期刊文献+

基于宏块编码信息自适应置换的H.264/AVC视频加密方法 被引量:2

H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information
下载PDF
导出
摘要 云存储的发展使人们愿意将个人视频数据传输至云端,但伴随而来的数据安全问题日益突出,选择加密是对视频进行隐私保护的有效手段之一。针对目前H.264/AVC视频选择加密方法普遍存在安全性不足的问题,文中提出了一种基于宏块编码信息自适应置换的H.264/AVC视频加密方法。该方法根据宏块的编码类型逐帧自适应生成伪随机序列,利用伪随机序列将宏块编码信息中的残差编码方案(Coded Block Pattern, CBP)和残差数据(Residual)在宏块间进行随机置换,同时还对Ⅰ宏块的帧内预测模式以及P宏块与B宏块的运动向量差值的符号进行加密。实验结果表明,该方法可保证加密视频兼容H.264/AVC编码标准,并具有加密空间大、密钥敏感性好、视频码率变化小的特点。与现有的主流加密方案相比,所提方法在视觉安全性和抵抗最新提出的轮廓攻击方面表现更佳。 The development of cloud storage makes people willing to upload personal video to the cloud,but the data security problems brought by it have become increasingly prominent,selective encryption is one of the effective ways to protect video privacy.Aiming at the problem of insufficient security in the current H.264/AVC video selective encryption method,a novel H.264/AVC video selective encryption method based on adaptive permutation of macroblock coding information is proposed.The method adaptively generates pseudo-random sequence frame by frame according to the macroblock types,uses the pseudo-random sequence to randomly permute the coded block pattern(CBP)and the residual data in the coding information of a macroblock between macroblocks,changes the intra prediction modes of I macroblocks,and flips the signs of motion vector differences of P macroblocks and B macroblocks.Experimental results show that the proposed method can preserve format compatibility with H.264/AVC coding standard,and has characteristics of large encryption space,good key sensitivity,and small video bitrate variation.Compared with the existing encryption schemes,the proposed method performs better in terms of visual security and resistance to state of the art of sketch attack.
作者 梁剑 何军辉 LIANG Jian;HE Jun-hui(School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,China)
出处 《计算机科学》 CSCD 北大核心 2022年第1期314-320,共7页 Computer Science
基金 广东省自然科学基金(2019A1515011231)。
关键词 云服务 H.264/AVC 选择加密 编码信息 自适应置换 Cloud service H.264/AVC Selective encryption Coding information Adaptive permutation
  • 相关文献

参考文献2

二级参考文献24

  • 1HAMIDOUCtIE W, FARAJALLAH M, RAULET M, et al. Selective vide encryption using chaotic system ill the SHVC extension[C]. International Conference on Acoustics, Speechand Signal Procesing (ICASSP), Sydney, Australia, 2015: 1762-1766.
  • 2LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. Circuits and Systems for Video Technology, 2007, 17(2): 214-223.
  • 3WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H,264[J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15: 73-78.
  • 4AU Yeung S K, ZHU S, and ZENG B. Design of new unitary transforms for perceptual video encryption[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(9): 1341-1345Networking, Kun ming, 2012: 189-192.
  • 5AU Yeung S K and ZENG B. Visual quality control for perceptual video encryption with multiple transforms[C]. 2012 7th International ICST Conference on Communications and.
  • 6ZENG B, AU YEUNG S K, ZHU S, et al. Perceptual encryption of H. 264 videos: embedding sign-flips into the integer-based transforms[J]. IEEE Transactions on Information Forensics and Security 2014 9(2): 309-320.
  • 7AU YEUNG S K and ZENG B. A new design of multiple transforms for perceptual video encryptioa[C]. 2012 19th IEEE International Conference on Image Processing, Orlando 2012: 2637-2640.
  • 8AU YEUNG S K and ZENG B. Improved perceptual video encryption using multiple 8x8 transforms in MPEG-4[C]. 2012 7th International ICST Conference on Communications and Networking, Kunming, 2012: 185-188.
  • 9ZHANG X Y, DENG H C, and CHEN L W. The video encryption scheme based on perceptual encryption algorithm in H,264 standards[J]. Advaced Materials Research, 2013, 765/767: 615-619.
  • 10SHEN H, ZHUO L, and LI Y. A prediction reference structure based hierarchical perceptual encryption algorithm for H,264 bitstream[J]. Intelligence Science and Big Data Engineering, 2013: 852-859.

共引文献8

同被引文献18

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部