Multimedia Tools and Applications

, Volume 24, Issue 1, pp 57–79 | Cite as

MPEG Video Encryption Algorithms

  • Bharat Bhargava
  • Changgui Shi
  • Sheng-Yih Wang


Multimedia data security is important for multimedia commerce. Previous cryptography studies have focused on text data. The encryption algorithms developed to secure text data may not be suitable to multimedia applications because of the large data size and real time constraint. For multimedia applications, light weight encryption algorithms are attractive.

We present four fast MPEG video encryption algorithms. These algorithms use a secret key to randomly change the sign bits of Discrete Cosine Transform (DCT) coefficients and/or the sign bits of motion vectors. The encryption is accomplished by the inverse DCT (IDCT) during the MPEG video decompression processing. These algorithms add a small overhead to MPEG codec. Software implementations are fast enough to meet the real time requirement of MPEG video applications. The experimental results show that these algorithms achieve satisfactory results. They can be used to secure video-on-demand, video conferencing, and video email applications.

multimedia data security MPEG video encryption MPEG codec 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    I. Agi and L. Gong, “An empirical study of MPEG video transmission,” in Proceedings of the Internet Society Symposium on Network and Distributed Systems Security, San Diego, CA, 1996, pp. 137–144.Google Scholar
  2. 2.
    B. Bhargava, S. Li, S. Goel, M. Annamalai, P. Tang, and Y. Zhang, “Impacts of codec schemes on multimedia communications,” in Proceedings of the International Conference on Multimedia Information Systems (MULTIMEDIA 96), New Delhi, India, 1996a, pp. 94–105.Google Scholar
  3. 3.
    B. Bhargava, S. Li, S. Goel, and J. Huai, “A distributed video-on-demand system for video conferencing,” in Proceedings of the International Conference on Multimedia Information Systems (MULTIMEDIA 96), New Delhi, India, 1996b, pp. 83–93.Google Scholar
  4. 4.
    B. Bhargava, S. Li, S. Goel, C. Xie, and C. Xu, “Performance studies for an adaptable video-conferencing system,” in Proceedings of the International Conference on Multimedia Information Systems (MULTIMEDIA 96), New Delhi, India, 1996c, pp. 106–116.Google Scholar
  5. 5.
    D.L. Gall, “MPEG: A video compression standard for multimedia applications,” Communications of the ACM, Vol. 34,No. 4, pp. 46–58, 1991.Google Scholar
  6. 6.
    K.L. Gong and L.A. Rowe, “Parallel MPEG-1 video encoding,” in Proceedings of the 1994 Picture Coding Symposium, 1994.Google Scholar
  7. 7.
    Y. Li, Z. Chen, S. Tan, and R. Campbell, “Security enhanced MPEG player,” in Proceedings of IEEE First International Workshop on Multimedia Software Development (MMSD 96), Berlin, Germany, 1996.Google Scholar
  8. 8.
    T. Little and D. Venkatesh, “Prospects for interactive video-on-demand” IEEE, Multimedia, Vol. 1,No. 3, pp. 14–24, 1994.Google Scholar
  9. 9.
    B. Macq and J. Quisquater, “Cryptoloy for digital TV broadcasting,” in Proceedings of the IEEE, Vol. 83,No. 6, pp. 944–957, 1995.Google Scholar
  10. 10.
    T.B. Maples and G.A. Spanos, “Performance study of a selective encryption scheme for the security of networked, real-time video,” in Proceedings of the 4th International Conference on Computer Communications and Neworks, 1995.Google Scholar
  11. 11.
    S. McCanne and V. Jacobson, “vic: A flexible framework for packet video,” in Proc. of the ACM Multimedia'95, San Francisco, California, 1995, pp. 511–522.Google Scholar
  12. 12.
    J. Meyer and F. Gadegast, “Security mechanism of multimedia data with the example MPEG-1 video,” Available on WWW via, 1995.Google Scholar
  13. 13.
    K. Patel, B. Smith, and L. Rowe, “Performance of a software MPEG video decoder,” in Proceedings of ACM Multimedia 93, 1993.Google Scholar
  14. 14.
    L. Qiao and K. Nahrstedt, “Comparison of MPEG encryption algorithms,” International Journal on Computers & Graphics, Special Issue: “Data Security in Image Communication and Network,” Vol. 22,No. 3, 1998, bimonthly by Permagon Publisher.Google Scholar
  15. 15.
    B. Schneier, “Applied cryptography,” John Wiley & Sons, Inc., New York, 1996.Google Scholar
  16. 16.
    C. Shi and B. Bhargava, “An efficient MPEG video encryption algorithm,” in Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, West Lafayette, Indiana, USA. Published by IEEE Computer Society, Los Alamitos, California, 1998a, pp. 381–386.Google Scholar
  17. 17.
    C. Shi and B. Bhargava, “A fast MPEG video encryption algorithm,” in Proceedings of the 6th ACM International Multimedia Conference, Bristol, UK, 1998b, pp. 81–88.Google Scholar
  18. 18.
    C. Shi and B. Bhargava, “Light-weight MPEG video encryption algorithm,” in Proc. of the Int'l Conf. on Multimedia (Multimedia98, Shaping the Future), New Delhi, India, Jan. 23–25, 1998, pp. 55–61.Google Scholar
  19. 19.
    C. Shi, S.-Y. Wang, and B. Bhargava, “MPEG video encryption in real-time using secret key cryptography,” in Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'99), Las Vegas, Nevada, USA, 1999.Google Scholar
  20. 20.
    D.R. Stinson, “Cryptography theory and practice,” CRC Press, Inc., New York, 1995.Google Scholar
  21. 21.
    L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently,” in Proceedings of the ACM Multimedia 96, Boston, MA, 1996, pp. 219–229.Google Scholar
  22. 22.
    W. Zeng and B. Liu, “Geometric-structure-based directional filter for error concealment in image/video transmission,” in Proc. SPIE Wireless Data Transmission at Information Systems/Photonics East'95, Vol. 2601, 1995, pp. 145–156.Google Scholar

Copyright information

© Kluwer Academic Publishers 2004

Authors and Affiliations

  • Bharat Bhargava
    • 1
  • Changgui Shi
    • 1
  • Sheng-Yih Wang
    • 1
  1. 1.Department of Computer SciencesPurdue UniversityWest LafayetteUSA

Personalised recommendations