An Efficient Security System for CABAC Bin-Strings of H.264/SVC

The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we propose a complete security system for H.264/scalable video coding (SVC) video codec and present a solution for the bit-rate and format complia...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on circuits and systems for video technology Vol. 23; no. 3; pp. 425 - 437
Main Authors: Asghar, M. N., Ghanbari, M.
Format: Journal Article
Language:English
Published: New York, NY IEEE 01.03.2013
Institute of Electrical and Electronics Engineers
Subjects:
ISSN:1051-8215, 1558-2205
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we propose a complete security system for H.264/scalable video coding (SVC) video codec and present a solution for the bit-rate and format compliance problems by careful selection of entropy coder syntax elements (bin-strings) for selective encryption (SE), and the problem of managing multiple layer encryption keys for scalable video distribution. A standard key management protocol, multimedia Internet keying protocol, is implemented for the hierarchical key generation mechanism, in which a subscriber has only one encryption key to unlock all scalable layers that have been subscribed to. The evaluation demonstrates the resulting video quality degradation arising from SE for many CIF and 4 CIF test video sequences, without there being any impact upon the bit-rate or format compliancy, and with small computational delay. The security and statistical analysis performed further verify the effectiveness of the proposed security system for H.264/SVC. The proposed system is highly suitable for video distribution to users who have subscribed to a varying degree of video quality on devices with medium to high computational resources.
AbstractList The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we propose a complete security system for H.264/scalable video coding (SVC) video codec and present a solution for the bit-rate and format compliance problems by careful selection of entropy coder syntax elements (bin-strings) for selective encryption (SE), and the problem of managing multiple layer encryption keys for scalable video distribution. A standard key management protocol, multimedia Internet keying protocol, is implemented for the hierarchical key generation mechanism, in which a subscriber has only one encryption key to unlock all scalable layers that have been subscribed to. The evaluation demonstrates the resulting video quality degradation arising from SE for many CIF and 4 CIF test video sequences, without there being any impact upon the bit-rate or format compliancy, and with small computational delay. The security and statistical analysis performed further verify the effectiveness of the proposed security system for H.264/SVC. The proposed system is highly suitable for video distribution to users who have subscribed to a varying degree of video quality on devices with medium to high computational resources.
Author Ghanbari, M.
Asghar, M. N.
Author_xml – sequence: 1
  givenname: M. N.
  surname: Asghar
  fullname: Asghar, M. N.
  email: masghaa@essex.ac.uk
  organization: Sch. of Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK
– sequence: 2
  givenname: M.
  surname: Ghanbari
  fullname: Ghanbari, M.
  email: ghan@essex.ac.uk
  organization: Sch. of Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27141651$$DView record in Pascal Francis
BookMark eNp9kLFOwzAURS0EEm3hB2DJwpjUz3FsZ0JpVChSJYaUrpbj2siodSo7DP17UloYGJjefdI9dzhjdOk7bxC6A5wB4HK6qpv1KiMYSEYIpiWFCzSCohDp8BaXQ8YFpIJAcY3GMX5gDFRQPkKPlU_m1jrtjO-TxujP4PpD0hxib3aJ7UJSV7OqTmbOp00fnH-PSWeTRUYYnTbr-gZdWbWN5vZ8J-jtab6qF-ny9fmlrpapJiXvUwOGaWBcmFxsCLfcUKYFyzFrFbcWmG2NIcKqFrdlSykvbAsY52CN1WTT5hP0cNrdq6jV1gbltYtyH9xOhYMkHCiwAoaeOPV06GIMxkrtetW7zvdBua0ELI_C5LcweRQmz8IGlPxBf9b_he5PkDPG_AKMgADO8y_Z4HbM
CODEN ITCTEM
CitedBy_id crossref_primary_10_1016_j_ijleo_2020_165911
crossref_primary_10_1016_j_jvcir_2017_02_017
crossref_primary_10_1109_TCSVT_2020_2976050
crossref_primary_10_1049_iet_ipr_2017_0022
crossref_primary_10_1109_TCSVT_2019_2924910
crossref_primary_10_3390_s150407953
crossref_primary_10_1109_TIFS_2013_2259819
crossref_primary_10_1016_j_ijcip_2025_100786
crossref_primary_10_1109_TCOMM_2020_3015500
crossref_primary_10_1109_ACCESS_2020_3024926
crossref_primary_10_1016_j_ijleo_2016_07_024
crossref_primary_10_3390_s19051228
crossref_primary_10_1007_s11042_019_7253_9
crossref_primary_10_3390_e24060755
crossref_primary_10_1145_3672568
crossref_primary_10_1007_s12626_016_0067_6
crossref_primary_10_1109_TCSVT_2015_2511879
crossref_primary_10_1109_TIFS_2014_2302899
crossref_primary_10_1007_s11071_017_3563_5
crossref_primary_10_1016_j_ins_2016_08_059
crossref_primary_10_1109_TCE_2022_3228679
Cites_doi 10.1007/978-3-540-77255-2_27
10.17487/rfc1321
10.1109/NCM.2008.259
10.1109/TMM.2003.808817
10.1109/TIP.2006.873426
10.1109/TCSVT.2003.815168
10.1016/j.jvcir.2011.02.005
10.1109/TIT.2004.824921
10.17487/rfc3830
10.1016/0020-0190(78)90024-8
10.7763/IJCEE.2010.V2.141
10.1587/transinf.E92.D.851
10.1109/TCE.2003.1261218
10.1109/TCSVT.2007.905532
10.1117/12.571869
10.1109/JPROC.2004.839623
10.17487/rfc2104
10.1109/TCSVT.2003.815173
10.1093/ietfec/e91-a.1.12
10.1109/MCAS.2004.1286980
10.1109/ICASSP.2001.940394
10.1109/CISP.2009.5302934
10.1109/JPROC.2004.839611
10.1145/1161366.1161402
10.1109/ICIP.2006.312886
10.1155/2007/79048
10.1109/ICIP.2001.959047
10.1049/PBTE054E
10.1016/j.sigpro.2010.10.012
10.1016/j.image.2010.03.005
10.1007/11922841_33
10.1109/TSP.2005.855418
10.1109/TCE.2002.1010141
10.1109/LSP.2005.851261
10.1155/2008/179290
ContentType Journal Article
Copyright 2014 INIST-CNRS
Copyright_xml – notice: 2014 INIST-CNRS
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
DOI 10.1109/TCSVT.2012.2204941
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EISSN 1558-2205
EndPage 437
ExternalDocumentID 27141651
10_1109_TCSVT_2012_2204941
6218177
Genre orig-research
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
RXW
TAE
TN5
VH1
AAYXX
CITATION
IQODW
RIG
ID FETCH-LOGICAL-c297t-e1e6c1678e38d27f7e46c86306ba7ff16fbee28fab0b9b4475fb10031fefc2db3
IEDL.DBID RIE
ISICitedReferencesCount 30
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000317392600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1051-8215
IngestDate Mon Jul 21 09:16:51 EDT 2025
Sat Nov 29 01:44:04 EST 2025
Tue Nov 18 21:55:22 EST 2025
Tue Aug 26 16:45:36 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Video coding
Scalability
Information rate
Entropy
Multimedia communication
Video codecs
Implementation
Video signal processing
Copyright
Degradation
Selective encryption
Subscriber
Safety
Damaging
Multimedia
Internet protocol
H.264/scalable video coding (SVC)
Coding circuit
Multiple layer
Key management
Information transmission
Binary coding
Adaptive coding
Image quality
AES-CFB algorithm
Intellectual property
security system
Arithmetic code
context adaptive binary arithmetic coding (CABAC)
multimedia Internet keying protocol (MIKEY)
Syntax
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c297t-e1e6c1678e38d27f7e46c86306ba7ff16fbee28fab0b9b4475fb10031fefc2db3
PageCount 13
ParticipantIDs crossref_citationtrail_10_1109_TCSVT_2012_2204941
pascalfrancis_primary_27141651
crossref_primary_10_1109_TCSVT_2012_2204941
ieee_primary_6218177
PublicationCentury 2000
PublicationDate 2013-03-01
PublicationDateYYYYMMDD 2013-03-01
PublicationDate_xml – month: 03
  year: 2013
  text: 2013-03-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
PublicationTitle IEEE transactions on circuits and systems for video technology
PublicationTitleAbbrev TCSVT
PublicationYear 2013
Publisher IEEE
Institute of Electrical and Electronics Engineers
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
References ref13
ref12
ref15
ref52
ref11
ref10
white (ref36) 1995
ref17
kim (ref31) 2007
ref16
ref19
esslinger (ref45) 2010
ref51
ref50
ref46
spinsante (ref14) 2005
ref48
(ref49) 1996
ref42
ref41
won (ref30) 2006; lncs 4283
ref9
ref4
ref3
ref6
ref5
sullivan (ref38) 2004
ref40
sttz (ref21) 2009
ref35
ref34
ref37
(ref43) 2001
ref33
ref32
ref2
ref1
ref39
yuan (ref24) 2003
magli (ref22) 0
li (ref26) 2008
tesch (ref47) 2006
kuchar (ref44) 2000; 30
ref23
ref25
ref20
(ref7) 2005
yuan (ref29) 2004; 27
ref28
ref27
uhl (ref8) 2005; 15
apostolopoulos (ref18) 2006
References_xml – start-page: 1338
  year: 2005
  ident: ref14
  article-title: Masking video information by partial encryption of H.264/AVC coding parameters
  publication-title: Proc 13th Eur Signal Process Conf
– ident: ref16
  doi: 10.1007/978-3-540-77255-2_27
– year: 2006
  ident: ref47
  publication-title: Security Threat Mitigation and Response Understanding Cisco Security MARS
– ident: ref34
  doi: 10.17487/rfc1321
– ident: ref33
  doi: 10.1109/NCM.2008.259
– year: 2006
  ident: ref18
  publication-title: Network-Aware Multimedia Processing and Communications
– year: 0
  ident: ref22
  article-title: Conditional access techniques for H.264/AVC and H.264/SVC compressed video
  publication-title: IEEE Trans Circuits Syst Video Technol
– ident: ref13
  doi: 10.1109/TMM.2003.808817
– year: 1996
  ident: ref49
  publication-title: One-Way Transmission Time
– ident: ref4
  doi: 10.1109/TIP.2006.873426
– ident: ref1
  doi: 10.1109/TCSVT.2003.815168
– ident: ref25
  doi: 10.1016/j.jvcir.2011.02.005
– ident: ref48
  doi: 10.1109/TIT.2004.824921
– start-page: 446
  year: 2009
  ident: ref21
  article-title: Format-compliant encryption of H.264/AVC and SVC
  publication-title: Proc 10th IEEE Int Symp Multimedia
– ident: ref42
  doi: 10.17487/rfc3830
– start-page: 1
  year: 2007
  ident: ref31
  article-title: A selective video encryption for the region of interest in scalable video coding
  publication-title: Proc IEEE Region 10 Conf
– ident: ref40
  doi: 10.1016/0020-0190(78)90024-8
– start-page: 496
  year: 2008
  ident: ref26
  article-title: NAL level encryption for scalable video coding
  publication-title: Proc PCM
– ident: ref9
  doi: 10.7763/IJCEE.2010.V2.141
– ident: ref32
  doi: 10.1587/transinf.E92.D.851
– ident: ref12
  doi: 10.1109/TCE.2003.1261218
– ident: ref3
  doi: 10.1109/TCSVT.2007.905532
– ident: ref46
  doi: 10.1117/12.571869
– ident: ref50
  doi: 10.1109/JPROC.2004.839623
– year: 2005
  ident: ref7
  publication-title: Multimedia Encryption and Watermarking
– start-page: 454
  year: 2004
  ident: ref38
  article-title: The H.264/AVC advanced video coding standard: Overview and introduction to the fidelity range extensions
  publication-title: Proc 27th SPIE Conf Applicat Digital Image Process
– ident: ref35
  doi: 10.17487/rfc2104
– ident: ref39
  doi: 10.1109/TCSVT.2003.815173
– volume: 30
  start-page: 3
  year: 2000
  ident: ref44
  article-title: Dispelling the myths of cryptography
  publication-title: Database-and-Network-Journal
– ident: ref15
  doi: 10.1093/ietfec/e91-a.1.12
– ident: ref2
  doi: 10.1109/MCAS.2004.1286980
– start-page: 79
  year: 2010
  ident: ref45
  publication-title: The CrypTool Script Cryptography Mathematics and More
– ident: ref19
  doi: 10.1109/ICASSP.2001.940394
– ident: ref27
  doi: 10.1109/CISP.2009.5302934
– year: 2001
  ident: ref43
  publication-title: Federal Information Processing Standards Publication 197
– start-page: 620
  year: 2003
  ident: ref24
  article-title: Efficient and fully scalable encryption for MPEG-4 FGS
  publication-title: Proc IEEE Int Symp Circuits Syst
– ident: ref17
  doi: 10.1109/JPROC.2004.839611
– ident: ref6
  doi: 10.1145/1161366.1161402
– ident: ref51
  doi: 10.1109/ICIP.2006.312886
– ident: ref37
  doi: 10.1155/2007/79048
– ident: ref20
  doi: 10.1109/ICIP.2001.959047
– ident: ref41
  doi: 10.1049/PBTE054E
– ident: ref23
  doi: 10.1016/j.sigpro.2010.10.012
– year: 1995
  ident: ref36
  publication-title: Computer System and Network Security
– ident: ref28
  doi: 10.1016/j.image.2010.03.005
– volume: lncs 4283
  start-page: 407
  year: 2006
  ident: ref30
  article-title: Scalable protection and access control in full scalable video coding
  publication-title: Proc 5th Int Workshop Digital Watermarking
  doi: 10.1007/11922841_33
– volume: 27
  start-page: 257
  year: 2004
  ident: ref29
  article-title: Selective video stream encryption algorithm based on chaos
  publication-title: Chin J Comput
– ident: ref5
  doi: 10.1109/TSP.2005.855418
– ident: ref11
  doi: 10.1109/TCE.2002.1010141
– ident: ref10
  doi: 10.1109/LSP.2005.851261
– volume: 15
  year: 2005
  ident: ref8
  publication-title: Advances in Information Security series
– ident: ref52
  doi: 10.1155/2008/179290
SSID ssj0014847
Score 2.2452366
Snippet The distribution of copyrighted scalable video content to differing digital devices requires protection during rendering and transmission. In this paper, we...
SourceID pascalfrancis
crossref
ieee
SourceType Index Database
Enrichment Source
Publisher
StartPage 425
SubjectTerms Access methods and protocols, osi model
AES-CFB algorithm
Applied sciences
Circuit properties
Coding, codes
context adaptive binary arithmetic coding (CABAC)
Electric, optical and optoelectronic circuits
Electronic circuits
Electronics
Encoding
Encryption
Exact sciences and technology
H.264/scalable video coding (SVC)
Image processing
Information, signal and communications theory
key management
multimedia internet keying protocol (MIKEY)
Protocols
security system
Signal and communications theory
Signal convertors
Signal processing
Static VAr compensators
Syntactics
Telecommunications
Telecommunications and information theory
Teleprocessing networks. Isdn
Title An Efficient Security System for CABAC Bin-Strings of H.264/SVC
URI https://ieeexplore.ieee.org/document/6218177
Volume 23
WOSCitedRecordID wos000317392600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-2205
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014847
  issn: 1051-8215
  databaseCode: RIE
  dateStart: 19910101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3Pa8IwFH6o7LAd9suNuR-Sw25btUldk55GLYqHIYM68VaaNAFh1KF1f_-StBaFMdit0DwoX1Lel-S97wN4zDLMCcXSYZqd6w0K9Rw-sMdwnvKFopSlVmf2jU6nbLEI3hvwXPfCSClt8ZnsmUd7l5-txNYclfV9k48obUKTUr_s1apvDAbMmolpuoAdpvPYrkHGDfqzKJ7PTBUX6RFi9FDwQRKyriqmJjLdaFhU6Wexl2TGZ__7vHM4rcgkCsvZv4CGzC_hZE9isA2vYY5GViZCx6K4cqtDpVA50owVReEwjNBwmTtxYWI2aKXQpKcpTD-eR1fwMR7NoolTmSY4ggS0cCSWvsA6BUmPZYQqKge-YL7eGfCUKoV9xaUkTKXc5QE3cn-KY_NrK6kEybh3Da18lcsbQKnMMh2aBVijJijnARUu91yXM195lHUA71BMRKUobowtPhO7s3CDxCKfGOSTCvkOPNUxX6Wexp-j2wbmemSFcAe6B5NVv9erThPMF3z7e9wdHBPrZmFKyO6hVay38gGOxHex3Ky7dj39AOR1xSE
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFL3MKagPfk1xfsw8-KbdmnQ26ZNsZWPiHMLm2Ftp0gQG0sk-_P0maVc2EMG3QnOhnKTck-TecwDukwRzQrF0mGbneoNCPYc37TGcp3yhKGWx1Znt08GATSbBewkei14YKaUtPpN182jv8pOZWJmjsoZv8hGlO7BrnLPybq3izqDJrJ2YJgzYYTqTrVtk3KAxCofjkanjInVCjCIK3kpD1lfFVEXGCw2MyhwtNtJM9_h_H3gCRzmdRK1s_k-hJNMzONwQGazAcytFHSsUoWPRMPerQ5lUOdKcFYWtditE7WnqDJcmZoFmCvXqmsQ0huPwHD66nVHYc3LbBEeQgC4diaUvsE5C0mMJoYrKpi-Yr_cGPKZKYV9xKQlTMXd5wI3gn-LY_NxKKkES7l1AOZ2l8hJQLJNEhyYB1qgJynlAhcs91-XMVx5lVcBrFCORa4oba4vPyO4t3CCyyEcG-ShHvgoPRcxXpqjx5-iKgbkYmSNchdrWZBXv9brTFPMJX_0edwf7vdFbP-q_DF6v4YBYbwtTUHYD5eV8JW9hT3wvp4t5za6tH1fNyGo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Efficient+Security+System+for+CABAC+Bin-Strings+of+H.264%2FSVC&rft.jtitle=IEEE+transactions+on+circuits+and+systems+for+video+technology&rft.au=Asghar%2C+Mamoona+Naveed&rft.au=Ghanbari%2C+Mohammad&rft.date=2013-03-01&rft.issn=1051-8215&rft.eissn=1558-2205&rft.volume=23&rft.issue=3&rft.spage=425&rft.epage=437&rft_id=info:doi/10.1109%2FTCSVT.2012.2204941&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCSVT_2012_2204941
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1051-8215&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1051-8215&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1051-8215&client=summon