Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. For technical support, please contact us at We apologize for any inconvenience.
By Topic

Fast compression domain video encryption scheme for H.264/AVC streaming

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Niansheng Mao ; Signal & Inf. Process. Lab., Beijing Univ. of Technol., Beijing, China ; Li Zhuo ; Jing Zhang ; Xiaoguang Li

This paper presents a novel method for protecting H.264/AVC streaming. The issues on the compression domain video encryption have been pointed out and fully addressed. To optimize the tradeoff between security level and computational complexity, only the most significant bits for reconstructed video quality in H.264/AVC streaming are extracted and encrypted, including the codewords of intra-prediction mode, the low frequency DCT coefficient of intra-frames and motion vector difference (MVD). To keep the encrypted streaming format-compliance to the H.264/AVC standard decoder, the codewords of intra-prediction mode are encrypted with IPME, the sign bit of the codewords of DCT coefficient are encrypted and the info_suffix of the codewords of MVD are encrypted. Experimental results show that the proposed scheme exhibits significant computational efficiency and reliable security, can resist not only perceptual attacks but also brute-force attacks. Thus, the proposed scheme will be well suited for real-time and resource-limited systems.

Published in:

Advanced Communication Technology (ICACT), 2012 14th International Conference on

Date of Conference:

19-22 Feb. 2012