DOI QR코드

DOI QR Code

Privacy-Preserving H.264 Video Encryption Scheme

  • Received : 2010.10.29
  • Accepted : 2011.06.29
  • Published : 2011.12.31

Abstract

As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating the security by counting the number of brute-force trials is not proper for measuring the security of video encryption algorithms, considering that attackers can devise specially crafted attacks for specific purposes by exploiting the characteristics of the target video codec. In this paper, we introduce a new attack for recovering contour information from encrypted H.264 video. The attack can thus be used to extract face outlines for the purpose of personal identification. We analyze the security of previous video encryption schemes against the proposed attack and show that the security of these schemes is lower than expected in terms of privacy protection. To enhance security, an advanced block shuffling method is proposed, an analysis of which shows that it is more secure than the previous method and can be an improvement against the proposed attack.

Keywords

References

  1. D.N. Serpanos and A. Papalambrou, "Security and Privacy in Distributed Smart Cameras," Proc. IEEE, vol. 96, no. 10, Oct. 2008, pp. 1678-1687. https://doi.org/10.1109/JPROC.2008.928763
  2. W.H. Widen, "Smart Cameras and the Right to Privacy," Proc. IEEE, vol. 96, no. 10, Oct. 2008, pp. 1688-1697. https://doi.org/10.1109/JPROC.2008.928764
  3. J. Wen et al., "A Format-Compliant Configurable Encryption Framework for Access Control of Video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, June 2002, pp. 545-557. https://doi.org/10.1109/TCSVT.2002.800321
  4. S. Lian et al., "Secure Advanced Video Coding Based on Selective Encryption Algorithms," IEEE Trans. Consum. Electron., vol. 52, no. 2, May 2006, pp. 621-629. https://doi.org/10.1109/TCE.2006.1649688
  5. S. Lian et al., "Efficient Video Encryption Scheme Based on Advanced Video Coding," Multimedia Tools Appl., vol. 38, May 2008, pp. 75-89. https://doi.org/10.1007/s11042-007-0150-7
  6. S.B. Liu et al., "A Novel Format-Compliant Video Encryption Scheme for H.264/AVC Stream Based on Residual Block Scrambling," Int. Conf. Intell. Comput., vol. 5226, 2008, pp. 1087-1094.
  7. C. Bergeron and C. Lamy-Bergot, "Compliant Selective Encryption for H.264/AVC Video Streams," Int. Workshop Multimedia Process., Oct.-Nov. 2005, pp. 477-480.
  8. L.F. Wang et al., "Perceptual Video Encryption Scheme for Mobile Application Based on H.264," J. China Universities Posts Telecommun., vol. 15, Sept. 2008, pp. 73-78. https://doi.org/10.1016/S1005-8885(08)60159-4
  9. Y. Zou et al., "H.264 Video Encryption Scheme Adaptive to DRM," IEEE Trans. Consum. Electron., vol. 52, no. 4, Nov. 2006, pp. 1289-1297. https://doi.org/10.1109/TCE.2006.273147
  10. Y. Mao and M. Wu, "A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption," IEEE Trans. Image Process., vol. 15, no. 7, July 2006, pp. 2061-2075. https://doi.org/10.1109/TIP.2006.873426
  11. M. Abomhara, O. Zakaria, and O.O. Khalifa, "An Overview of Video Encryption Techniques," Int. J. Comput. Theory Eng., vol. 2, no. 1, Feb. 2010, pp. 103-110.
  12. A. Massoudi et al., "Overview on Selective Encryption of Image and Video: Challenges and Perspectives," EURASIP J. Info. Security,, vol. 2008, Article ID 179290, 2008, pp. 1-18.
  13. D. Xie and C.-C. Jay Kuo, "Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream," EURASIP J. Info. Sec., vol. 2007, Article ID 35262, Jan. 2007, pp. 1-18.
  14. S. Li et al., "On the Design of Perceptual MPEG-video Encryption Algorithms," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 2, Feb. 2007, pp. 214-223. https://doi.org/10.1109/TCSVT.2006.888840
  15. F. Dufaux and T. Ebrahimi, "Scrambling for Privacy Protection in Video Surveillance Systems," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 8, Oct. 2008, pp. 1168-1174. https://doi.org/10.1109/TCSVT.2008.928225
  16. H. Kondo et al., "Binary Signal Compression Using DCT Signs," Int. Conf. Autonomous Robots Agents, Dec. 2004, pp. 240-243.
  17. "Advanced Video Coding for Generic Audiovisual Services," ITU-T Rec. H.264/ISO/IEC 14496-10, Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVTG050, Nov. 2007.
  18. D.H. Yeo and H.C. Shin, "High Throughput Parallel Decoding Method for H.264/AVC CAVLC," ETRI J., vol. 31, no. 5, Oct. 2009, pp. 510-517. https://doi.org/10.4218/etrij.09.0109.0110
  19. C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2010.
  20. E. Maggio et al., "Particle PHD Filter for Multi-target Visual Tracking," IEEE Int. Conf. Acoustics, Speech, Signal Process., Apr. 2007, pp. 1101-1104.
  21. BOSS (On Board Wireless Secured Video Surveillance) project, Oct. 2006 to June 2009.
  22. B.S. Manjunath, P. Salembier, and T. Sikora, Introduction to MPEG-7: Multimedia Content Description Interface, Wiley, July 2002.
  23. E. De Castro and C. Morandi, "Registration of Translated and Rotated Images Using Finite Fourier Transforms," IEEE Trans. Pattern Anal. Machine Intell., vol. 9, Sept. 1987, pp. 700-703.
  24. ISO/IEC 15938-6 Information Technology - Multimedia Content Description Interface Part 6: Reference Software, 2003.
  25. G.R. Bradski and V. Pisarevsky, "Intel's Computer Vision Library: Applications in Calibration, Stereo Segmentation, Tracking, Gesture, Vace and Object Recognition," Int. Conf. Comput. Vision Pattern Recognition, vol. 2, 2000, pp. 796-797.

Cited by

  1. System Architecture for Real-Time Face Detection on Analog Video Camera vol.11, pp.5, 2015, https://doi.org/10.1155/2015/251386
  2. A Study on privacy system development vehicle video recording equipment vol.17, pp.5, 2011, https://doi.org/10.17958/ksmt.17.5.201510.1010
  3. A Lightweight Encryption Method for Privacy Protection in Surveillance Videos vol.6, pp.None, 2018, https://doi.org/10.1109/access.2018.2820724