CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

H.264 based Selective Video Encryption for Mobile Applications

by Saranya.P, Varalakshmi.L.M
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 4
Year of Publication: 2011
Authors: Saranya.P, Varalakshmi.L.M
10.5120/2209-2807

Saranya.P, Varalakshmi.L.M . H.264 based Selective Video Encryption for Mobile Applications. International Journal of Computer Applications. 17, 4 ( March 2011), 13-20. DOI=10.5120/2209-2807

@article{ 10.5120/2209-2807,
author = { Saranya.P, Varalakshmi.L.M },
title = { H.264 based Selective Video Encryption for Mobile Applications },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 4 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 13-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number4/2209-2807/ },
doi = { 10.5120/2209-2807 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:44.009167+05:30
%A Saranya.P
%A Varalakshmi.L.M
%T H.264 based Selective Video Encryption for Mobile Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 4
%P 13-20
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With high development of computer technology and internet technology, multimedia service has become a new area in internet services today. It has problems like huge amount of data, high speed play, bandwidth limitations etc. Enhancing its security and speed has become an assurance of the video service. Using H.264 to compress and encrypt, videos can solve the speed and security problems in mobile application. Protecting the video information by encrypting selective data is the crucial element. Considering the limited resource and bandwidth of mobile devices, a selective video encryption algorithm, is proposed based on the special features of H.264. In this algorithm, the luminance transform coefficients of residual data are selectively encrypted. Experimental results demonstrate that the proposed algorithm encrypts much less important data and achieves good security and high efficiency.

References
  1. C Wang, H-B. Yu, M Zheng. A DCT-based MPEG-2 transparent scrambling algorithm. IEEE Trans. Consumer Electrons. 2003, 49 (4), 1208-1213.
  2. A. Servetti, J. C. De Martin. Perception-based partial encryption of compressed speech. IEEE Trans. Speech Audio Process. 2002, 10 (11), 637-643.
  3. Jinhaeng Ahn, et al. Digital Video Scrambling Method Using Intra Prediction Mode [A], PCM 2004, LNCS vol.3333, 2004:pp. 386-391.
  4. Zheng Liu, Xue Li. motion vector encryption in multimedia streaming. Proceedings of the 10th International Multimedia Modeling Conference. 2004, 1-8.
  5. P. Melih and D. Vadi. A MPEG-2-transparent scrambling technology. IEEE Trans. Consumer Electron. 2002, 48(2), 345-355.
  6. Jidong Wang,et al. A Partial Scramble Scheme for H.264, Video[C] ASIC, 2007. ASICON '07. 7th International Conference on 22-25 Oct. 2007 Page(s):802 –805.
  7. Wang Yajun, Cai Mian, Tang Feng. Design of a New Selective Video Encryption Scheme Based on H.264. Computational Intelligence and Security, 2007 International Conference on15-19 Dec. 2007 Page(s):883 – 882.
  8. C. Narsimha Raju, Kannan Srinathan and C. V. Jawahar, A real-time video encryption exploiting the distribution of the DCT. TENCON 2008. IEEE Region 10 Conference 19- 21 Nov. 2008 Page(s):1 – 6.
  9. Wu C P, Jay Kuo C... Design of integrated multimedia compression and encryption systems. IEEE Trans. On Multimedia. 2005, 7(5), 828-839.
  10. Wen J, Severa M, Zeng W, Luttrell M H, Jin W. A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits & Systems for Video Technology. 2002, 12, (6): 545-557.
  11. Zhou J, Liang Z, Chen Y, Au O C. Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Processing Letters, 2007, 14(3): 201-204.
  12. Yinian Mao and Min Wu. A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption. IEEE Trans. on image processing. 2006, 15(7), 2061-2075.
Index Terms

Computer Science
Information Sciences

Keywords

H.264 Video Coding Partial Encryption Luminance Transform Coefficients Stream Cipher