13.07.2015 Views

A Survey of H.264 AVC/SVC Encryption

A Survey of H.264 AVC/SVC Encryption

A Survey of H.264 AVC/SVC Encryption

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9(a) Inter-prediction mode encryption: (b) Secret DCT transforms (figureIDR picture (figure taken from [1], taken from [76], figure 6, p.896)figure 1(a), p.392)(c) Sign encryption and coefficient (d) MVD, DCT and Inter-PM encryption(figure taken from [39], fig-encryption (CABAC) (figure takenfrom [56], figure 5(c), p.1040) ure 4, p.286 )2) Security: The proposed solution (see section V-A1) isas secure as the employed encryption primitive, e.g., AES incounter mode, with respect to MP security on the raw videodata.3) Compression: Depending on the packetization strategythere can be a negligible to significant negative influence onthe compression performance.4) Performance: <strong>Encryption</strong> is applied on the compressedbitstream. Thus runtime performance is as good as the runtimeperformance <strong>of</strong> the applied encryption primitive, which is verygood in the case <strong>of</strong> AES.5) Preserved Functionality: Format-compliance can not bepreserved, optimal packetization leads to a violation <strong>of</strong> theMP security notion on raw video data. Thus there is a trade<strong>of</strong>fbetween frame structure or scalability preservation andcompression complexity and efficiency (i.e., it depends on thepacketization strategy which needs to packetize the video bitstreamin a source independent fashion, which requires specialcare in the compression and afterwards requires stuffing <strong>of</strong> thepackets to source independent lengths). Transcoding and DCTwatermarking can not be conducted in the encrypted domain,but stream substitution watermarking is still possible. Forstream substitution watermarking we propose the application<strong>of</strong> a stream cipher mode with no cipher feedback, e.g., countermode. The substitution watermark in the encrypted domain w eis then w e = w p ⊕k, where w p is the plaintext watermark andk are the corresponding key stream bits.(e) IDR picture encryption (a reconstruction<strong>of</strong> a P picture is shown)Fig. 10.(f) <strong>SVC</strong> base layer encryption (replacementattack)(g) <strong>SVC</strong> base layer encryption (replacementattack and level adjustment)Visual examples <strong>of</strong> <strong>H.264</strong> encryption1) Suitable Video <strong>Encryption</strong> Schemes and Proposed Solution:Video compression and video encryption schemes can bedesigned to meet the requirements <strong>of</strong> highest level security andpreserve scalability. The preserved (scalability) informationmust not depend on the raw data.Solutions can target the encoding process, i.e., compress thedata to certain source-independent bitrate and / or stuff bytesafterwards.A practical solution for <strong>SVC</strong> defines target bitrates forthe base and enhancement layers, and packetizes base andenhancement layers into fixed length packets and additionallyapplies byte stuffing if there is too few video data.B. Content ConfidentialityTo securely implement content confidentiality it is necessaryto encrypt most <strong>of</strong> the video data or to prevent (partial)decoding at all.1) Suitable Video <strong>Encryption</strong> Schemes and Proposed Solutions:For this application scenario we propose to encrypt theNALU payload, because each <strong>of</strong> the compression-integratedencryption schemes leaks some visual information. A combination<strong>of</strong> compression-integrated schemes heavily distorts thevideos (see figure 10) but a human observer can guess thecontent <strong>of</strong> the video. Furthermore, sophisticated attacks arelikely to reveal even more <strong>of</strong> the visual content.The encryption algorithm can preserve the NALU syntaxand semantics or format-compliance. If the semantics arepreserved (i.e., the NUT is preserved) the format-complianceis lost, as the decoding <strong>of</strong> the encrypted data will leadto violations <strong>of</strong> the semantical requirements. If the formatcompliancethrough explicit signalling <strong>of</strong> the encrypted datavia unspecified NUTs is preserved the semantics are notcompliantly preserved, as unspecified NUT only indicates thata decoder has to ignore the NALU data. Another approachis the application <strong>of</strong> container formats, which more clearlyseparate encryption and compression, but introduce certainoverheads in terms <strong>of</strong> runtime and compression efficiency(e.g., results for adaptation for a NAL-based system and aMPEG-21-based system are presented [29], that can serve asreference for the expected overhead if container formats areemployed). In both cases (NAL and container format) partialencryption could be applied, e.g., as proposed in [24].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!