Chapter
2.3. Overview of Video Coding
2.4. Digital Video Encryption Algorithm
2.4.2. Selective Encryption
I-Frame and I Block of the Frame Encryption
Head Information Encryption
DCT Coefficient Encryption
Video Encryption Algorithms with Format Compliance
3.1. Definition and Significance of Format Compliance
3.2. Principles for Format Compliance
3.2.1. Related Definition
3.2.2. Principles for Video Encryption with Format Compliance
3.2.3. Principles for Video Code Element Encryption
3.2.3.1. Fixed-Length Code Element Encryption
3.2.3.2. Variable-Length Code
3.2.3.3. Code Element Context Encryption
3.2.4. Summary of Principles and Means
3.3. Video Encryption with Format Compliance
3.3.1. VLC Encryption with Random Sequence
3.3.1.1. Principle of Randomly Change Codewords
3.3.1.2. Making Reference Code Table by Grouping Code Word
3.3.1.3. Encryption and Decryption Algorithms
3.3.1.4. A Random Sequence Generation
Algorithm of Variable Mode
3.3.1.5. Experiments and Analysis
3.3.2. Video Encryption Algorithm Based on Spatial Shuffling
3.3.2.1. Pseudo-Random Sequence and Encryption Shuffling Table
3.3.2.1.1. Shuffling Table Generation Based on Pseudo-Random Sequence
3.3.2.1.2. Shuffling Table Application
3.3.2.2. Video Encryption Approach and Critical Blocks of Bitstreams
3.3.2.2.1. Video Encryption Approach
3.3.2.2.2. Critical Data Blocks of Bitstreams
3.3.2.3. Security Level Design and Analysis
3.3.2.3.1. Security Level Design
3.3.2.3.2. Resultant Images of Different Security Level
3.3.2.3.3. Performance of Different Security Level
3.3.2.4. Performance Analysis
3.3.3. H.264/AVC Video Encryption Algorithm
3.3.3.1. Self-Adaptive Selective Encryption Algorithm for H.264/AVC
3.3.3.1.1. Encryption of Quantization Step
3.3.3.1.2. Encryption of Predictive Code Word
3.3.3.1.3. Encryption of Motion Vector Difference
3.3.3.1.4. Encryption of Residual Coefficient Relevant Information
3.3.3.1.5. Encryption of I-PCM Mode Macroblock
3.3.3.2. Residual Block Scrambling Algorithm for H.264/AVC
3.3.3.2.1. H.264/AVC Residual Values Coding
3.3.3.2.2. The Basic Principle of Algorithm
3.3.3.2.3. Algorithm Implementation
3.3.3.3. Combination of Two Encryption Algorithms: AVCEA
3.3.3.4. Performance Analysis
3.3.3.4.1. Visual Security
3.3.3.4.2. Semantic Format Compatibility
3.3.3.4.3. Security Analysis
3.3.3.4.4. Computational Complexity
3.3.3.4.5. Affection to the Size of Coding Stream
3.4.4. Video Encryption Based on Chaos
3.4.4.1. Chaotic Sequences Generator Based on Coupled Logistic Maps
3.4.4.2. Video Encryption Scheme and Experiment
Visual Security Assessments for Visual Media
4.2. Visual Security Assessment Methods
4.2.1. Assessment Based on Cryptographic Analysis
4.2.2. Assessment Based on Subjective Evaluation
4.2.3. Assessment Based on Video Quality Assessment
4.2.4. Visual Security Assessment vs Video Quality Assessment
4.3. Introduce of Three Kinds of Objective Visual Security Assessments
4.3.1. Method Based on Structure Distortion
4.3.2. Method Based on Local Image Entropy
4.3.3. Method Based on Spatial Correlation
4.3.4. Results and Analysis
Content-Based Multi-Level Encryption and Multi-Level Authorization
5.1. Definition and Significance
5.1.1. Concept of Content-Based
5.1.2. Concept of Multi-Level Authorization
5.1.3. Advantage of Content-Based Multi-Level Authorization
5.2. Content-Based Multi-Level Encryption and Authorization Method
5.2.1. Theoretical Model of Content-Based
Multi-Level Authorization
5.2.2. Extraction of Key Information Based on Content
5.2.2.1. Selection of Encryption Point
5.2.2.2. Analysis of Key Information
5.2.2.2.1. DC Coefficient and AC Coefficient
5.2.2.2.2. Motion Vector (MV)
5.2.2.2.3. Other Key Information
5.2.3. Frameworks of Multi-Level Authorization Protection of Visual Media
5.3. Multi-Level Encryption and Authorization Model Based on Remote Sensing Images
5.3.1. Data Characteristics of Remote Sensing Image and Extraction of Confidential Region
5.3.2. Framework of Multi-Level Encryption and Authorization Model of Remote Sensing Images
5.3.3. Experiment and Analysis