On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables

  • Shujun Li
  • Guanrong Chen
  • Albert Cheung
  • Kwok-Tung Lo
  • Mohan Kankanhalli
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5414)


This paper re-studies the security of an MPEG-video encryption scheme based on secret Huffman tables. The present cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) ciphertext-only attack; 2) its security against the chosen-plaintext attack is very weak. The insecurity is mainly due to the separated use of different Huffman tables for different sets of syntax elements. A brief discussion on how to improve this MPEG-video encryption scheme is also given.


Motion Vector Encryption Scheme Stream Cipher Plaintext Attack Syntax Element 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Qiao, L., Nahrsted, K.: Comparison of MPEG encryption algorithms. Comput. Graph. 22(4), 437–448 (1998)CrossRefGoogle Scholar
  2. 2.
    Bhargava, B., Shi, C., Wang, S.Y.: MPEG video encryption algorithms. Multimedia Tools Appl. 24(1), 57–79 (2004)CrossRefGoogle Scholar
  3. 3.
    Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, LLC (2004)Google Scholar
  4. 4.
    Furht, B., Muharemagic, E., Socek, D. (eds.): Multimedia Encryption and Watermarking. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  5. 5.
    Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  6. 6.
    Zeng, W., Yu, H., Lin, C.Y. (eds.): Multimedia Security Technologies for Digital Rights Management. Academic Press, London (2006)Google Scholar
  7. 7.
    Wu, C.P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia 7(5), 828–839 (2005)CrossRefGoogle Scholar
  8. 8.
    Wen, J., Severa, M., Zeng, W., Luttrell, M.H., Jin, W.: A format-compliant configurable encryption framework for access control of video. IEEE Trans. Circuits and Systems for Video Technology 12(6), 545–557 (2002)CrossRefGoogle Scholar
  9. 9.
    Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimedia 5(1), 118–129 (2003)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Processing 15(7), 2061–2075 (2006)CrossRefGoogle Scholar
  11. 11.
    ISO/IEC: Information technology – coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s – Part 2: Video. MPEG-1 standard: ISO/IEC 11172-2 (1993)Google Scholar
  12. 12.
    ISO/IEC, ITU-T: Information technology – generic coding of moving pictures and associated audio information: Video. MPEG-2 standard: ISO/IEC 13818-2 and ITU-T Rec. H.262 (2000)Google Scholar
  13. 13.
    ISO/IEC: Information technology – coding of audio-visual objects – Part 2: Visual. ISO/IEC 14496-2, MPEG-4 (2004)Google Scholar
  14. 14.
    Shi, C., Bhargava, B.: Light-weight MPEG video encryption algorithm. In: Shaping the Future: Proc. Int. Conference on Multimedia (Multimedia 1998), pp. 55–61 (1998)Google Scholar
  15. 15.
    Kankanhalli, M.S., Guan, T.T.: Compressed-domain scrambler/descrambler for digital video. IEEE Trans. Consumer Electronics 48(2), 356–365 (2002)CrossRefGoogle Scholar
  16. 16.
    Wu, C.P., Kuo, C.C.J.: Fast encryption methods for audiovisual data confidentiality. In: Multimedia Systems and Applications III. Proc. SPIE, vol. 4209, pp. 284–295 (2001)Google Scholar
  17. 17.
    Wu, C.P., Kuo, C.C.J.: Efficient multimedia encryption via entropy codec design. In: Security and Watermarking of Multimedia Contents III. Proc. SPIE, vol. 4314, pp. 128–138 (2001)Google Scholar
  18. 18.
    Xie, D., Kuo, C.C.J.: An enhanced MHT encryption scheme for chosen plaintext attack. In: Internet Multimedia Management Systems IV. Proc. SPIE, vol. 5242, pp. 175–183 (2003)Google Scholar
  19. 19.
    Zhou, J., Liang, Z., Chen, Y., Au, O.C.: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Processing Letters 14(3), 201–204 (2007)CrossRefGoogle Scholar
  20. 20.
    Jakimoski, G., Subbalakshmi, K.P.: Cryptanalysis of some multimedia encryption schemes. IEEE Trans. Multimedia 10(3), 330–338 (2008)CrossRefGoogle Scholar
  21. 21.
    Schneier, B.: Applied Cryptography – Protocols, Algorithms, and Souce Code in C, 2nd edn. John Wiley & Sons, Inc., New York (1996)zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Shujun Li
    • 1
  • Guanrong Chen
    • 2
  • Albert Cheung
    • 3
  • Kwok-Tung Lo
    • 4
  • Mohan Kankanhalli
    • 5
  1. 1.Fachbereich Informatik und InformationswissenschaftUniversität KonstanzKonstanzGermany
  2. 2.Department of Electronic EngineeringCity University of Hong Kong, KowloonHong KongChina
  3. 3.Department of Building and Construction and Shenzhen Applied R&D CentresCity University of Hong Kong, KowloonHong Kong SARChina
  4. 4.Department of Electronic and Information EngineeringThe Hong Kong Polytechnic University, Hung Hom, KowloonHong Kong SARChina
  5. 5.School of ComputingNational University of SingaporeSingapore

Personalised recommendations