All articles published by MDPI are made immediately available worldwide under an open access license. No special
permission is required to reuse all or part of the article published by MDPI, including figures and tables. For
articles published under an open access Creative Common CC BY license, any part of the article may be reused without
permission provided that the original article is clearly cited. For more information, please refer to
https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature
Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for
future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive
positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world.
Editors select a small number of articles recently published in the journal that they believe will be particularly
interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the
most exciting work published in the various research areas of the journal.
In actual application scenarios of the real-time video confidential communication, encrypted videos must meet three performance indicators: security, real-time, and format compatibility. To satisfy these requirements, an improved bitstream-oriented encryption (BOE) method based chaotic encryption for H.264/AVC video is proposed. Meanwhile, an ARM-embedded remote real-time video confidential communication system is built for experimental verification in this paper. Firstly, a 4-D self-synchronous chaotic stream cipher algorithm with cosine anti-controllers (4-D SCSCA-CAC) is designed to enhance the security. The algorithm solves the security loopholes of existing self-synchronous chaotic stream cipher algorithms applied to the actual video confidential communication, which can effectively resist the combinational effect of the chosen-ciphertext attack and the divide-and-conquer attack. Secondly, syntax elements of the H.264 bitstream are analyzed in real-time. Motion vector difference (MVD) coefficients and direct-current (DC) components in Residual syntax element are extracted through the Exponential-Golomb decoding operation and entropy decoding operation based on the context-based adaptive variable length coding (CAVLC) mode, respectively. Thirdly, the DC components and MVD coefficients are encrypted by the 4-D SCSCA-CAC, and the encrypted syntax elements are re-encoded to replace the syntax elements of the original H.264 bitstream, keeping the format compatibility. Besides, hardware codecs and multi-core multi-threading technology are employed to improve the real-time performance of the hardware system. Finally, experimental results show that the proposed scheme, with the advantage of high efficiency and flexibility, can fulfill the requirement of security, real-time, and format compatibility simultaneously.
Real-time video communication is widely used in military, business, entertainment, and personal social activities, such as video conferencing, live video, and video surveillance [1,2,3,4]. However, the openness of the internet leads to many security risks in video communication. Cybersecurity incidents such as malicious attacks, illegal access, information leakage, theft, and evil tampering are frequently reported. Many studies have shown that end-to-end encryption is an effective way to protect cyber information and personal privacy [5,6,7,8,9]. Only communicating parties with the right secret keys can easily decrypt ciphertexts, while third parties without the matched secret keys cannot obtain plaintexts even if they obtain the ciphertexts. Therefore, the end-to-end encryption is a necessary means for real-time video confidential communication.
To realize the end-to-end encryption for the communication video, security, real-time, and format compatibility are important technical indicators that must be met simultaneously for the real-time video confidential communication system [1,10,11,12,13,14,15]. Security includes two aspects: cryptographic security and perceptual security. The cryptographic security depends on the ability of encryption algorithms to resist various types of cryptanalysis methods, and the perceptual security relies on the recognizability of encrypted video images from human eyes. Frame rate is considered as the reference index for the real-time performance, and the basic frame rate for real-time video communication is 25 f/s or more. The real-time performance is not only affected by video resolution, but also video compression ratio, calculation load, and computational efficiency [6,12,13]. Format compatibility is another significant indicator of video confidential communication. For instance, the video information of video surveillance, paid video, or live video always needs to be performed adaptation or transcoding operations by third-party servers [5,6,16,17], including storage recognition, watermark insertion, rate adaptation, and so on. Incompatible video format will inevitably lead to the failure of adaptation operations. Although encrypted videos without format compatibility can be decrypted as original videos on the servers before adaptation [5,16], the plaintext information will be exposed on the third-party, which does not meet the requirement of the end-to-end encryption. On the contrary, encrypted videos with format compatibility can be directly adopted without decryption on the servers. Therefore, the compatibility of video format is the primary condition to realize the end-to-end encryption for the communication video [5,18].
To meet the above three indicators simultaneously, in recent years, people perform in-depth studies in encryption algorithms [1,2,10,19,20,21,22,23] and video encryption methods [6,15,16,24,25,26,27,28,29,30,31,32] suitable for real-time video secure communication for H.264/AVC. Using encryption algorithms to encrypt video information in real time is an important means to protect the security of communication videos. However, due to the large amount of data and high relevance of video information in actual video communication applications, traditional text encryption algorithms such as DES and AES, with a large time consumption, are difficult to meet the real-time transmission requirements of encrypted videos [18,33,34]. In the existing encryption algorithms, chaotic encryption algorithm has been extensively explored. Because chaotic encryption algorithm has good pseudo-randomness, initial value sensitivity, and high operation efficiency, it can not only ensure the high security of encrypted video data, but also meet the real-time requirements of video transmission. Therefore, chaotic encryption algorithm is more suitable for real-time video confidential communication applications. In particular, among chaotic encryption algorithms, n-D (n = 3, 7, 8) self-synchronous chaotic stream cipher algorithms (n-D SCSCA) [19,20,21] applied to an actual video confidential communication system show superior characteristics. These algorithms belong to closed-loop feedback chaotic encryption algorithms. The ciphertext is fed back to the chaotic system to realize the self-synchronization of the encryption and decryption ends. When these algorithms are applied to actual channels, even if the ciphertext information suffers from channel interference during transmission, after the decryption end receives a certain amount of correct ciphertext information, the state variables of the cipher algorithm at both ends can asymptotically synchronize. Thus, these algorithms have a good ability to resist channel interference and are more suitable for actual video confidential communication applications. However, n-D SCSCA (n = 3, 7, 8) still have security loopholes. Lin et al. [22] propose a cryptanalysis method that combines a chosen-ciphertext attack with a divide-and-conquer attack by traversing single non-zero component initial conditions (DCA-TSNCIC). The method is used to decipher 8-D SCSCA [19] that employ the lower eight-bits of a single chaotic variable as the chaotic pseudo-random sequence, and most of the secret keys of 8-D SCSCA are deciphered. To improve the security of SCSCA, refs [20,21] propose n-D SCSCA (n = 3, 7) that employ the lower eight-bits of the multiplication result of multiple chaotic variables as the chaotic pseudo-random sequence. n-D SCSCA (n = 3, 7) increase the computational complexity of the chaotic pseudo-random sequence expression, so that cryptanalysts cannot obtain enough nonlinear equations through DCA-TSNCIC to solve the original secret keys of the encryption algorithm. However, they cannot further resist the divide-and-conquer attack traversing multiple non-zero component initial conditions (DCA-TMNCIC) that is more powerful than the DCA-TSNCIC [35].
In the existing video encryption scheme for H.264/AVC, they can be classified into full encryption (FE) [32] and selective encryption (SE) [16,30,31,32]. The FE method is to indiscriminately encrypt the entire encoded video information, which will cause the format information of the encoded video to be destroyed [17]. The SE method is to selectively encrypt part of the critical information in the encoded video, and the selected critical information will not affect the encoded video format after being encrypted. Compared with the FE method, the SE method has less encrypted data and can maintain the format of encrypted video. Thus, the SE scheme is an effective method to realize the security, real-time, and format compatibility of the video confidential communication system.
According to the different relationships between encryption algorithms and video codecs, SE methods can be further subdivided into compression-integrated encryption (CIE) and bitstream-oriented encryption (BOE). The feature of CIE is that it has a coupling structure embedding the encryption algorithm into the video codec, where the video information is encrypted during encoding. The feature of BOE is that it has an independent architecture separating the encryption algorithm and the video codec, where the video information is encrypted after being encoded. Chen et al. [32] and Zhang et al. [36] designed a video confidential communication system based on the CIE scheme. The encryption algorithm was embedded into software codecs, and the syntax elements in the H.264 bitstream were encrypted during the encoding process. The experimental results prove that the CIE scheme can realize that encrypted videos keep the H.264 format, fulfilling the format compatibility. However, under the 640 × 480 video resolution, the video transmission frame rate in [32,36] cannot meet the basic real-time requirement (25 f/s) in the actual video communication. The main reason for this result is that software codecs with low computational efficiency seriously damage real-time performance. Besides, the CIE scheme lacks flexibility owing to the dependency between the encryption algorithm and the software codecs. Any standard codecs, no matter the software or hardware, are not applicable in the CIE scheme. Only the special software codecs customized with the encryption algorithm are suitable for it. Compared with the CIE scheme, the BOE scheme is more flexible than the CIE scheme because any standard codecs can be used to perform the coding operation in the independent architecture. Arachchi et al. [5] proposed a standalone encryption method to achieve end-to-end security adaptation requirements. The standalone encryption method separated the video encoding and video encryption process. Meanwhile, it performed a series operation of analysis, extraction, encryption, and encoding on the H.264 bitstream, so it can be classified as the BOE method. References [3,18,23] proposed a similar encryption method for H.264 bitstream, which retained the ‘header’ information of the H.264 bitstream and encrypted the rest of the data. When the type of ‘header’ is revised as unspecific, the encrypted bitstream will be bypassed without decoding to maintain format compatibility. Although this method performed encryption operation for the H.264 bitstream with an independent architecture of the encryption algorithm and codec, it is still far from the BOE method. In fact, the method is more like FE than SE due to the main information of the encoded videos being encrypted indiscriminately. Its biggest flaw comes from the destruction on the syntactic structure of macroblocks. Boyadjis et al. [37] and Cheng et al. [4] encrypted syntax elements extracted from H.264 bitstream and generated encrypted video with format compatibility. They all adopted the combination of BOE method and AES block cipher to design a video encryption system. AES algorithm has to construct a fixed-length packet for encryption and even fill up the package with padding data when the packet data is insufficient. The data filling operation will increase computational load and the amount of encrypted data. Moreover, the encryption test objects are static video files rather than real-time video streaming media. The experiment is conducted by simulation on PC rather than by real test on the embedded hardware platform under the actual network environment. Therefore, they do not provide strong proof of feasibility, effectiveness, and superiority for the BOE method. To summarize, the comparison of the features of BOE, CIE, and FE methods are given in Table 1.
To address the above issues, for H.264/AVC video, an improved BOE is proposed and verified in an actual network environment upon the ARM-embedded hardware platform. The main contributions and novelties of this work can be summarized as follows:
(1) A 4-D SCSCA-CAC is proposed, which can effectively resist the cryptanalysis method combining a chosen-ciphertext attack with a divide-and-conquer attack. In addition, the chaotic bit sequences generated by 4-D SCSCA-CAC for encrypting video information have passed the NIST and TESTU01 test.
(2) An improved BOE method based on chaotic stream ciphers is proposed, which separates apart the hardware codec and 4-D SCSCA-CAC to form an independent architecture. The proposed scheme can achieve the format compatibility of encrypted videos and balance the technical contradiction between security and real-time performance.
(3) An ARM-based hardware system for real-time video confidential communication is designed and implemented, whose experimental results give a practical and objective evaluation for the critical issues about security, real-time, and format compatibility, verifying feasibility and effectiveness for the BOE method.
The rest of the paper is organized as follows: Section 2 introduces the design of the improved chaotic stream cipher and its security analysis. Section 3 describes the design and ARM-based implementation of the bitstream-oriented chaotic encryption scheme. Section 4 presents the experimental results and test analysis. Section 5 concludes the paper.
2. Design and Security Analysis of Chaotic Stream Cipher Algorithm
2.1. Security Loopholes Analysis of n-D SCSCA
In order to solve the above security problem of n-D SCSCA (n = 3, 7, 8) [19,20,21], one first analyzes their security loopholes, and designs 4-D SCSCA-CAC with great security.
According to the structure characteristics of n-D SCSCA (n = 3, 7, 8), and combining with the cryptanalysis process of chosen-ciphertext attack and divide-and-conquer attack, the security loopholes of n-D SCSCA (n = 3, 7, 8) are analyzed in this subsection.
The algorithm structure of n-D SCSCA (n = 3, 7, 8) and corresponding cryptanalysis methods are shown in Table 2.
From Table 2, the general form of n-D SCSCA (n = 3,7,8) can be summarized as:
where , represents the ciphertext, represents a nominal system adopting ciphertext feedback, represents the uniformly bounded controller. represents the secret keys, and represents chaotic variables.
The general form of decryption expression can be summarized as follows:
where , , , , represents round-down operation, ⊕ represents the bitwise XOR operation, represents the plaintext, represents the chaotic pseudo-random sequence.
Note that in Table 2, to achieve self-synchronization, the ciphertext is used as a feedback control variable of the anti-controller. Therefore, under the condition of the chosen-ciphertext attack, the cryptanalyst can select the specific ciphertext and feed it back into the anti-controllers, to affect the calculation result of the anti-controllers. Moreover, the anti-controller types of n-D SCSCA (n = 3,7,8) are mod and sine function. When the ciphertext is set as , the calculation result of the anti-controllers will be zero. This situation will cause the original nonlinear iterative equation to degenerate into a linear iterative equation. According to Equation (1), setting the ciphertext as , a linear iterative equation is derived as:
Compared Equation (3) with Equation (1), the calculation complexity of Equation (3) is greatly reduced and the anti-controller secret keys are eliminated, which provides an important precondition for using the divide-and-conquer attack to decipher the secret keys in n-D SCSCA (n = 3, 7, 8).
In SCSCA, initial conditions of arbitrary chaotic variables at the decryption end can achieve asymptotic synchronization with the decryption end, hence the cryptanalyst can arbitrarily select the initial conditions conducive to cryptanalysis. In the case of chosen-ciphertext attack, Equation (2) can be simplified as:
where , , represents the relational expression between and c.
Next, according to the different computational complexity of the chaotic pseudo-random sequence in n-D SCSCA (n = 3,7,8), the secret keys can be cracked through the divide-and-conquer attack methods with different strengths, respectively. When is generated by intercepting the lower eight-bits of a single chaotic variable, the encryption algorithm can be cracked by DCA-TSNCIC [22]. With DCA-TSNCIC, the set of n selection methods of initial conditions is as follow:
where represents non-zero constants.
When is generated by intercepting the lower eight-bits of the multiplication result of multiple chaotic variables, the encryption algorithm can be deciphered by DCA-TMNCIC [35] which has a higher attack intensity than DCA-TSNCIC [22]. With DCA-TMNCIC, the set of selection methods of initial conditions is as follow:
Remarkably, in n-D SCSCA (n = 3,7,8), due to is generated by intercepting the lower eight-bits of a single chaotic variable or the multiplication result of multiple chaotic variables, when values of initial conditions are set as a same non-zero constant , a constant common factor multiplied with secret key expressions can be extracted from the decryption expression. Therefore, Equation (4) can be further simplified as:
where represents the secret key expression.
The principle of the divide-and-conquer attack is to decipher the information of secret key or secret key expression block by block. In Equation (7), is represented by the 64-bit binary numbers, which is denoted by . The first bit in represents the sign bit, and the remaining 63-bits represents the data. According to the divide-and-conquer attack, are divided into 8 sub-blocks, respectively. Each sub-block is of 8-bits, denoted by . Finally, the cryptanalyst can sequentially set as to obtain the information of each sub-block , a complete secret key expression information can be derived as:
where represents the secret key expression.
From the above method, a sufficient number of nonlinear equations about secret keys can be obtained, the correct information of the original secret keys can be deciphered by solving the nonlinear equations.
According to the above analysis, the main problems of n-D SCSCA (n = 3,7,8) can be summarized as follows:
(1) To achieve self-synchronization, the ciphertext need to be fed back into the anti-controllers of the chaotic system, and the anti-controller types of n-D SCSCA (n = 3,7,8) are sine or mod function. In this case, when the cryptanalyst set ciphertext information as by the chosen-ciphertext attack, the chaotic system will be degenerated into a linear system, and the controller secret keys are eliminated.
(2) In actual channel communications, initial conditions of arbitrary chaotic variables at the receiver can achieve asymptotic synchronization with the sender. Therefore, the initial conditions of the chaotic variables belong to the weak secret keys, and the cryptanalyst can arbitrarily select the initial conditions conducive to cryptanalysis. Besides, n-D SCSCA (n = 3,7,8) all use the lower eight-bits of a single chaotic variable or the multiplication result of multiple chaotic variables as the chaotic pseudo-random sequence. With the chosen-ciphertext attack, when all initial conditions are set as a same non-zero constant, a constant common factor can be extracted from the decryption expression. Consequently, by setting the appropriate value of the constant, the cryptanalyst can use the divide-and-conquer attack to obtain the complete information of the secret key expression. After acquiring a sufficient number of nonlinear equations about secret keys, the original secret keys can be successfully deciphered through solving the nonlinear equations.
2.2. Design of 4-D Chaotic Cipher Algorithm
To deal with the loopholes of SCSCA analyzed in Section 2.1, in this paper, one proposes an improved scheme named 4-D SCSCA-CAC, which can effectively against the combination of the chosen-ciphertext attack and the divide-and-conquer attack.
A.Design An Asymptotically Stable Nominal System
An uncontrolled 4-D discrete-time linear nominal system is expressed as:
where
According to the design principle of discrete-time chaotic system [38], all eigenvalues of matrix A must be located inside the unit circle on the complex plane to make the nominal system asymptotically stable.
First, the MATLAB rand() function is used to generate a 4-D full rank matrix with uncorrelated random values in the range of (−1, 1). Next, a orthonormal matrix Q is obtained by orthonormalizing the 4-D matrix using the orth() function. Finally, since all eigenvalues of orthonormal matrix are located on the unit circle on the complex plane, when matrix Q is multiplied by a coefficient less than 1, a matrix A with all eigenvalues located inside the unit circle on the complex plane can be obtained, given by:
From Equation (11), one gets four characteristic roots of the matrix A in the nominal system (9), that are , , , . Thus, the nominal system (9) is asymptotically stable.
B.The 4-D Controlled System Based Anti-control Principle
According to the principle of anti-control of dynamical systems [38], selecting as feedback control variable, three uniformly bounded feedback controllers are designed as:
where , , , . Then, by applying the three feedback controllers to the second and third equations of the nominal system (9), the 4-D controlled system is obtained as:
The corresponding Lyapunov exponents of the system (13) obtained by simulation calculation are , , , . According to Theorem 1 [38], the controlled system (13) is chaotic, and the corresponding chaos attractor phase diagram is shown in Figure 1:
C.4-D SCSCA-CAC
Note that, since application environment of the chaotic system is ARM-embedded platform in this paper, the following calculation operations are based on binary representation. The chaotic pseudo-random sequence used for encryption operation is expressed as:
where represents round-down operation, is used for intercepting the lower eight-bits on to generate eight-bits chaotic pseudo-random sequence .
Then, the ciphertext can be expressed as:
where represents the plaintext information, ⊕ represents the bitwise XOR operation.
To realize self-synchronization, the ciphertext needs to be fed back and substituted for the chaotic system to participate in the iterative calculation [19,20,21], then 4-D SCSCA-CAC is designed as:
The main features of 4-D SCSCA-CAC are summarized as follows:
(1) Unlike the anti-controllers shown in Table 2, a cosine function is used as the anti-controller. With , the controller parameters remain in the equation without being eliminated, which can increase the difficulty of the key parameters deciphering, especially increasing the ability to resist the divide-and-conquer attack. Note that in Equation (16), consequently within the value range of . Although Equation (16) degrades into a linear iterative equation with , can still retain in the linear iterative equation and provide a powerful condition to resist the divide-and-conquer attack.
(2) Note that an additive term is introduced in the modulo operation and the round-down operation in Equation (14); resulting contains addition independent terms that do not multiply by the initial conditions, under the divide-and-conquer attack.
2.3. Security Analysis
From the chosen-ciphertext attack method, it can be known that when the security analysis of 4-D SCSCA-CAC is performed, the cryptanalyst can arbitrarily select the ciphertext that is beneficial to the decryption algorithm and obtain the corresponding plaintext. When the ciphertext is set as , the mathematical expression of the linear iterative equation can be derived as:
where . By substituting into Equation (15), which yields:
From Equation (17), one can see that although the chaotic system is degenerated into a linear iterative equation with , anti-controller secret keys still retain in the linear iterative equation and will provide a powerful condition to resist divide-and-conquer attack.
In the decryption process, decryption end can achieve asymptotic synchronization with the encryption end under any given initial conditions, so the cryptanalyst can choose any initial conditions that are conducive to deciphering the encryption algorithm. In summary, when the ciphertext is set in the 4-D SCSCA-CAC, the initial condition value can be arbitrarily selected to try to obtain the secret keys information by the divide-and-conquer attack. Next, DCA-TMNCIC with higher attack strength than DCA-TSNCIC is used to analyze the security of 4-D SCSCA-CAC.
Firstly, by substituting into Equation (17), the first iteration result is given by:
Then, by substituting into Equation (18), the second decryption operation result is given by:
With DCA-TMNCIC for 4-D SCSCA-CAC, the set of fifteen selection methods of initial conditions is as follow:
Note that, in the case of choosing the ciphertext, the ciphertexts and corresponding plaintexts are both known. Therefore, by substituting the fifteen initial conditions in Equation (21) into equation Equation (19), one can obtain from Equation (20) as follows:
Then, by setting the initial conditions as a same non-zero constant into Equation (22), one gets:
From Equation (23), the second decryption results both contain an independent additive term that does not multiply with the initial condition under fifteen different initial conditions. When the initial conditions are set as a same non-zero constant , the constant common factor multiplied by the secret key expression cannot be extracted from the decryption expression. Therefore, it is impossible to obtain the correct sub-block information of the secret key expression by selecting suitable values of initial conditions . Similarly, as the number of iterations k increases, also contain the above independent addition term. Therefore, the method that combines the chosen-ciphertext attack and the divide-and-conquer attack proposed in [22,35] fails in this case.
In summary, the improved 4-D SCSCA-CAC proposed in this paper is safe against the combinational effect of the chosen-ciphertext attack and the divide-and-conquer attack.
3. Implementation of a Bitstream-Oriented Encrypted Video Communication System
Transmission frame rate is an important indicator to represent the real-time performance of video communication systems, and 25 f/s is a basic requirement in actual application scenarios. Thus, promoting real-time performance is a primary goal in system design. In this paper, an optimized design is proposed that can be conducted from three aspects: (1) improve the BOE method for further reducing the computational load; (2) utilize the hardware codec accelerator on the chip to speed the system; and (3) adopt the multi-core and multi-threading technology to improve system efficiency in parallel work.
3.1. Overall Design Scheme
The overall design scheme of the real-time video communication system based on the ARM platform and the BOE method is shown in Figure 2. On the sender, firstly, YUV raw videos are captured from the camera continuously and then encoded as the H.264 bitstream by hardware codec. Secondly, the H.264 bitstream is encrypted through the BOE method. Thirdly, the encrypted bitstream is sent to the receiver through Ethernet. On the receiver, the encrypted bitstream is received from the sender through Ethernet and then decrypted into the original H.264 bitstream through the bitstream-oriented decryption (BOD) method. Fourthly, the original bitstream is decoded into the original YUV videos by hardware codec. Finally, the original videos are displayed on the screen. When K is switched to channel 1, the encrypted bitstream can be decrypted correctly. When K is switched to channel 2, the encrypted bitstream is bypassed without decryption. Most significantly, the encrypted bitstream can be successfully decoded and displayed, which suggests that the encrypted bitstream keeps the H.264 format compatibility and can be transcoded by servers when it is transmitted through the Internet.
The BOE and BOD are specific implementations for selective encryption and decryption, respectively. There are three main parts in the BOE and BOD modules in this paper, including H.264 entropy decoding, chaos encryption-decryption, and H.264 entropy encoding. In the chaos encryption-decryption part, the proposed 4-D SCSCA-CAC is used to encrypt and decrypt the H.264 bitstream. According to Equation (16), the 4-D SCSCA-CAC expression for the BOE and BOD module are obtained as Equations (24) and (25), respectively, and a block diagram of 4-D SCSCA-CAC encryption-decryption in BOE and BOD modules is shown in Figure 2.
where represents the encryption chaotic variables, and denote the secret keys at encryption end. represents the decryption chaotic variables, and denote the secret keys at decryption end. Since 4-D SCSCA-CAC is a symmetric cipher, the encryption and decryption end secret keys need to be matched as and to decrypt correctly.
On the sender, as shown in Figure 3, represents round-down operation, ⊕ represents the bitwise XOR operation, is used for intercepting the lower eight-bits on to generate eight-bits encryption pseudo-random sequence . Then, the binary information of the original syntax element is encrypted as the encrypted H.264 syntax element by bitwise XOR with , hence the encryption operation is given by Equation (26). Finally, is fed back and substituted for in the second to third equations of the chaotic system.
On the receiver, the received is also substituted for in the second to third equations of the chaotic system, is used for intercepting the lower eight-bits on to generate eight-bits decryption pseudo-random sequence . Similarly, the encrypted H.264 syntax element is decrypted as the original H.264 syntax element by bitwise XOR with . Therefore, the encryption operation is given by:
In Figure 2, the hardware codecs can be applied in the independent architecture separating apart the encryption algorithm and the video codec. The acceleration function of the hardware codec copes with the speed bottleneck caused by the software codec.
Multi-core multi-threading technology is another essential factor for improving real-time performance. The whole system can be divided into multiple threads. Each thread is executed by their according CPU in a parallel and pipeline manner. Better than the single thread operation, multi-core multi-threading technology is capable of solving the blocking and delay problems effectively and is beneficial to the execution efficiency.
3.2. Specific Design of Bitstream-Oriented Encryption Scheme for H.264/AVC
3.2.1. Presentation of H.264/AVC Standard
Established by the Moving Picture Experts Group (MPEG) consortium and the Video Coding Expert Group (VCEG), H.264/AVC is one of the most popular standards for video encoding. With the characteristics of low bit rate and high compression rate, H.264/AVC is widely used in video applications. H.264/AVC-based standard specifies three profiles, including baseline profile, main profile, and extended profile, in which each profile supports a specific type of application. The baseline profile is mainly used for high real-time video wireless communication application scenarios, while the main profile and extended profile are used for applications with relatively low real-time requirements such as video broadcasting or video storage. Therefore, to satisfy the real-time performance of the video confidential communication system, one considers the baseline profile in this paper. In this profile, only inter prediction and intra prediction are supported, and the H.264 bitstream is encoded by the CALVC and Exponential-Golomb coding methods.
3.2.2. Encryption Analysis of Syntax Elements in H.264 Bitstream
The H.264 bitstream is highly compressed bit sequences, and each bit data is closely related to the video encoding and decoding process. If arbitrary bit data is encrypted, the format compatibility of the encoded video may be destroyed. To achieve a format compatible and secure encryption scheme, firstly, one needs to understand the hierarchical structure of the H.264 bitstream and perform the encryption analysis for the syntax elements in H.264 bitstream. Finally, the syntax elements that can keep the video format compatibility after encryption will be selected as the encryption objects.
The hierarchical structure principle of the H.264 bitstream is shown in Figure 4. The H.264 bitstream is composed of multiple groups of pictures (GOP), and each GOP is composed of a series of frame pictures. In the baseline profile standard, the frame types in GOP only contain the I-frame and P-frame. An I-frame and P-frame are composed of one or more I-slices and P-slices, respectively. Each slice can be further divided into several macroblocks and one macroblock is composed of 16 × 16 pixel matrixes. Among them, an I-slice only contains I-macroblocks, while a P-slice contains both I-macroblocks and P-macroblocks. The I-macroblocks, intra prediction macroblocks, are encoded according to the decoded pixels in the current slice as the reference. The P-macroblocks, inter prediction macroblocks, are encoded according to the previous encoded picture as the reference.
In the H.264 bitstream, the syntax element is the basic unit of data, and each syntax element consisting of several bits represents a specific physical meaning. Different syntax elements are carried on the different types of the macroblock. For I-macroblock, there are Macroblock Type (Mb_type), Macroblock Prediction mode (Mb_pred), Coded Block Pattern (CBP), Quantization Parameter (QP), and Residual syntax elements. For P-macroblock, there are Mb_type, MVD, CBP, QP, and Residual syntax elements. The syntax element ‘Residual’, and other syntax elements, can be extracted by CAVLC entropy decoding and the Exponential-Golomb decoding method from the macroblock, respectively. Next, the above syntax elements will be analyzed one by one to determine whether they can be used for encryption.
• Mb_type specifies the type of the current macroblock. If the Mb_type is encrypted, the encrypted macroblock cannot be recognized by the codec, so the Mb_type syntax element cannot be encrypted.
• Mb_pred represents the prediction mode used to reconstruct the current block. Because the prediction modes applicable to macroblocks in different locations are different, if the encrypted value of Mb_pred is not within the applicable prediction mode for the current macroblock, it will also lead to decoding failure, so the Mb_pred syntax element cannot be encrypted.
• CBP refers to the coding scheme of the residual data of the current macroblock, each bit of which represents the number of the luma component or chroma component in the current macroblock. It is related to whether there is luma or chroma component data in the bitstream. Therefore, the CBP syntax element cannot be encrypted.
• QP is used to scale the prediction residual transform coefficients. Since the value of QP is limited in size, encrypting QP will cause greater data expansion. Therefore, the QP syntax element is not regarded as the encryption object in this paper.
• Residual carries the main data of the macroblock, which includes the DC component and the Alternating Current (AC) component. Among them, the DC component has most of the information of the video image. If the DC component is encrypted, the image information can be encrypted to the maximum extent. Thus, DC component in Residual syntax element is the main encryption object.
• MVD only exists in the P-macroblock, and it represents the motion direction of each sub-block in the current macroblock. Encrypting MVD will affect the reconstruction effect of the inter prediction image, so it can be encrypted.
3.2.3. Design of BOE Module
The BOE module is made up of entropy decoding, chaotic encryption, and entropy encoding. The design flow of the module is as follows:
Step1: Parse the syntax elements from original H.264 bitstream
The macroblock as a basic processing unit in a frame of the H.264 video is parsed into the syntax elements. For I-macroblock, the ‘Residual’ syntax element is parsed through CAVLC entropy decoding for extracting the DC components as the encryption objects, where represents the DC component in a I-macroblock. The number of DC components q in a I-macroblock is determined by Coded Block Pattern Chroma (CBPC) and Coded Block Pattern Luma (CBPL). The values of CBPC and CBPL and the corresponding value of q have the following four situations: ① When and , . ② When and , . ③ When and , . ④ When and , .
For P-macroblock, DC components and MVD coefficients as the encryption objects are extracted via CALVC and Exponential-Golomb entropy decoding operations, respectively. represents the DC component in a P-macroblock. The same as the I-macroblock, the number of DC components in a P-macroblock is also determined by CBPC and CBPL. represents the MVD coefficient in a P-macroblock, which can be further divided into horizontal component and vertical component . The quantity of the MVD coefficients represented as z is determined by the division mode of the P-macroblock. When the division mode is ① , . ② When or , . ③ When , . ③ When or , . ④ When , . Notably, the division mode is decided by the Mb_type syntax element.
Step2: Encrypt the syntax elements
The syntax elements are encrypted by 4-D SCSCA-CAC. When the current frame is an I-frame, the DC component in the I-macroblock is the only encrypted object. According to Equation (26), the encryption expression is as follows:
where represents the encryption sequence which is expressed as , represents the DC component in the I-macroblock in a I-frame, and represents the encrypted DC component corresponding to . Equation (28) requires iterations to fulfill encryption operation for one I-frame, where represents the quantity of the DC components in the current I-macroblock.
When the current frame is a P-frame, there are two types of macroblocks to be considered. In the I-macroblock, only the DC components are encrypted. In the P-macroblock, both the DC components and MVD coefficients are encrypted. Assuming that the amount of the macroblocks in a P-frame is n, and the quantity of the P-macroblocks is in the current frame, then the number of the I-macroblocks is . The encryption expression is as follows:
where represents the DC component in the I-macroblock, and represents the DC component in the P-macroblock in a P-frame. and denote the horizontal component and vertical component of the MVD coefficient in the P-macroblock, and the corresponding ciphertexts are represented as and , respectively. Equation (29) requires iterations to complete encryption operation for one P-frame, where represents the quantity of the MVD coefficients in the current P-macroblock, and represents the quantity of the DC components in the current macroblock.
Step3: Re-encode the encrypted syntax elements as the encrypted H.264 bitstream
After encrypting, , , and are re-encoded via CAVLC entropy encoding operation. Meanwhile, and are re-encoded through the Exponential-Golomb encoding operation. Finally, the encrypted bitstream is substituted for the original H.264 bitstream. Remarkably, excepting for the syntax elements of the DC components and MVD coefficients, the remaining syntax elements remain unchanged during the above encryption process.
From the above description, one knows that encryption iteration k in the BOE method is much less than the FE method. Hence, the BOE method with advantages of lower calculation load and higher processing speed obviously enhances the real-time performance of the system. The execution flow of the BOE module is shown in Algorithm 1.
Algorithm 1: BOE operating procedures
3.2.4. Design of BOD Module
The BOD module is made up of entropy decoding, chaotic decryption, and entropy encoding. The design flow of the module is as follows:
Step1: Parse the syntax elements from encrypted H.264 bitstream
Parse the encrypted syntax elements from macroblock in a frame of the encrypted H.264 video. For I-macroblocks, are extracted from the ‘Residual’ syntax element. For P-microblock, in addition to obtaining , it still has to extract .
Step2: Decrypt the encrypted syntax elements
The encrypted syntax elements are also decrypted by 4-D SCSCA-CAC. When the current frame is an I-frame, the decryption expression according to Equation (27) is as follows:
where represents the decryption sequence which is expressed as . Equation (30) requires iterations to complete the decryption operation for one I-frame.
When the current frame is a P-frame, there are two types of macroblocks to be considered. In the I-macroblock, only the encrypted DC components need to be decrypted. In the P-macroblock, both the encrypted DC components and MVD coefficients need to be decrypted. The decryption expression is as follows:
Step3: Re-encode the syntax elements as the original H.264 bitstream
After decryption, , , and are re-encoded via CALVC entropy encoding operation. Meanwhile, and are re-encoded through the Exponential-Golomb decoding operation. Last, the decrypted bitstream is substituted for the encrypted bitstream.
The execution flow of the BOD module is shown in Algorithm 2. Note that both the CAVLC entropy and the Exponential-Golomb coding operation in Algorithm 1 and Algorithm 2 are transplanted from JM86 and X264 software codec models.
Algorithm 2: BOD operating procedures
3.3. Multi-Core Multi-Threading Process
Multi-core multi-threading technology is an effective way to optimize system architecture and improve the efficiency of multitasking. The processing time for one frame on the sender includes video capturing , video encoding , encryption , video conversing , and sending . The hardware platform that is used in our implementation has four ARM Cortex A9 cores. In the case of single thread technology, the total operation time is much longer than 40 ms. Obviously, the system cannot achieve the real-time metrics (25 f/s). In contrast, multi-core multi-threading technology splits the operation tasks into six threads. Under the reasonable assignment of the tasks, operation time for each thread can be less than 40 ms. Therefore, the total operation time for one frame can fulfill , reaching the basic frame rate indicator. The multi-core multi-threading design principle is shown in Figure 5. Figure 5a,b represents the multi-core multi-threading design schemes for the sender and receiver in Figure 2.
In Figure 5, different threads are assigned to the appropriate CPU for execution according to the computational complexity of each thread. Taking the sender as an example, Thread_i (i = 1,4,6) with low computational complexity are both performed by CPU1, while Thread_i (i = 2,3,5) with high computational complexity are executed by CPU2, CPU3, and CPU4, respectively. Moreover, threads exchange data through shared memories. Thread_i (i = 1,2,3) share Buffer_1, Thread_i (i = 2,3,4) share Buffer_2, Thread_i (i = 1,5) share Buffer_3, and Thread_i (i = 5,6) share Buffer_4. The buffer capacity is configured according to one frame size in YUV, RGB, or H.264 format.
Read–write conflict prevention is the most crucial working mechanism for shared buffers. It prohibits more than one thread to perform a reading or writing operation in the same buffer simultaneously. Otherwise, unpredictable errors will happen. The mutex lock mechanism can achieve the read–write conflict protection, whose working principle is illustrated by switches in Figure 4. Taking Buffer_1 in Figure 4a as an example, once is closed, and are kept open. It means that when Thread_1 is executing a data storage operation in Buffer_1, Thread_2 and Thread_3 are prohibited to operate Buffer_1 and carry out data format conversion for the previous frame at the same time.
In summary, the BOE and BOD modules have the advantages of high efficiency and good real-time performance. Besides, the hardware codec solves the time-consuming problem of encoding operation, and the multi-core multi-threading technology further optimizes the system. As a result, the operation period of all threads are constrained to less than 40 ms. Experiment results prove that the frame rate of the embedded hardware system is more than 25 f/s.
4. Experimental Results and Analysis
According to the chaotic encryption and decryption algorithms given in Equations (24) and (25), as well as the design principles of Figure 2, Figure 3, Figure 4 and Figure 5, one has realized the remote real-time video confidential communication system, as shown in Figure 6. First, choose two demo boards with four ARM Cortex A9 cores as the sender and receiver. Second, attach the camera and screens for video capturing and displaying. Third, connect two boards to LAN and set the IP address in the range of 192.168.1.1 to 192.168.1.255.
4.1. Experiment Results
The real-time video confidential communication system is tested in the real network environment under the video resolution.
The experimental result of the original videos displaying at the sender is shown in Figure 7a. When keys are matched as and , the experimental result of successful decryption is shown in Figure 7b. When keys are mismatched, the experimental result of decryption failure is shown in Figure 7c. When encrypted videos are decoded and displayed without decryption, the experimental result is shown in Figure 7d. The experimental results show that the BOE method with the 4-D SCSCA-CAC can achieve effective perceptual encryption. Besides, the encrypted bitstream is available to be decoded without decryption. According to the test result, the average transmission frame rate of the system is up to 27 f/s.
The comparison of experiment results of the video confidential communication system based on ARM-embedded platform is shown in Table 3. The hardware platform for experiments in Table 3 is the ARM Cortex A9 core development board and the video resolution is 640 × 480. From the experimental results of [32,36], it can be seen that using the hardware codec and multi-core and multi-threaded technology can effectively improve the video transmission frame rate of the system. With the same multi-core and multi-threaded technology, although the FE scheme [32] can utilize the hardware codec to improve the video transmission frame rate, it cannot meet the video format compatibility. On the contrary, although the CIE scheme [36] can meet the video format compatibility, the transmission frame rate of this scheme is lower than 17 f/s caused by the software codec with a large computing load and time consumption. However, in the case of having two more operations of entropy coding and entropy decoding than the above schemes, the video transmission frame rate of the proposed BOE scheme not only reaches 27 f/s higher than that of the full encryption scheme, but also meets the format compatibility of video at the same time. Therefore, one can know that the proposed BOE scheme is superior in terms of security, real-time performance, and format compatibility.
4.2. Security Performance Tests
4.2.1. NIST Test
NIST test is a strict and standardized test suite for testing the statistical characteristics of pseudo-random sequences generated by chaotic systems, and the total length of tested sequecnces are required to be at least bits. The NIST test includes 15 different tests, and the result of each test is represented by a p-value. Sequences are said to pass a test if the calculated p-value > 0.01.
Table 4 shows the result of the passing ratio and means of p-value of each test for 4-D SCSCA-CAC. In this experiment, the 100 groups of bit sequence with length as are generated from from intercepting the low 8-bit of the chaotic variable expressed as . From Table 4, one can have that the 4-D SCSCA-CAC can pass all the tests, which implies that the sequences generated from 4-D SCSCA-CAC are with good statistical performances and can be regarded as true random.
4.2.2. TESTU01 Test
Compared with the NIST test, the TESTU01 test is a more rigorous statistical characteristic test. TESTU01 has seven test suites, including SmallCrush, Crush, BigCrush, Alphabit, Rabbit, PseudoDIEHARD, and FIPS-140-2 suite. Among them, the amount of test sequences of BigCrush suite is as high as 10TB, which makes the dynamic behavior of chaotic system easier to be exposed. Even though some chaotic systems can pass NIST test, they cannot further pass the TESTU01 test. Therefore, if the chaotic sequences generated by the chaotic system can successfully pass the TESTU01 test, it shows that the chaotic sequence has better statistical performance and randomness.
Table 5 shows the results of TESTU01 test for the 4-D SCSCA-CAC. The 10Tb test sequences are generated by intercepting the low 8-bit of the chaotic variable expressed as . The results show that the 4-D SCSCA-CAC can successfully pass all the tests in TESTU01.
4.2.3. Phase Space Reconstruction Attacks
The phase space reconstruction attack is to analyze the time series of a state variable at different times, continuously produced by the chaotic system. It reconstructs the time series of the state variable by determining the appropriate delay time and embedding dimension m, and then recovers the regular trajectories such as attractors in the embedded dimension space. The structure of some chaotic maps with complicated trajectory will become simple and evident in the reconstructed phase space. Therefore, the attacker can easily predict the behavior of the chaotic variable according to the trajectory in the reconstructed phase space. Next, the phase space reconstruction attack is used to test the state variable in 4-D SCSCA-CAC.
By using the auto-correlation method and False Nearest Neighbor (FNN) method, the delay time is calculated as 1 and the embedding dimension m is calculated as 4, and these two parameters are used to reconstruct the phase space. The estimating results of the delay time and the embedding dimension m are shown in Figure 8a,b, respectively. The reconstructed phase space is shown in Figure 9. It can be seen from Figure 9 that the reconstructed phase space is disordered and has no obvious structure, so the attacker cannot predict the behavior of the chaotic variable by reconstructing the phase space. Therefore, 4-D SCSCA-CAC can effectively resist the phase space reconstruction attack.
4.2.4. Sensitivity Test of Key Parameters Mismatch
When the chaotic system has a key parameter with a very small mismatch error, and the original video signal is not able to decrypt, the key parameters are very sensitive to the mismatch error. The smaller the number of the mismatch error, the better the security of the system.
The sensitivity test results of key parameters mismatch for 4-D SCSCA-CAC is shown in Table 6. The absolute value of the mismatch between the key parameters in encryption system and decryption system is expressed as . From the test results, one knows that any key parameter in 4-D SCSCA-CAC has high sensitivity to the tiny mismatch error. Therefore, 4-D SCSCA-CAC can effectively resist the brute force attacks.
4.2.5. PSNR and SSIM Index Tests
PSNR can be used as a performance index to evaluate the perceptual security of encrypted video. When the PSNR value is lower than 20 dB, it means that original video information cannot be discriminated from the encrypted video by human eyes. PSNR is calculated based on the Mean Square Error (MSE) between the original image and the encrypted image. The mathematical expression of MSE is as follows:
The mathematical expression of PSNR is obtained as:
Among them, H and W denote the height and width of the video, respectively. represents the pixel value of the original video image, represents the pixel value of the encrypted video, and k represents the pixel depth.
Different from PSNR that measures image quality based on pixel error, SSIM measures image similarity from three aspects: brightness, contrast, and structure. The SSIM value is in the range of . The smaller the SSIM value is, the lower the structural similarity will be, leading to higher perceptual security for the encrypted video.
In order to test the encryption effect of the video confidential communication system, one intercepted three frames of original images and their corresponding encrypted images in the actual video communication process, as shown in Figure 10. The PSNR and SSIM indicators test results are shown in Table 7.
According to Table 7, the PSNR values are much smaller than 20 dB, indicating that it is difficult to obtain the original frames’ information from the encrypted frames. The SSIM values are all less than 0.05, representing the low structural similarity between the original and encrypted images. All the above statistical analysis results come to the conclusion that the BOE scheme has good perceptual security performance.
5. Conclusions
For ensuring security, format compliance, and real-time transmission of encrypted videos, the SE method has become a research hotspot in the field of video encryption. In SE methods, with high computational efficiency, BOE is a more desirable encryption method compared with the CIE scheme. Some reports have studied and improved the BOE scheme, but these schemes lack the corresponding hardware implementation to prove the feasibility, effectiveness, and superiority of the BOE method. Moreover, some studies adopted AES block cipher as the encrypted algorithm in their BOE scheme with high computational load, increasing the time consumption in encrypting. To deal with these problems, in this paper, one proposed:
(1) An improved algorithm 4-D SCSCA-CAC.
(2) An improved BOE scheme utilizing the hardware codec to improve the real-time performance of video transmission.
(3) An ARM-based hardware implementation of the BOE scheme.
4-D SCSCA-CAC can resist the cryptanalysis combining of the chosen-ciphertext attack and the divide-and-conquer attack, and the chaotic bit sequences generated by 4-D SCSCA-CAC for encrypting video information have passed the NIST and TESTU01 test, ensuring the security of the video confidential communication system. In addition, due to the chaotic stream cipher having less computational overhead, without the consuming time for package construction to encrypt the fixed-length syntax elements, 4-D SCSCA-CAC is more appropriate for application in actual video communication than AES algorithm. Besides, one found that the hardware codec can be used for the BOE scheme in actual applications. The proposed scheme utilizes the hardware acceleration to improve the video transmission frame rate to 27 f/s. In contrast with hardware implementation based on the CIE method, the experimental results have proved that the BOE scheme is more suitable for real-time video secure communication application scenarios, and reflected the advantages of high efficiency and flexibility in the BOE scheme.
Author Contributions
Conceptualization, Z.Z. and P.C.; methodology, Z.Z. and P.C.; software, Z.Z. and S.L.; validation, Z.Z., P.C. and W.L.; investigation, Z.Z. and H.W.; writing—original draft preparation, Z.Z. and P.C.; writing—review and editing, Z.Z.; funding acquisition, S.C., Q.W. and X.X. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the Science and Technology Planning Project of Guangdong Province, China, grant number No.2019B010140002, and the National Natural Science Foundation of China, grant number 61801127.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The authors are thankful to the reviewers for their comments and suggestions to improve the quality of the manuscript.
Conflicts of Interest
The authors declare no conflict of interest.
References
Altaf, M.; Ahmad, A.; Khan, F.A.; Uddin, Z.; Yang, X. Computationally efficient selective video encryption with chaos based block cipher. Multimed. Tools Appl.2018, 77, 27981–27995. [Google Scholar] [CrossRef]
Tabash, F.K.; Izharuddin, M. Efficient encryption technique for h. 264/avc videos based on cabac and logistic map. Multimed. Tools Appl.2019, 78, 7365–7379. [Google Scholar] [CrossRef]
Stütz, T.T.; Uhl, A. Format-compliant encryption of h. 264/avc and svc. In Proceedings of the 2008 Tenth IEEE International Symposium on Multimedia, Berkeley, CA, USA, 15–17 December 2008; pp. 446–451. [Google Scholar]
Cheng, S.; Wang, L.; Ao, N.; Han, Q. A selective video encryption scheme based on coding characteristics. Symmetry2020, 12, 332. [Google Scholar] [CrossRef] [Green Version]
Arachchi, H.K.; Perramon, X.; Dogan, S.; Kondoz, A.M. Adaptation–aware encryption of scalable h. 264/avc video for content security. Signal Process. Image Commun.2009, 24, 468–483. [Google Scholar] [CrossRef] [Green Version]
Tabash, F.K.; Izharuddin, M.; Tabash, M.I. Encryption techniques for h. 264/avc videos: A literature review. J. Inf. Secur. Appl.2019, 45, 20–34. [Google Scholar] [CrossRef]
Thomas, N.; Bull, D.; Redmill, D. A novel h. 264 svc encryption scheme for secure bit-rate transcoding. In Proceedings of the 2009 Picture Coding Symposium, Chicago, IL, USA, 6–8 May 2009; pp. 1–4. [Google Scholar]
Apostolopoulos, J.G. Secure media streaming & secure adaptation for non-scalable video. In Proceedings of the 2004 International Conference on Image Processing, Singapore, 24–27 October 2004; Volume 3, pp. 1763–1766. [Google Scholar]
Boho, A.; Van Wallendael, G.; Dooms, A.; De Cock, J.; Braeckman, G.; Schelkens, P.; Preneel, B.; Van de Walle, R. End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation. IEEE Signal Process. Mag.2013, 30, 97–107. [Google Scholar] [CrossRef] [Green Version]
Sallam, A.I.; El-Rabaie, E.-S.M.; Faragallah, O.S. Cabac-based selective encryption for hevc using rc6 in different operation modes. Multimed. Tools Appl.2018, 77, 28395–28416. [Google Scholar] [CrossRef]
Chen, J.; Peng, F.; Long, M. A perceptual encryption scheme for hevc video with lossless compression. In International Journal of Digital Crime and Forensics; Springer: Cham, Switzerland, 2017; pp. 396–407. [Google Scholar]
Li, J.; Wang, C.; Chen, X.; Tang, Z.; Hui, G.; Chang, C.-C. A selective encryption scheme of cabac based on video context in high efficiency video coding. Multimed. Tools Appl.2018, 77, 12837–12851. [Google Scholar] [CrossRef]
Song, Y.; Zhu, Z.; Zhang, W.; Yu, H. Efficient protection using chaos for context-adaptive binary arithmetic coding in h. 264/advanced video coding. Multimed. Tools Appl.2019, 78, 18967–18994. [Google Scholar] [CrossRef]
Stutz, T.; Uhl, A. A survey of h. 264 avc/svc encryption. IEEE Trans. Circuits Syst. Video Technol.2011, 22, 325–339. [Google Scholar] [CrossRef]
Shah, R.A.; Asghar, M.N.; Abdullah, S.; Fleury, M.; Gohar, N. Effectiveness of crypto-transcoding for h. 264/avc and hevc video bit-streams. Multimed. Tools Appl.2019, 78, 21455–21484. [Google Scholar] [CrossRef] [Green Version]
Xu, H.; Tong, X.; Wang, Z.; Zhang, M.; Liu, Y.; Ma, J. Robust video encryption for h.264 compressed bitstream based on cross-coupled chaotic cipher. Multimed. Syst.2020, 26, 363–381. [Google Scholar] [CrossRef]
Lin, Z.; Yu, S.; Lü, J.; Cai, S.; Chen, G. Design and arm-embedded implementation of a chaotic map-based real-time secure video communication system. IEEE Trans. Circuits Syst. Video Technol.2014, 25, 1203–1216. [Google Scholar]
Chen, P.; Yu, S.; Chen, B.; Xiao, L.; Lü, J. Design and sopc-based realization of a video chaotic secure communication scheme. Int. J. Bifurc. Chaos2018, 28, 1850160. [Google Scholar] [CrossRef]
Chen, B.; Yu, S.; Chen, P.; Xiao, L.; Lü, J. Design and virtex-7-based implementation of video chaotic secure communications. Int. J. Bifurc. Chaos2020, 30, 2050075. [Google Scholar] [CrossRef]
Lin, Z.; Yu, S.; Feng, X.; Lü, J. Cryptanalysis of a chaotic stream cipher and its improved scheme. Int. J. Bifurc. Chaos2018, 28, 1850086. [Google Scholar] [CrossRef]
Ma, T.; Ma, M.; Lee, Y.H.; Hu, F. Bitstream-oriented protection for the h. 264/scalable video coding (svc). Wirel. Pers. Commun.2017, 97, 5115–5135. [Google Scholar] [CrossRef]
Khan, J.S.; Ahmad, J. Chaos based efficient selective image encryption. Multidimens. Syst. Signal Process.2019, 30, 943–961. [Google Scholar] [CrossRef]
Mian, C.; Jia, J.; Lei, Y. An h. 264 video encryption algorithm based on entropy coding. In Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Adelaide, Australia, 23–25 September 2007; Volume 2, pp. 41–44. [Google Scholar]
Bergeron, C.; Lamy-Bergot, C. Complaint selective encryption for h. 264/avc video streams. In Proceedings of the 2005 IEEE 7th Workshop on Multimedia Signal Processing, Shanghai, China, 30 October– 2 November 2005; pp. 1–4. [Google Scholar]
Huang, M.; Yang, C.; Zhang, Y. Selective encryption of h. 264/avc based on block weight model. In Proceedings of the 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 8–11 October 2018; pp. 1368–1373. [Google Scholar]
Hellwagner, H.; Kuschnig, R.; Stütz, T.; Uhl, A. Efficient in-network adaptation of encrypted h. 264/svc content. Signal Process. Image Commun.2009, 24, 740–758. [Google Scholar] [CrossRef] [Green Version]
Magli, E.; Grangetto, M.; Olmo, G. Transparent encryption techniques for h. 264/avc and h. 264/svc compressed video. Signal Process.2011, 91, 1103–1114. [Google Scholar] [CrossRef]
Lui, O.-Y.; Wong, K.-W. Chaos-based selective encryption for h. 264/avc. J. Syst. Softw.2013, 86, 3183–3192. [Google Scholar] [CrossRef]
Li, C.; Zhou, X.; Zhong, Y. Nal level encryption for scalable video coding. In Pacific-Rim Conference on Multimedia; Springer: Berlin/Heidelberg, Germany, 2008; pp. 496–505. [Google Scholar]
Chen, P.; Yu, S.; Zhang, X.; He, J.; Lin, Z.; Li, C.; Lü, J. Arm-embedded implementation of a video chaotic secure communication via wan remote transmission with desirable security and frame rate. Nonlinear Dyn.2016, 86, 725–740. [Google Scholar] [CrossRef]
Zhang, X.; Seo, S.-H.; Wang, C. A lightweight encryption method for privacy protection in surveillance videos. IEEE Access2018, 6, 18074–18087. [Google Scholar] [CrossRef]
Shi, C.; Bhargava, B. An efficient mpeg video encryption algorithm. In Proceedings of the Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No. 98CB36281), West Lafayette, IN, USA, 20–23 October 1998; pp. 381–386. [Google Scholar]
Chen, B.; Yu, S.; Zhang, Z.; Li, D.D.-U.; Lü, J. Design and smartphone implementation of chaotic duplex h. 264-codec video communications. Int. J. Bifurc. Chaos2021, 31, 2150045. [Google Scholar] [CrossRef]
Zhang, X.; Yu, S.; Chen, P.; Lü, J.; He, J.; Lin, Z. Design and arm-embedded implementation of a chaotic secure communication scheme based on h. 264 selective encryption. Nonlinear Dyn.2017, 89, 1949–1965. [Google Scholar] [CrossRef]
Boyadjis, B.; Perrin, M.-E.; Bergeron, C.; Lecomte, S. A real-time ciphering transcoder for h. 264 and hevc streams. In Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP), Paris, France, 27–30 October 2014; pp. 3432–3434. [Google Scholar]
Chen, S.; Yu, S.; Lu, J.; Chen, G.; He, J. Design and fpga-based realization of a chaotic secure video communication system. IEEE Trans. Circuits Syst. Video Technol.2017, 28, 2359–2371. [Google Scholar] [CrossRef]
Figure 7.
Experimental results of ARM-based embedded remote video confidential communication system: (a) original video image, (b) decrypted video when key matching, (c) decrypted video when key mismatching, (d) decoded video without decryption.
Figure 7.
Experimental results of ARM-based embedded remote video confidential communication system: (a) original video image, (b) decrypted video when key matching, (c) decrypted video when key mismatching, (d) decoded video without decryption.
Figure 8.
Estimating the delay time and the embedding dimension: (a) auto-correlation method for estimating , (b) FNN method for estimating m.
Figure 8.
Estimating the delay time and the embedding dimension: (a) auto-correlation method for estimating , (b) FNN method for estimating m.
Figure 9.
Phase space reconstruction for 4-D SCSCA-CAC: (a) , (b) , (c) , (d) , (e) , (f) .
Figure 9.
Phase space reconstruction for 4-D SCSCA-CAC: (a) , (b) , (c) , (d) , (e) , (f) .
Figure 10.
The original image and its corresponding encrypted image: (a) P1, (b) E1, (c) P2, (d) E2, (e) P3, (f) E3.
Figure 10.
The original image and its corresponding encrypted image: (a) P1, (b) E1, (c) P2, (d) E2, (e) P3, (f) E3.
Table 1.
Comparisons of the features of BOE, CIE, and FE methods.
Table 1.
Comparisons of the features of BOE, CIE, and FE methods.
Encryption
Scheme
Encryption
Stage
Input
Data
Codec
Form
Hardware
Codec
Format
Compatibility
BOE
After
encoding
H.264
bitstream
Standardization
Available
Yes
CIE
During
encoding
YUV
raw video
Customization
Unavailable
Yes
FE
After
encoding
H.264
bitstream
Standardization
Available
No
Table 2.
The algorithm structure of n-D SCSCA (n = 3, 7, 8) and corresponding cryptanalysis methods.
Table 2.
The algorithm structure of n-D SCSCA (n = 3, 7, 8) and corresponding cryptanalysis methods.
Combination of chosen-
ciphertext attack
and DCA-TSNCIC [22]
Except the secret keys multiplied
with the ciphertext and anti-
controller secret keys, the rest of
the secret keys in the encryption
algorithms are deciphered.
Zhang, Z.; Chen, P.; Li, W.; Xiong, X.; Wang, Q.; Wen, H.; Liu, S.; Cai, S.
Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy2021, 23, 1431.
https://doi.org/10.3390/e23111431
AMA Style
Zhang Z, Chen P, Li W, Xiong X, Wang Q, Wen H, Liu S, Cai S.
Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy. 2021; 23(11):1431.
https://doi.org/10.3390/e23111431
Chicago/Turabian Style
Zhang, Zirui, Ping Chen, Weijun Li, Xiaoming Xiong, Qianxue Wang, Heping Wen, Songbin Liu, and Shuting Cai.
2021. "Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video" Entropy 23, no. 11: 1431.
https://doi.org/10.3390/e23111431
APA Style
Zhang, Z., Chen, P., Li, W., Xiong, X., Wang, Q., Wen, H., Liu, S., & Cai, S.
(2021). Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy, 23(11), 1431.
https://doi.org/10.3390/e23111431
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.
Article Metrics
No
No
Article Access Statistics
For more information on the journal statistics, click here.
Multiple requests from the same IP address are counted as one view.
Zhang, Z.; Chen, P.; Li, W.; Xiong, X.; Wang, Q.; Wen, H.; Liu, S.; Cai, S.
Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy2021, 23, 1431.
https://doi.org/10.3390/e23111431
AMA Style
Zhang Z, Chen P, Li W, Xiong X, Wang Q, Wen H, Liu S, Cai S.
Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy. 2021; 23(11):1431.
https://doi.org/10.3390/e23111431
Chicago/Turabian Style
Zhang, Zirui, Ping Chen, Weijun Li, Xiaoming Xiong, Qianxue Wang, Heping Wen, Songbin Liu, and Shuting Cai.
2021. "Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video" Entropy 23, no. 11: 1431.
https://doi.org/10.3390/e23111431
APA Style
Zhang, Z., Chen, P., Li, W., Xiong, X., Wang, Q., Wen, H., Liu, S., & Cai, S.
(2021). Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy, 23(11), 1431.
https://doi.org/10.3390/e23111431
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.