This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Su-Wan PARK, Sang Uk SHIN, "An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding" in IEICE TRANSACTIONS on Information,
vol. E92-D, no. 5, pp. 851-858, May 2009, doi: 10.1587/transinf.E92.D.851.
Abstract: This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E92.D.851/_p
Copy
@ARTICLE{e92-d_5_851,
author={Su-Wan PARK, Sang Uk SHIN, },
journal={IEICE TRANSACTIONS on Information},
title={An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding},
year={2009},
volume={E92-D},
number={5},
pages={851-858},
abstract={This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.},
keywords={},
doi={10.1587/transinf.E92.D.851},
ISSN={1745-1361},
month={May},}
Copy
TY - JOUR
TI - An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding
T2 - IEICE TRANSACTIONS on Information
SP - 851
EP - 858
AU - Su-Wan PARK
AU - Sang Uk SHIN
PY - 2009
DO - 10.1587/transinf.E92.D.851
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E92-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2009
AB - This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.
ER -