CFP last date
20 May 2024
Reseach Article

A Comparative Study of Video Encryption Schemes

by Jitendra Rajpurohit, Shweta Sharma, Bhagyashri Naruka
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 4
Year of Publication: 2014
Authors: Jitendra Rajpurohit, Shweta Sharma, Bhagyashri Naruka
10.5120/15868-4810

Jitendra Rajpurohit, Shweta Sharma, Bhagyashri Naruka . A Comparative Study of Video Encryption Schemes. International Journal of Computer Applications. 91, 4 ( April 2014), 10-16. DOI=10.5120/15868-4810

@article{ 10.5120/15868-4810,
author = { Jitendra Rajpurohit, Shweta Sharma, Bhagyashri Naruka },
title = { A Comparative Study of Video Encryption Schemes },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 4 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 10-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number4/15868-4810/ },
doi = { 10.5120/15868-4810 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:52.686349+05:30
%A Jitendra Rajpurohit
%A Shweta Sharma
%A Bhagyashri Naruka
%T A Comparative Study of Video Encryption Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 4
%P 10-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A method to protect video contents from unauthorized access is known as a video encryption scheme. This paper first surveys the literature to identify most desired features of an encryption algorithm. Then a classification has been drawn according to their characteristics. After that, some of the algorithms are discussed and their working has been explained briefly. At the end a comparison has been shown displaying their performance on a few chosen parameters.

References
  1. ISO/IEC 13818:1996, Coding of Moving Pictures and Associated Audio (MPEG-2); Part 1: systems, Part2 : video
  2. Mitchell J. L. , Pennebaker W. B. , fogg C. E. and LeGall D. J. , MPEG Video Compression Standard, Chapman & Hall, 1996.
  3. ITU-T Rec. H. 264/ISO/IEC 11496-10. Advanced Video Coding. Final Committee draft, Document JVT-E022, 2002.
  4. Iain E G Richardson. H. 264/MPEG Part10, 2002. Available: http://www. vcodex. com.
  5. Hamid Shojanazeri, Wan Azizun Wan Adnan, Sharifah Mumtadzah Syed Ahmad„ M. Iqbal Saripan, "Analysis of Watermarking Techniques in Video". In the proceeding of 11th International conference on Hybrid Intelligent Systems (HIS), 2011, pp. 486-292.
  6. Wenjun Lu, Avinash Varna, and Min Wu, "SECURE VIDEO PROCESSING: PROBLEMS AND CHALLENGES". In the proceedings of the IEEE International conference on Acoustics, Speech and signal Processing (ICASSP), 2011, pp. 5856-5859
  7. R. R. Igorevich, H. Yong, D. Min, E. Choi "A study on multimedia security systems in video encryption," in proceeding of IEEE 6th International Conference on Network Computing. 2010, pp. 1-5
  8. NIST: Advanced Encryption Standard, FIPS 197, 2001.
  9. NIST: Data Encryption Standard, FIPS 46-3, 1999.
  10. K. John Singh, R. Manimegalai, "Fast Random Bit Encryption Technique for Video Data", European Journal of Scientific Research, Vol. 64, No. 3, 2011, pp. 437-445
  11. Adam J. Slaggel. "Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm" . Available at http://eprint. iacr. org/2004/011. pdf
  12. C. Shi and B. Bhargava, "Light Weight MPEG video Encryption Algorithm", in Proceeding of the International Conference on Multimedia, 1998,pp. 55-61
  13. Hao Wang and Chong-wei Xu, "A New Lightweight and Scalable Encryption Algorithm for Streaming Video over Wireless Networks", International Conference on Wireless Network, 2007, pp. 180-185.
  14. C. Shi and B. Bhargava, "A fast MPEG video encryption algorithm," In the Proceedings of the sixth ACM international conference on Multimedia, New York, USA, 1998, pp. 81-88
  15. B. Bhargava and C Shi, "An efficient MPEG video encryption algorithm," In the proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, 1998, pp. 381-386
  16. C. Shi, S. Y. Wang and B. Bhargava, "MPEG video encryption in real-time using secret key cryptography," International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '99), Las Vegas, 1999
  17. C. Bergeron and C. Lamy-Bergot, "Compliant Selective Encryption for H. 264/AVC Video Streams," in the Proceedings of the 7th IEEE Workshop on Multimedia Signal Processing ,2005, pp. 1–4
  18. WANG Li-feng, NIU Jian-wei, MA Jian, WANG Wen-dong, XIAO Chen, "A Lightweight Video Encryption Algorithm for Wireless Application", Fifth IEEE International Symposium on Embedded Computing, 2008
  19. Zhang Qian, Wu Jin-mu, Zhao Hai-xia, "Efficiency Video Encryption Scheme Based on H. 264 Coding Standard and Permutation Code Algorithm", IEEE World Congress on Computer Science and Information Engineering, 2009, pp. 674-678
  20. T. Vino1, E. Logashanmugam, "A Model-based Multimedia Encryption Scheme for Real Time Videos", IEEE International Conference on Recent Advances Space Technology Services and Climate Change, 2010, pp. 171-173
  21. Varalakshmi. L. M. , Dr. Florence Sudha. G. , Vijayalakshmi. V. , "Enhanced Encryption schemes of video for real time", In the proceedings of the International Conference on Signal Processing, Communication, Computing and Networking Technologies, 2011 , pp. 408-413
  22. Mukut Roy, Chittaranjan Pradhan, "Secured Selective Encryption Algorithm for MPEG-2 Video", In the proceedings of the 3rd International Conference on Electronics Computer Technology (ICECT), 2011, pp. 420-423
  23. Lei Chen, Narasimha Shashidhar, Qingzhong Liu, "Scalable Secure MJPEG Video Streaming", In the proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012, pp. 111-115
  24. Lingling Tong, Gang Cao, Jintao Li. , "Layered Video Encryption Utilizing Error Propagation in H. 264/AVC", In the proceeding of the IEEE Symposium on Electrical & Electronics Engineering, 2012, pp. 182-187
  25. Shunjun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, and Kwok-Tung Lo, "On the Design of Perceptual MPEG Video Encryption Algorithm", IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, No. 2, 2007, pp. 214-223
  26. M. Pazarci and V. Dipcin, "A MPEG2-Transparent Scrambling Technique", IEEE Transactions on Consumer Electronics, Vol. 48, No. 2, 2002, pp. 345-355
  27. C. Wang, H. -B Yu, and M. Zheng, "A DCT based MPEG-2 Transparent Scrambling Algorithm", IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, 2003,pp. 1208-1213.
  28. S. Lian, X. Wang, J. Sun, and Z. Wang, "Perceptual Cryptography on Wavelet Transform Encoded Videos, "in the Proceedings of IEEE International. Symposium on Intelligent Multimedia, Video and Speech Processing, 2004, pp. 57-60.
  29. S. Lian, J. Sun, and Z. Wang, "Perceptual Cryptography on SPIHT Compressed Images and Videos, "in Proceedings of IEEE International Conference on Multimedia and Expo, Vol. 3, 2004, pp. 57-60.
  30. S. Lian, "Perceptual Cryptography on JPEG2000 Compressed Images or Videos, " in Proceedings of International Conference on Computer and Information Technology, IEEE Consumer Society, 2004, pp. 78-83
Index Terms

Computer Science
Information Sciences

Keywords

Video encryption selective encryption perceptual encryption