CFP last date
20 May 2024
Reseach Article

A Comprehensive Survey of Video Encryption Algorithms

by Darshana Hooda, Parvinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 1
Year of Publication: 2012
Authors: Darshana Hooda, Parvinder Singh
10.5120/9512-3902

Darshana Hooda, Parvinder Singh . A Comprehensive Survey of Video Encryption Algorithms. International Journal of Computer Applications. 59, 1 ( December 2012), 14-19. DOI=10.5120/9512-3902

@article{ 10.5120/9512-3902,
author = { Darshana Hooda, Parvinder Singh },
title = { A Comprehensive Survey of Video Encryption Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 1 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number1/9512-3902/ },
doi = { 10.5120/9512-3902 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:04:57.553083+05:30
%A Darshana Hooda
%A Parvinder Singh
%T A Comprehensive Survey of Video Encryption Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 1
%P 14-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is the widely used technique to offer security for video communication and considerable numbers of video encryption algorithms have been proposed. The paper explores the literature for already proposed video encryption algorithms with the focus on the working principle of already proposed video encryption schemes. This study is aimed to give readers a quick overview about various video encryption algorithms proposed so far.

References
  1. Thomas Eisenbarth, Christof Paar and Axel Poschmann,Sandeep Kumar,Leif Ushadel. A survey of Lightweight-Cryptography Implementations. Design and test of ICs for Secure Embedded Computing(IEEE Design & Test of Computers)(2007)
  2. Fuwen Liu, Hartmut Koenig. A survey of video encryption algorithms. Computer & Security 29(2010) ;3-15;
  3. A. M. Eskicioglu and E. J. Delp. An overview of multimedia content protection in consumer electronics devices. Proceedings of SPIE Vol. 3971; Security and Water Marking of Multimedia contents II, 246-263, San Jose, California, Jan. 24-26,2000
  4. A. Uhl and a. Pommer. Image and video encryption: from digital rights management to secured personal communication, Advances in Information Security, vol 15, Boston, USA: Springer Science+ business Media, Inc. , 2005.
  5. C. P. Wu and C. C. j. Kuo. Design of integrated multimedia compression and encryption systems. IEEE transaction on multimedia(7)(5):828-839; October 2005
  6. Eugene T. Lin, Gregory W. Cook, Paul Salama and Edward J. Delp, "An over view of Security Issues in Streaming Video", work supported by grant CERIAS,2001, IEEE Xplore
  7. C. P. Wu and C. C. ,j. Kuo, "Efficient multimedia encryption via entopy codec design, in: proceedings of SPIE Security and Watermarking of multimedia Content III, Volume 4314, San Jose, CA, January 2001.
  8. MeyerJ, Gadegast F. Security mechanism for multimedia data with the example MPEG-1 video, project description of SECMPEG. Technical University of Berlin;1995.
  9. T. B. Maples, G. A. Spanos . Performance study of a selective encryption scheme for the security of networked real time video. In: Proceedings of the 4th international Conference on computer and communication, Las Vegas,NV;1995.
  10. L. Agi, L. Gong, An empirical study of MPEG video transmission, in:Proceedings of the Internet Society Symposium on Network and Distributed system security, san Diego, CA, 1996,137-144 .
  11. Choon, L. S. Lightweight and cost-effective MPEG video encryption. International Conference on Information and Communication Technologies: From Theory to Application 2004:525-526
  12. Euijin Choo, Jehyun Lee, Heeio Lee, Giwon Nam, "SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission, International Conference on Multimedia and Ubiquitous Engineering ( MUE'07), 2007.
  13. Qiao L,Nahrstedt K. , Comparision of MPEG encryption algorithms, International Journal of Computer and Graphics,1998;22(4);437-48
  14. L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In: proceedings of the ACM International Multimedia Conference, Boston,MA,1996
  15. A. M. Alattar,G. I. Al-Regib,S. A. Al-Semari, Improved selective encryption techniques for secure transmission on MPEg video bitstreams, in:Proceedings of the international Conference on Image Processing(ICIP'99)
  16. C. Shi,S. Y. Wang,B. Bhargava," MPEG video encryption in real time using secret key cryptograpgy," in : proceedings of the international conference on parallel and distributed processing techniques and applications(PDPTA99), Las Vegas, Nevada,USA,99
  17. B. Bhargava , C. Shi, S. Y. Wang, " MPEG Video Encryption algorithms", Multimedia tools and applications 24(1)(2004),57-79
  18. Wu C-P, Kuo C-CJ, Design of integrated multimedia compression and encryption systems. IEEE transaction on Multimedia( 7)(5):828-39 ; October 2005
  19. Li S, Chen G, Cheung A, Bargava B, Lo KT. On the design of perceptual MPEG-video encryption algorithms. IEEE transactions on Circuits and Systems for video technology 2007;17(2):214-23
  20. H. Cheng, X. Li. Partial encryption of compressed images and video. IEEE Transaction on Signal Processing,48(8):2439-2451;2000
  21. Wen J. Severa M, Zeng W, Luttrell MH,Jin W. A format-compliant configurable encryption framework for access control of video. IEEE Transaction on Circuits and Systems for Video Technology (12)(6):545-57;June 2002
  22. W. Zeng ,S. Lei. efficient frequency domain selective scrambling of digital video. IEEE transaction on Multimedia(5)(1):118-219;March 2002
  23. Eisenbarth, T. A survey of lightweight cryptography implementation. IEEE Design and Test of Computers,2007(24)(6):522-533.
  24. Z. Zhou,Z. Liang, Y. Chen, O. C. Au. , Security analysis of Multimedia encryption schemes based on Multiple Hauffman table, IEEE Signal processing letters 14(3)(2007);
  25. G. Jakimoski, K. P. Subbalakshmi, Cryptanalysis of some multimedia encryption schemes, IEEE transactions on multimedia 10(3)(2008)
  26. Xie D, Kuo C-Cj Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. EURASIP journal on information Security,January 2007(6)(1):118-29
  27. Pazarci M, Dipcin V, A MPEG-2 transparent scrambling technique, IEEE transaction on Consumer Electronics 2002,48(2):345-55
  28. Socek D, Magliveras S, Culibrk D, Marques O, Kalva H, Furt B. Digital video encryption algorithms based on corealation preserving permutations. EURASIP journal on Information Security January 2007;2007(1)
  29. Liu F, Koenig H. Anovel video encryption algorithm for high resolution video. Stevenson,WA,USA. In: Proceeding of ACM NOSSDAV'05. New York:ACM Press;June 2005;69-74
  30. Liu F, Koenig H. Puzzel- a novel video encryption algorithm. IFIPCMS 2005 LNCS 3677. Salzburg,Austeria:Springer; Set. 2005;88-97
  31. Daniel Socek, Hari Kalra, Spyros S. , Mogliveras, Oge Marques, Dubravko C. , Borko F. New approach to encryption and staganography for digital video. Multimedia Systems,Springer-Verlog,2007
  32. Zhu BB,Yuan C, Wang Y, Li S. Scalable protection for MPEG-4 fine granularity scalability. IEEE transaction on Multimedia 2005;7(2):222-33
  33. C. Bergeron, C. Lamy Bergot, compliant selective encryption for H. 264/AVC video streams, in:proceeding of 7th IEEE workshop on multimedia Signal processing, Shanghai, China, October 2005:1-4
  34. M. Grangetto, E. Magli, G. Olmo, Multmedia selective encryption bi means of randomized airthmatic coding. IEEE transaction on multimedia(8)(5):905-907,2006
  35. Siu-Kei, Au Yeung, Shuyuan Zhu, Bing Zeng. Partial video encryption based on alternating transform. IEEE Signal Processing Letters(6)(10):893-896; October 2009
  36. C. Narsimha Raju, Ganugula, Umadevi, Kannan Srinathan, C. V. Jawaha, "Fast and Secure Real-Time Video Encryption". in: Sixth Indian Conference on Computer Vision, Graphics & Image Processing 2008:257-264
Index Terms

Computer Science
Information Sciences

Keywords

Video encryption video security requirements video encryption evaluation metric self adjustable encryption codec independent