Mohammed A. Saleh, Nooritawati Md. Tahir, Habibah Hashim


Video data are being compressed and distributed using one of several coding standards, among which the most recent and popular is the High Efficiency Video Coding (HEVC) standard. The threatening growth of security attacks, on the other hand, has brought security and privacy concerns to the attention of governments and people as well. In the absence of a reliable security system, shared multimedia data used on the public networks such as the internet will continue to be exposed to different types of attacks, making end-to-end encryption for video data a necessity to protect their sensitive information. Therefore, providing a reliable video security technique that complies to and fulfills the requirements of HEVC is pertinent. In this paper, a fast selective encryption approach is developed to provide protection for video bitstreams of HEVC, which can be used in real-time video applications, with low computational overhead and maintaining the standard’s video bit rate. This approach employs the popular Advance Encryption Standard (AES) algorithm to encrypt selected elements in the horizontal intra prediction modes. Experimental evaluations confirm the provision of adequate security level of video information, with no bitrate increase, no increase in computational delay and no additional impact on the compression performance when compared to non-secure techniques, while also achieving a satisfactory trade-off between the encryption reliability, flexibility, and computational complexity. The security level of this method was found to be strongly secure against plaintext and brute force attacks.


HEVC standard, real-time encryption, selective encryption, AES, video stream security stream security

Full Text:



H. K. Arachchi, X. Perramon, S. Dogan, and A. M. Kondoz. 2009. Adaptation–aware Encryption of Scalable H.264/AVC Video for Content Security. Signal Process. Image Commun. 24(6): 468-483.

J. Jegajeevanram and M. Sangeetha. 2014. Concealing Information In H.264/AVC Compressed Video Using DWT. International Journal of Advanced Technology in Engineering and Science. 2(11): 384-389.

Cisco. 2015. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2014–2019. [Online]. Available: [Accessed: 29-Jul-2015].

B. Girod, E. Steinbach, N. Farber, and I. Farber. 1995. Comparison of the H.263 and H.261 Video Compression Standards. Standards and Common Interfaces for Video Information Systems (SPIE). Philadelphia, USA. 25-26 October, 1995. 233-251.

D. Austerberry. 2005. The Technology of Video and Audio Streaming. 2nd edi. USA: Elsevier.

M. A. Saleh, H. Hashim, N. Tahir, and E. Hisham. 2014. Review for High Efficiency Video Coding (HEVC). IEEE Conf. Syst. Process Control (ICSPC). Kuala Lumpur, Malaysia. 12-14 Dec. 2014. 141-146.

H. Hofbauer, A. Uhl, and A. Unterweger. 2014. Transparent Encryption for HEVC Using Bit-Stream-Based Selective Coefficient Sign Encryption. IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP). 4-9 May, 2014. 1986-1990.

Z. Shahid and W. Puech. 2014. Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings. IEEE Trans. Multimed. 16(1): 24-36.

M. P. Nirmala. 2014. Commutative Protection System for High Secure Video Coding. Trans. Eng. Science. 2(1): 6-10.

T. Davies and A. Fuldseth. 2011. JCTVC-F162: Entropy Coding Performance Simulations. Jt. Collab. Team Video Coding.

G. J. S. Vivienne Sze, Madhukar Budagavi. 2014. High Efficiency Video Coding (HEVC) Algorithms and Architectures. 1st edi. London. Springer.

Iain E. Richardson. 2010. The H.264 Advanced Video Compression Standard. 2nd edi. UK. Wiley.

D. Marpe, H. Schwarz, and T. Wiegand. 2003. Context-Based Adaptive Binary Arithmetic Coding in the H.264/AVC Video Compression Standard. IEEE Trans. Circuits Syst. Video Technol. 13(7): 620-636.

Sharman, K. James, Gamei, and J. Alexander. 2015. Data Encoding And Decoding. WO 167299 Al.

B. Peng, D. Ding, X. Zhu, and L. Yu. 2013. A Hardware CABAC Encoder for HEVC. IEEE Symposium on Circuits and Systems (ISCAS). Beijing, China. 19-23 May, 2013. 1372-1375.

M. Wien. 2015. High Efficiency Video Coding Coding Tools and Specification. 1st edit. London. Springer.

J. Lou and L. Wang. 2013. Method of Determining Binary Codewords for Transform Coefficients. US 0202029 A1.

T. Wiegand, G. Sullivan, J. Reichel, H. Schwarz, and M. Wien. 2007. Joint Draft ITU-T Rec. H.264 | ISO/IEC 14496-10 / Amd.3 Scalable Video Coding. Jt. Video Team JVT-X201. 108(563).

T. Lookabaugh and D. C. Sicker. 2004. Selective Encryption for Consumer Applications. IEEE Conference Consumer Communications and Networking(CCNC). 5-8 Jan. 2004. 124-129.

A. Pande, P. Mohapatra, and J. Zambreno. 2013. Securing Multimedia Content using Joint Compression and Encryption. IEEE Multimed. 20(4): 50-61.

S. Gupta, L. Kishor, and D. Goyal. 2014. Comparative Analysis of Encrypted Video Streaming in Cloud Network. Int. J. Comput. Sci. Inf. Technol. 5(4): 5470-5476.

Y. Wang, S. Member, O. Neill, and S. Member. 2013. A Tunable Encryption Scheme and Analysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC. IEEE Transic. Circuits Syst. Video Technol. 23(9): 1476-1490.

M. A. Saleh, N. M. Tahir, and H. Hashim. 2016. Moving Objects Encryption of High Efficiency Video Coding (HEVC) using AES Algorithm. J. Telecommun. Electron. Comput. Eng. 8(3): 31-36.

M. A. Saleh, N. Tahir, and H. Hashim. 2015. An Analysis and Comparison for Popular Video Encryption Algorithms. IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). Langkawi, Malaysia. 12-14 April, 2015. 90-94.

A. Tanchenko. 2014. Visual-PSNR Measure of Image Quality. J. Vis. Commun. Image Represent. 25(5): 874-878.

Y. A. Y. Al-najjar and D. C. Soong. 2012. Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI. Int. J. Sci. Eng. Res. 3(8): 1-5.

M. N. A. and M. Ghanbari. 2013. An Efficient Security System for CABAC Bin-Strings of H.264/SVC. IEEE Trans. Circuits Syst. Video Technol. 23(3): 425-437.

G. Raja and S. Rehman. 2014. Performance Evaluation of HEVC over Broadband Networks. IJCSI Int. J. Comput. Sci. Issues. 11(4): 68-74.

C. E. Shannon. 1949. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 28(4): 656-715.

A. Unterweger. 2014. Post-Compression Multimedia Security. Ph.D. Thesis. Dept. Comp. Scin., University of Salzburg, Salzburg, Austria.

A. Bogdanov, D. Khovratovich, and C. Rechberger. 2011. Biclique Cryptanalysis of the Full AES. Conference on the Theory and Application of Cryptology and Information Security. Springer Berlin Heidelberg. 4-8 Dec, 2011. 344-371.



  • There are currently no refbacks.

Copyright © 2012 Penerbit UTM Press, Universiti Teknologi Malaysia.
Disclaimer : This website has been updated to the best of our knowledge to be accurate. However, Universiti Teknologi Malaysia shall not be liable for any loss or damage caused by the usage of any information obtained from this web site.
Best viewed: Mozilla Firefox 4.0 & Google Chrome at 1024 × 768 resolution.