Skip to main content

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

Abstract

Aiming to protect the video content and facilitate online video consumption, a perceptual encryption scheme is proposed for high efficiency video coding (HEVC) video. Based on RC4 algorithm, a key stream generation method is constructed, whose proportion of “1” and “0” can be regulated. During HEVC encoding, four kinds of syntax elements including motion vector difference (MVD)’ sign, MVD’s amplitude, sign of the luma residual coefficient and sign of the chroma residual coefficient, are encrypted by the regulated key stream. Experimental results and analysis show that the proposed scheme has good perceptual protection for the video content, and some advantages such as low computational cost, format-compliance and no bitrate increase can be achieved. It provides an effective resolution for the paid video-on-demand services in smart cities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stutz, T., Uhl, A.: A survey of H.264 AVC/SVC encryption. IEEE Trans. Circuits Syst. Video Technol. 22(3), 325–339 (2012)

    Article  Google Scholar 

  2. Wiegand, T., Sullivan, G.J., Bjøntegaard, G., et al.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560–576 (2003)

    Article  Google Scholar 

  3. Sullivan, G.J., Ohm, J.R., Han, W.J., et al.: Overview of the high efficiency video coding (HEVC) standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649–1668 (2012)

    Article  Google Scholar 

  4. Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264/AVC by selective encryption of CABAC. In: IEEE International Conference on Multimedia and Expo, pp. 1038–1041. IEEE, New York City (2009)

    Google Scholar 

  5. Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264/AVC by selective encryption of CABAC for I and P frames. IEEE Trans. Circuits Syst. Video Technol. 21(5), 565–576 (2011)

    Article  Google Scholar 

  6. Wang, Y., O’Neill, M., Kurugollu, F.: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC. IEEE Trans. Circuits Syst. Video Technol. 23(9), 1476–1490 (2013)

    Article  Google Scholar 

  7. Van Wallendael, G., Boho, A., De Cock, J., et al.: Encryption for high efficiency video coding with video adaptation capabilities. In: IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, USA (2013)

    Google Scholar 

  8. Van Wallendael, G., Boho, A., De Cock, J., et al.: Encryption for high efficiency video coding with video adaptation capabilities. IEEE Trans. Consum. Electron. 59(3), 634–642 (2013)

    Article  Google Scholar 

  9. Van Wallendael, G., De Cock, J., Van Leuven, S., et al.: Format-compliant encryption techniques for high efficiency video coding. In: IEEE International Conference on Image Processing, pp. 4583–4587. IEEE, Melbourne (2013)

    Google Scholar 

  10. Shahid, Z., Puech, W.: Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans. Multimedia 16(1), 24–36 (2014)

    Article  Google Scholar 

  11. Yeung, S.-K.A., Zeng, B.: A new design of multiple transforms for perceptual video encryption. In: 19th IEEE International Conference on Image Processing (ICIP 2012), pp. 2637–2640. IEEE, Florida (2012)

    Google Scholar 

  12. Zeng, B., Yeung, S.K.A., Zhu, S., et al.: Perceptual encryption of H.264 videos: embedding sign-flips into the integer-based transforms. IEEE Trans. Inf. Forensics Secur. 9(2), 309–320 (2014)

    Article  Google Scholar 

  13. Hofbauer, H., Uhl, A., Unterweger, A.: Transparent encryption for HEVC using bit-stream-based selective coefficient sign encryption. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2005–2009. IEEE, Kyoto (2014)

    Google Scholar 

  14. Stallings, W.: The RC4 stream encryption algorithm. In: Cryptography and Network Security (2005)

    Google Scholar 

  15. Joint Collaborative Team on Video Coding (JCT-VC) of ITU-T SG16 WP 3 and ISO DEC JTC I/SC29/WG11: HEVC Reference Software Manual. JCTVC-F634, 6th Meeting, Torino, IT (2011)

    Google Scholar 

  16. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by project supported by National Natural Science Foundation of China (Grant Nos. 61370225, 61572182), project supported by Hunan Provincial Natural Science Foundation of China (Grant No. 15JJ2007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fei Peng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, J., Peng, F., Long, M. (2017). A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics