首页 | 本学科首页   官方微博 | 高级检索  
     


Hash key-based video encryption scheme for H.264/AVC
Authors:Xiaofeng Wang  Nanning Zheng  Lihua Tian
Affiliation:1. Institute of Artificial Intelligence and Robotics, Xi’an Jiaotong University, Xi’an, Shaanxi 710049, PR China;2. School of Science, Xi’an University of Technology, Xi’an, Shaanxi 710048, PR China;1. Department of Dermatology, Affiliated Hospital of Weifang Medical University, Weifang 261031, China;2. Department of Obstetrics, Affiliated Hospital of Weifang Medical University, Weifang 261031, China;3. School of Information Engineering, Weifang Vocational College, Weifang 261041, China;1. School of Information Science and Engineering, Northeastern University, Shenyang 110004, China;2. Software College, Northeastern University, Shenyang 110004, China;3. School of Electronics and Information Engineering, Southwest University, Chongqing 400715, China;1. School of Computer Science, Xi’an Polytechnic University, Xi’an, 710048, China;2. School of Computer Science, Northwestern Polytechnical University, Xi’an, 710072, China;3. School of Software Engineering, Xi’an Jiaotong University, Xi’an, 710049, China;1. School of Electronics and Information Engineering, Ningbo University of Technology, Ningbo 315016, China;2. CKC Software Lab, Ningbo University, Ningbo 315211, China;3. Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07102-1982, USA;1. Department of Thyroid and Breast Surgery, Shen Zhen Nan Shan District People?s Hospital, Shenzhen 518052, China;2. The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, China;3. Cancer Center, Georgia Regents University, Augusta, GA 30912, USA
Abstract:An improved H.264/AVC comprehensive video encryption scheme is proposed. In the proposed scheme, the intra-prediction mode, motion vector difference, and quantization coefficients are encrypted. A novel hierarchical key generation method is likewise proposed, in which the encryption keys are generated based on the cryptographic hash function. Generated frame keys are consistent with the corresponding frame serial numbers, which can ensure frame synchronization in the decrypting process when frame loss occurs. This function provides the property that our scheme is secure against some special attacks for video, such as the frame regrouping attack and frame erasure attack. Our method not only avoids the distribution of encryption keys, but also increases the security. Experimental results show that the proposed scheme is efficient in computing, the encryption process does not affect the compression ratio greatly, and the encryption/decryption process hardly affects the video quality.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号