TY - JOUR
T1 - Chaos-based selective encryption for H.264/AVC
AU - Lui, Oi-Yan
AU - Wong, Kwok-Wo
PY - 2013/12
Y1 - 2013/12
N2 - Encryption techniques are usually employed to maintain the secrecy of the video streams transmitted via a public network. However, full encryption using strong cryptographic algorithms is usually not necessary if the purpose is to destroy the commercial value by preventing pleasant viewing. For this purpose, selective encryption is preferred as its operating efficiency is higher. Here, a chaos-based selective encryption scheme implemented on the H.264/AVC standard is proposed. The scheme employs multiple Rényi chaotic maps to generate a pseudorandom bit sequence which is used to mask the selected H.264/AVC syntax elements. It provides sufficient protection against full reconstruction while keeping the format compliance property so as not to cause decoding error without the key. The operating efficiency is high due to the low computational complexity of the Rényi chaotic map, as justified by the simulation results using video clips at various resolutions. Moreover, the security analyses show that the proposed algorithm is highly sensitive to the secret key and possesses good perceptual security. © 2013 Elsevier Inc. All rights reserved.
AB - Encryption techniques are usually employed to maintain the secrecy of the video streams transmitted via a public network. However, full encryption using strong cryptographic algorithms is usually not necessary if the purpose is to destroy the commercial value by preventing pleasant viewing. For this purpose, selective encryption is preferred as its operating efficiency is higher. Here, a chaos-based selective encryption scheme implemented on the H.264/AVC standard is proposed. The scheme employs multiple Rényi chaotic maps to generate a pseudorandom bit sequence which is used to mask the selected H.264/AVC syntax elements. It provides sufficient protection against full reconstruction while keeping the format compliance property so as not to cause decoding error without the key. The operating efficiency is high due to the low computational complexity of the Rényi chaotic map, as justified by the simulation results using video clips at various resolutions. Moreover, the security analyses show that the proposed algorithm is highly sensitive to the secret key and possesses good perceptual security. © 2013 Elsevier Inc. All rights reserved.
KW - Chaos
KW - H.264/AVC
KW - Video Encryption
UR - http://www.scopus.com/inward/record.url?scp=84887015704&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84887015704&origin=recordpage
U2 - 10.1016/j.jss.2013.07.054
DO - 10.1016/j.jss.2013.07.054
M3 - RGC 21 - Publication in refereed journal
SN - 0164-1212
VL - 86
SP - 3183
EP - 3192
JO - Journal of Systems and Software
JF - Journal of Systems and Software
IS - 12
ER -