages. We analyze both security and performance aspects of the proposed method, and show that the method is efficient and secure from a cryptographic point of view. Even though the method is currently feasible only for a certain class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability. Finally, we extend our approach into a novel type of digital video steganography where it is possible to disguise a given video with another video.
Similar content being viewed by others
References
Alattar, A.M., Al-Regib, G.I.: Evaluation of selective encryption techniques for secure transmission of mpeg video bit-streams. In: Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS ’99), 30 May–2 June 1999, Orlando, FL, USA, vol. 4, pp. 340–343. IEEE Computer Society
Agi, I., Gong, L.: An empirical study of secure mpeg video transmission. In: Proceedings of the IEEE Symposium on Network and Distributed System Security (SNDSS ’96), 22–23 February 1996, San Diego, CA, USA, pp. 137–144. IEEE Computer Society
Bhargava B., Shi C., Wang S.-Y. (2004). Mpeg video encryption algorithms. Multimed. Tools Appl. 24(1): 57–79
Chan, C.-K., Chan, C.-K., Lee, L.-P., Cheng, L.-M.: Encryption system based on neural network. In: Proceedings of the IFIP TC6/TC11 5th Joint Working Conference on Communications and Multimedua Security (CMS ’01), Darmstadt, Germany, in Communications and Multimedia Security Issuses of the New Century pp. 117–122. Kluwer, Boston 21–22 May 2001
Ćulibrk, D., Socek, D., Sramka, M.: Cryptanalysis of the block cipher based on the hopfield neural network. In: Proceedings of the Fifth Central European Conference on Cryptology (MoraviaCrypt ’05), 15–17 June 2005, Brno, Czech Republic, Tatra Mountains Mathematical Publications (2005, to appear)
Eskicioglu, A.M.: Protecting intellectual property in digital multimedia networks. IEEE Computer, Special Issue on Piracy and Privacy (2003), 39–45
Furht, B., Muharemagic, E.A., Socek, D.: Multimedia security: encryption and watermarking. Multimedia Systems and Applications, vol. 28, Springer, December 2005
Furht, B., Socek, D., Eskicioglu, A.M.: Multimedia security handbook, Internet and Communications Series, vol. 4, chap. Fundamentals of Multimedia Encryption Techniques pp. 95–132. CRC Press (2004)
Guo D., Cheng L.-M., Cheng L.L. (1999). A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intelli. 10: 71–84
Knuth, D.E.: The art of computer programming, 2nd edn., vol. 3: Sorting and Searching, pp. 113–122. Addison–Wesley, Reading, MA (1998)
Li, S., Chen, G., Zheng, X.: Multimedia security handbook. Internet and Communications Series, vol. 4, chap. Chaos-Based Encryption for Digital Images and Videos, pp. 133–167. CRC Press, West Palm Beach (2004)
Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: Challenges and new directions. In: Proceedings of the Second IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), pp. 527–533. Scottsdale, AZ, USA, IASTED, 17–19 November 2003
Li, S., Lo, K.-T.: Security problems with improper implementations of improved fea-m. J. Syst. Softw. (2006). http://dx.doi.org/10.1016/j.jss.2006.05.002
Li, S., Li, C., Chen, G., Bourbakis, N.G.: A general cryptanalysis of permutation-only multimedia encryption algorithms, IACR’s Cryptology ePrint Archive: Report 2004/374, 2004
Lookabaugh, T.D., Sicker, D.C., Keaton, D.M., Guo, W.Y., Vedula, I.: Security analysis of selectively encrypted mpeg-2 streams. Multimedia Systems and Applications VI, Proceedings of SPIE, Orlando, FL, USA, vol. 5241 pp. 10–21. SPIE Publishers, September 7–11 2003
Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, Proceedings of SPIE, vol. 4666, pp. 149–160. SPIE Publishers (2002)
Meyer, J., Gadegast, F.: Security mechanisms for multimedia data with the example mpeg-1 video, Project description of SECMPEG, Technical University of Berlin. http://www.gadegast.de/frank/doc/secmeng.pdf
Mihaljević M.J. (2003). On vulnerabilities and improvements of fast encryption algorithm for multimedia fea-m. IEEE Trans. Consum. Eletron. 49(4): 1199–1207
Mihaljević M.J., Kohno R. (2002). Cryptanalysis of fast encryption algorithm for multimedia fea-m. IEEE Commun. Lett. 6(9): 382–384
Qiao, L., Nahrstedt, K.: A new algorithm for mpeg video encryption. In: Proceedings of the First International Conference on Imaging Science, Systems and Technology (CISST ’97), pp. 21–29. Las Vegas CSREA Press, 30 June–3 July 1997
Qiao, L., Nahrstedt, K., Tam, M.-C.: Is mpeg encryption by using random list instead of zigzag order secure? In: Proceedings of the IEEE International Symposium on Consumer Electronics pp. 226–229 2–4 December 1997. IEEE Computer Society, Singapore
Shi, C., Bhargava, B.: A fast mpeg video encryption algorithm. In: Proceedings of the Sixth ACM International Multimedia Conference, Bristol, UK, ACM Electronic Proceedings, 12–16 September 1998. http://turing.acm.org/sigs/sigmm/MM98/electronic_proc eedings/shi/
Socek, D., Ćulibrk, D.: On the security of a clipped hopfield neural network cryptosystem. In: Proceedings of the ACM Multimedia and Security Workshop (ACM-MM-Sec’05), pp. 71–75. ACM Press, New York City 2005, 1–2 August 2005
Spanos, G.A., Maples, T.B.: Performance study of a selective encryption scheme for the security of networked, real-time video. In: Proceedings of the 4th International Conference on Computer Communications and networks (ICCCN ’95), pp. 2–10. IEEE Press, Las Vegas 20–23 September 1995
Seidel T.E., Socek D., Sramka M. (2004). Cryptanalysis of video encryption algorithms. Tatra Mt. Math. Publ. 29: 1–9
Shi, C., Wang, S.-Y., Bhargava, B.: Mpeg video encryption in real-time using secret key cryptography. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’99), Las Vegas, NV, USA, vol. 6, pp. 2822–2828. CSREA Press, 28 June– 1 July 1999
Tang, L.: Methods for encrypting and decrypting mpeg video data efficiently. In: Proceedings of the Fourth ACM International Multimedia Conference, pp. 219–230. Boston, ACM Press 18–22 November 1996
Uhl, A., Pommer, A.: Image and video encryption: from digital rights management to secured personal communication. In: Advances in Information Security, vol. 15. Springer, New York (2005)
Wu, H., Bao, F., Deng, R.H.: An efficient known plaintext attack on fea-m. In: Proceedings of the Fifth International Conference on Information and Communications Security (ICICS 2003), pp. 84–87. Huhehaote, China, vol. 2836. LNCS, Springer, Berlin, Germany 10–13 October 2003
Youssef A.M., Tavares S.E. (2003). Comments on the security of fast encryption algorithm for multimedia (fea-m). IEEE Trans. Consum. Eletron. 49(1): 168–170
Yi X., Tan C.H., Siew C.K., Syed M.R. (2001). Fast encryption for multimedia. IEEE Trans. Consumer Eletronics 47(1): 101–107
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Socek, D., Kalva, H., Magliveras, S.S. et al. New approaches to encryption and steganography for digital videos. Multimedia Systems 13, 191–204 (2007). https://doi.org/10.1007/s00530-007-0083-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-007-0083-z