LIAN Shi-guo, SUN Jin-sheng, WANG Zhi-quan. Video Encryption and Its Development[J]. INFORMATION AND CONTROL, 2004, 33(5): 560-566.
Citation: LIAN Shi-guo, SUN Jin-sheng, WANG Zhi-quan. Video Encryption and Its Development[J]. INFORMATION AND CONTROL, 2004, 33(5): 560-566.

Video Encryption and Its Development

More Information
  • Received Date: July 27, 2003
  • Published Date: October 19, 2004
  • In this paper, the encryption algorithms are divided into three types according to the relationship between compression and encryption: direct-encryption algorithm, selective-encryption algorithm and compression-encryption combined algorithm. Based on the analysis of the features of different algorithms such as security, computational complexity, compression ratio, and so on, their applications are presented respectively. The future of video encryption is forecasted at the end.
  • [1]
    ISO11172;ISO/MPEG90/176,Coding of Moving Pictures and Associated Audio[S].
    [2]
    ITU-T Rec.H.263,Video Coding for Narrow Telecommunication Channels at<64kbit/s[S].
    [3]
    Wallace Gregory K.The JPEG still image compression standard [J].Communications of the ACM,1991,34(4);30~44.
    [4]
    Qao L,Nahrstedt K.A new algorithm for MPEG video encryption [A].Proecedings of the First International Conference on Imaging Science,Systems and Technology(CISST97)[C].Las Vegas,Nevada;1997.21~29.
    [5]
    NIST FIPS Publication 46-2,1993,Data Encryption Standard [S].
    [6]
    Tosun A S,Feng W C.Lightweight security mechanisms for wireless video transmission[A].Proceedings of the International Conference on Information Technology;Coding and Computing(ITCC01)[C].Las Vegas,Nevada;IEEE,2001.157~161.
    [7]
    Agi I,Gong L.An empirical study of MPEG video transmissions [A].Proceedings of the Internet Society Symposium on Network and Distributed System Security[C].San Diego,CA,1996.137~144.
    [8]
    Romeo A,Romdotti G,Mattavelli M,et al.Cryptosystem architectures for very high throughput multimedia encryption;the RPK solution[A].The 6th IEEE International Conference on Electronics,Circuits and Systems(ICECS'99)[C].Cyprus;Elsevier North-Holland,1999.261~264.
    [9]
    Wee S J,Apostolopoulos J G.Secure scalable video streaming for wireless networks [A].Proceedings of the IEEE International Conference on Acoustics,Speech,and Signal Processing [C].Salt Lake City;IEEE,2001.2049~2052.
    [10]
    Wee S J,Apostolopoulos J G.Secure scalable streaming enabling transcoding without decryption[A].Proceedings of the IEEE International Conference on Image Processing [C].Thessaloniki,Greece;IEEE,2001.437~440.
    [11]
    Qiao L,Nahrstedt K.Comparison of MPEG encryption algorithm [J].International Journal on Computers and Graphics,1998,22(4);437~448.
    [12]
    Kuhn M G.Analysis of the nagravision video scrambling method [EB/OL].http://www.cl.cam.ac.uk/~mgk25/,1998-08-23.
    [13]
    Tang L.Methods for encrypting and decrypting MPEG video data efficiently[A].Proceedings of the Fourth ACM International Multimedia Conference(ACM Multimedia 96')[C].Boston,MA;Elsevier Engineering Information Inc.,1996.219~230.
    [14]
    TosumAS,FengWC.Efficient multi-layer coding and encryption of MPEG video streams[A].IEEE International Conference on Multimedia and Expo[C].New York;IEEE,2000.119~122.
    [15]
    Qiao L,Nahrstedt K,Tam I.Is MPEG encryption by using random list instead of zigzag order secure [A].IEEE International Symposium on Consumer Electronics[C].Singapore;IEEE Piscataway,1997.226~229.
    [16]
    Shi C G,Bhargsva B.A fast MPEG video encryption algorithm [A].Proceedings of the 6th ACM International Multimedia Conference[C].Bristol;Elsevier Engineering Information Inc.,1998.81~88.
    [17]
    Shi C G,Wang SY,BhargavaB.MPEG video encryption in real-time using secret key cryptography[A].Proceedings of the International Conference of Parallel and Distributed Processing Techniques and Applications(PDPTA99')[C].Las Vegas,Nevada;Computer Science Research,Education and Application Press,1999.2822~2828.
    [18]
    Yen J C,Guo J I.A new MPEG encryption system and its VLSI architecture[A].IEEE Workshop on Signal Processing Systems [C].Taipei;Kluwer Academic Publisher,1999.430~437.
    [19]
    Zeng W J,Lei S M.Efficient frequency domain selective scrambling of digital video [J].IEEE Transactions on Multimedia,2003,5(1);118~129.
    [20]
    Shannon C.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4);656~715.
    [21]
    Uehara T.Combined encryption and source coding [EB/OL].http;//www.uow.edu.au/~tu01/CESC.html.
    [22]
    Wen J T,Sevra M,Wen J,et al.A format-compliant configurable encryption framework for access control of multimedia[A].Proceedings of IEEE Workshop on Multimedia Signal Processing [C].Cannes,France;IEEE,2001.435~440.
    [23]
    Tosun A S,Feng W C.On error preserving encryption algorithms for wireless video transmission [A].Proceedings of the ACM International Multimedia Conference and Exhibition [C].Ottawa,Ont.;Elsevier Engineering Information Inc.,2001.302~308.
    [24]
    Wu C P,Kuo C C J.Fast encryption methods for audiovisual data confidentiality[A].Proceedings of SPIE International Symposis on Information Technologies 2000 [C].Boston,USA;SPIE,2000.284~295.
    [25]
    Wu C P,Kuo C C J.Efficient multimedia encryption via entropy codec design [A].SPIE International Symposium on Electronic Imaging 2001 [C].San Jose,USA;SPIE,2001.128~138.
    [26]
    Lim J,Boyd C,Dawson E.Cryptanalysis of adaptive arithmetic coding encryption scheme[A].The Second Australasian Conference on Information Security and Privacy(ACISP97)[C].Sydney,Australia;Springer,1997.216~227.
    [27]
    Cleary J G,Irvine S A,Rinsma-Melchert I.On the insecurity of arithmetic coding[J].Computers and Security,1995,14(2):167~180.

Catalog

    Article views (914) PDF downloads (525) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return