期刊文献+

控制关键帧选择的H.264熵编码加密算法 被引量:1

H.264 video entropy coding encryption by controlling key frames
原文传递
导出
摘要 目的常见的H.264熵编码加密是一种将加密方案与熵编码方式融合的视频安全算法,这种算法不仅加解密速度快且可保持数据格式不变,是一种兼容性的加密方案,但需要处理帧内所有数据。方法针对熵编码加密过程中存在的不足,提出了一种基于关键帧选择与熵编码相结合的视频加密方法,通过获取一帧中所有8×8子宏块的运动矢量,构造一个用于表示每一帧内容变化情况的向量F,然后将其欧几里德范数与阈值K比较,如果大于或等于阈值,则确定当前帧是关键帧,则在下一帧熵编码时加密其运动矢量差与残差系数值,否则不参与任何加密运算。结果通过控制阈值K的大小来决定关键帧的选择,并结合混沌序列加密关键帧数据来保证视频信息的安全性,与熵编码加密算法相比,加密数据平均减少数据量约为39.78%。结论实验结果表明该加密方法在保持编码后数据总量不变的情况下,以较小的时间代价获得了良好的加密效果,且与常规的熵编码加密算法相比大幅度减少了加密数据量。 Objective Entropy coding is a new technology used in the H. 264 video standard. In the video security communi- cations, entropy-coding encryption is one of the important encryption algorithms. Commonly, the H. 264 entropy-coding en- cryption is a fusion of encryption and entropy encoding video security algorithm, which is fast and the data format can re- main unchanged. It is a compatibility encryption scheme, but needs to deal with all of the data frames. Method To deal with the problem of the entropy coding encryption process, we propose a video encryption method based on key frames se- lection combined with entropy coding, by capturing all 8 ×8 sub-macroblock motion vectors in one frame and, constructing the vector F to represent the change of the content of each frame. Then the Euclidean norm is compared with the threshold K; if greater than or equal to the threshold, the current frame is the key frame. Then encrypts the next frame when the cod- ing motion-vector and the coefficient of the residual value, otherwise it does not participate in any encryption arithmetic. Result By controlling the threshold value K to determine the key frame selection, combines with the chaotic sequence to guarantee the security of videos. Compared with the entropy coding encryption algorithm, the eneryption data is reduced about 39. 78%. Conclusion The experiments show that the eneryption method maintains the total data, obtains a good en- eryption effect with a smaller time cost, and significantly reduces the amount of the encrypted data. The operation only changes the entropy encoding data, and it has nothing to do with the other processes of video coding. Therefores, the en-cryption system has no effect on the encoded data quantity. This algorithm is a compatibility video encryption.
出处 《中国图象图形学报》 CSCD 北大核心 2014年第3期358-364,共7页 Journal of Image and Graphics
基金 国家自然科学基金项目(11062002 61363076) 江西省教育厅重点科技项目(GJJ13435) 江西省研究生创新专项资金项目(YC2012-S092)
关键词 关键帧 熵编码 运动矢量 视频加密 欧氏范数 key frames entropy encoding motion vector video encryption Euclidean norm
  • 相关文献

参考文献14

二级参考文献66

共引文献87

同被引文献19

  • 1HAMIDOUCtIE W, FARAJALLAH M, RAULET M, et al. Selective vide encryption using chaotic system ill the SHVC extension[C]. International Conference on Acoustics, Speechand Signal Procesing (ICASSP), Sydney, Australia, 2015: 1762-1766.
  • 2LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. Circuits and Systems for Video Technology, 2007, 17(2): 214-223.
  • 3WANG L, WANG W, MA J, et al. Perceptual video encryption scheme for mobile application based on H,264[J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15: 73-78.
  • 4AU Yeung S K, ZHU S, and ZENG B. Design of new unitary transforms for perceptual video encryption[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(9): 1341-1345Networking, Kun ming, 2012: 189-192.
  • 5AU Yeung S K and ZENG B. Visual quality control for perceptual video encryption with multiple transforms[C]. 2012 7th International ICST Conference on Communications and.
  • 6ZENG B, AU YEUNG S K, ZHU S, et al. Perceptual encryption of H. 264 videos: embedding sign-flips into the integer-based transforms[J]. IEEE Transactions on Information Forensics and Security 2014 9(2): 309-320.
  • 7AU YEUNG S K and ZENG B. A new design of multiple transforms for perceptual video encryptioa[C]. 2012 19th IEEE International Conference on Image Processing, Orlando 2012: 2637-2640.
  • 8AU YEUNG S K and ZENG B. Improved perceptual video encryption using multiple 8x8 transforms in MPEG-4[C]. 2012 7th International ICST Conference on Communications and Networking, Kunming, 2012: 185-188.
  • 9ZHANG X Y, DENG H C, and CHEN L W. The video encryption scheme based on perceptual encryption algorithm in H,264 standards[J]. Advaced Materials Research, 2013, 765/767: 615-619.
  • 10SHEN H, ZHUO L, and LI Y. A prediction reference structure based hierarchical perceptual encryption algorithm for H,264 bitstream[J]. Intelligence Science and Big Data Engineering, 2013: 852-859.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部