Advertisement

A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos

  • Daniel Socek
  • Hari Kalva
  • Spyros S. Magliveras
  • Oge Marques
  • Dubravko Ćulibrk
  • Borko Furht
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4141)

Abstract

In this work we present and analyze a conceptually novel encryption method for digital videos. This type of encryption has several advantages over currently available video encryption algorithms. We analyze both security and performance aspects of our method, and show that the method is efficient and secure from a cryptographic point of view. Even though the approach is currently feasible only for a selected class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability.

Keywords

Digital Video Encryption Algorithm Video Encryption Selective Encryption Multimedia Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmission. In: Proc. IEEE Symposium on Network and Distributed System Security (SNDSS 1996), San Diego, CA, February 22-23, pp. 137–144. IEEE Computer Society, Los Alamitos (1996)CrossRefGoogle Scholar
  2. 2.
    Chan, C.-K., Chan, C.-K., Lee, L.-P., Cheng, L.M.: Encryption System Based On Neural Network. In: Communications and Multimedia Security Issuses of the New Century, pp. 117–122. Kluwer Academic Publishers, Boston (2001)Google Scholar
  3. 3.
    Furht, B., Muharemagic, E.A., Socek, D.: Multimedia Security: Encryption and Watermarking, Multimedia Systems and Applications, vol. 28. Springer, Heidelberg (2005)Google Scholar
  4. 4.
    Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic Encryption Scheme for Real-Time Digital Video. In: Real-Time Imaging VI, Proc. SPIE, vol. 4666, pp. 149–160 (2002)Google Scholar
  5. 5.
    Li, S., Chen, G., Zheng, X.: Multimedia Security Handbook. In: Furht, B., Kirovski, D. (eds.) Chaos-Based Encryption for Digital Images and Videos. Internet and Communications Series, ch. 4. CRC Press, Boca Raton (2004)Google Scholar
  6. 6.
    Li, S., Li, C., Chen, G., Bourbakis, N.G.: A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms, IACR’s Cryptology ePrint Archive: Report 2004/374 (2004)Google Scholar
  7. 7.
    Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, November 17-19 (2003)Google Scholar
  8. 8.
    Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1 Video, Project Description of SECMPEG, Technical University of Berlin, Germany (May 1995), http://www.gadegast.de/frank/doc/secmeng.pdf
  9. 9.
    Mihaljević, M.J., Kohno, R.: Cryptanalysis of Fast Encryption Algorithm for Multimedia FEA-M. IEEE Trans. Comm. Letters 6(9), 382–384 (2002)CrossRefGoogle Scholar
  10. 10.
    Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proc. First International Conference on Imaging Science, Systems and Technology (CISST 1997), Las Vegas, NV, June 30-July 3, pp. 21–29 (1997)Google Scholar
  11. 11.
    Qiao, L., Nahrstedt, K., Tam, M.-C.: Is MPEG Encryption by Using Random List Instead of Zigzag Order Secure? In: Proc. IEEE Intl. Symposium on Consumer Electronics, Singapore, pp. 226–229. IEEE Comp. Soc., Los Alamitos (1997)Google Scholar
  12. 12.
    Seidel, T.E., Socek, D., Sramka, M.: Cryptanalysis of Video Encryption Algorithms, vol. 29, pp. 1–9. Tatra Mountains Mathematical Publications (2004)Google Scholar
  13. 13.
    Bhargava, B., Shi, C., Wang, S.-Y.: MPEG Video Encryption Algorithms. Multimedia Tools and Applications 24(1), 57–79 (2004)CrossRefGoogle Scholar
  14. 14.
    Socek, D., Culibrk, D.: On the Security of a Clipped Hopfield Neural Network Cryptosystem. In: Proc. of the ACM Multimedia and Security Workshop (ACM-MM-Sec 2005), New York City, NY, August 1-2, pp. 71–75 (2005)Google Scholar
  15. 15.
    Spanos, G.A., Maples, T.B.: Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications. In: Proc. IEEE 15th Intl. Phoenix Conf. on Computers and Communications, Scottsdale, AZ, March 27-29, pp. 72–78 (1996)Google Scholar
  16. 16.
    Tang, L.: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. In: Proc. Fourth ACM International Multimedia Conference, Boston, MA, November 18-22, pp. 219–230 (1996)Google Scholar
  17. 17.
    Yi, X., Tan, C.H., Siew, C.K., Syed, M.R.: Fast Encryption for Multimedia. IEEE Trans. Consumer Eletronics 47(1), 101–107 (2001)CrossRefGoogle Scholar
  18. 18.
    Youssef, A.M., Tavares, S.E.: Comments on the Security of Fast Encryption Algorithm for Multimedia (FEA-M). IEEE Trans. Consumer Eletronics 49(1), 168–170 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Daniel Socek
    • 1
  • Hari Kalva
    • 1
  • Spyros S. Magliveras
    • 2
  • Oge Marques
    • 1
  • Dubravko Ćulibrk
    • 1
  • Borko Furht
    • 1
  1. 1.Department of Computer Science and EngineeringFlorida Atlantic UniversityBoca RatonUSA
  2. 2.Department of Mathematical SciencesFlorida Atlantic UniversityBoca RatonUSA

Personalised recommendations