Open Access

Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream

EURASIP Journal on Information Security20072007:035262

DOI: 10.1155/2007/35262

Received: 4 March 2007

Accepted: 11 September 2007

Published: 15 November 2007

Abstract

This work investigates the problem of efficient multimedia data encryption. A novel methodology is proposed to achieve encryption by controlling certain operations in the data compression process using a secret key. The new encryption approach consists of two cascaded modules. The first one is called randomized entropy coding (REC) while the second one is called rotation in partitioned bitstream (RPB). By leveraging the structure of the entropy coder, the joint REC/RPB encryption scheme incurs extremely low computational and implementation costs. Security analysis shows that the proposed scheme can withstand the ciphertext-only attack as well as the known/chosen plaintext attack. The efficiency and security of the proposed encryption scheme makes it an ideal choice in secure media applications where a large amount of multimedia data has to be encrypted/decrypted in real time.

[12345678910111213141516171819202122232425262728]

Authors’ Affiliations

(1)
Ming Hsieh Department of Electrical Engineering and Integrated Media Systems Center, University of Southern California

References

  1. Cheng H, Li X: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 2000, 48(8):2439-2451. 10.1109/78.852023View ArticleGoogle Scholar
  2. Droogenbroeck MV, Benedett R: Techniques for a selective encryption of uncompressed and compressed images. Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS '02), September 2002, Ghent, BelgiumGoogle Scholar
  3. Pommer A, Uhl A: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 2003, 9(3):279-287. special issue on Multimedia Securit 10.1007/s00530-003-0099-yView ArticleGoogle Scholar
  4. Podesser M, Schmidt H-P, Uhl A: Selective bitplane encryption for secure transmission of image data in mobile environments. 5th Nordic Signal Processing Symposium, October 2002, Trondheim, NorwayGoogle Scholar
  5. Spanos GA, Maples TB: Performance study of a selective encryption scheme for the security of networked, real-time video. Proceedings of the 4th ACM International Conference on Computer Communications and Networks (ICCCN '95), September 1995, Las Vegas, Nev, USA 2-10.Google Scholar
  6. Agi I, Gong L: An empirical study of secure mpeg video transmission. Internet Society Symposium on Network and Distributed System Security, February 1996, San Diego, Calif, USA 137-144.View ArticleGoogle Scholar
  7. Tang L: Methods for encrypting and decrypting MPEG video data efficiently. Proceedings of the 4th ACM International Multimedia Conference & Exhibition, November 1996, Boston, Mass, USA 219-229.Google Scholar
  8. Shi C, Bhargava B: A fast mpeg video encryption algorithm. Proceedings of the 6th ACM International Conference on Multimedia, September 1998, Bristol, UKGoogle Scholar
  9. Shi C, Wang S-Y, Bhargava B: Mpeg video encryption in real-time using secret key cryptography. International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '99), June 1999, Las Vegas, Nev, USAGoogle Scholar
  10. Wu C-P, Kuo C-CJ: Efficient multimedia encryption via entropy codec design. Security and Watermarking of Multimedia Contents, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 128-138.View ArticleGoogle Scholar
  11. Meyer J, Gadegast F: Security mechanisms for multimedia data with the example mpeg-1 video. 1995.Google Scholar
  12. Qiao L, Nahrstedt K: A new algorithm for mpeg video encryption. Proceedings of the 1st International Conference on Imaging Science, Systems, and Technology (CISST '97), July 1997, Las Vegas, Nev, USA 21-29.Google Scholar
  13. Chu H-H, Qiao L, Nahrstedt K: Secure multicast protocol with copyright protection. Symposium on Electronic Imaging: Science and Technology, January 1999, San Jose, Calif, USA, Proceedings of SPIE 3657: 460-471.Google Scholar
  14. Slagell A: Known plaintext attack against a permutation based video encryption algorithm. 2002.http://citeseer.ist.psu.edu/slagell04knownplaintext.htmlGoogle Scholar
  15. Wu C-P, Kuo C-CJ: Fast encryption methods for audiovisual data confidentiality. Symposium on Photonics East, Voice, Video, and Data Communication, October 2001, Ottawa, Canada, Proceedings of SPIE 4209: 284-295.Google Scholar
  16. Wu C-P, Kuo C-CJ: Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 2005, 7(5):828-839.View ArticleGoogle Scholar
  17. Xie D, Kuo C-CJ: Efficient multimedia data encryption based on flexible QM coder. Security, Steganography, and Watermarking of Multimedia Contents VI, January 2004, San Jose, Calif, USA, Proceedings of SPIE 5306: 696-704.View ArticleGoogle Scholar
  18. Grangetto M, Magli E, Olmo G: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 2006, 8(5):905-917.View ArticleGoogle Scholar
  19. Wen JG, Kim H, Villasenor JD: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 2006, 13(2):69-72.View ArticleGoogle Scholar
  20. Kim H, Wen J, Villasenor JD: Secure arithmetic coding. IEEE Transactions on Signal Processing 2007, 55(5):2263-2272.MathSciNetView ArticleGoogle Scholar
  21. Bose R, Pathak S: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Transactions on Circuits and Systems I 2006, 53(4):848-857.MathSciNetView ArticleGoogle Scholar
  22. Xie D, Kuo C-CJ: Multimedia data encryption via random rotation in partitioned bit streams. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 5: 5533-5536.Google Scholar
  23. Zhou J, Liang Z, Chen Y, Au OC: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Processing Letters 2007, 14(3):201-204.View ArticleGoogle Scholar
  24. Menezes AJ, van Oorschot PC, Vanstone SA: Handbook of Applied Cryptography. CRC Press, Boca Raton, Fla, USA; 1996.View ArticleGoogle Scholar
  25. Witten IH, Cleary JG: On the privacy afforded by adaptive text compression. Computers and Security 1988, 7(4):397-408. 10.1016/0167-4048(88)90580-9View ArticleGoogle Scholar
  26. Bergen HA, Hogan JM: Chosen plaintext attack on an adaptive arithmetic coding compression algorithm. Computers and Security 1993, 12(2):157-167. 10.1016/0167-4048(93)90099-QView ArticleGoogle Scholar
  27. Cleary JG, Irvine SA, Rinsma-Melchert I: On the insecurity of arithmetic coding. Computers and Security 1995, 14(2):167-180. 10.1016/0167-4048(95)97050-KView ArticleGoogle Scholar
  28. Lim J, Boyd C, Dawson E: Cryptanalysis of adaptive arithmetic coding encryption scheme. The 2nd Australasian Conference on Information Security and Privacy, July 1997, Tokyo, Japan 216-227.View ArticleGoogle Scholar

Copyright

© D. Xie and C.-C. J. Kuo. 2007

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.