Multimedia Data Secure Transmission: A Review
Downloads
Encryption is a technique of encoding data so that they can only be recognized by authorized receivers. More interactive media information is communicated in the medical, business, and military fields because of the rapid advances in various multimedia transmission and networking technologies, which may contain sensitive information that must be kept hidden from public users. Advanced encryption standards (AES) and data encryption standards (DES) are widely used encryption algorithms for text data. However, they are not appropriate for video data. To ensure that this information cannot be accessed by attackers, the demand for efficient video-protection techniques has been raised. This article provides multimedia design requirements to maintain a secure multimedia system occupied with a threat model for detecting and ranking the potential risks facing a multimedia system. the risks exposed to multimedia security and their impacts on users are typically described according to the textual description and also an overview of the current state-of-the-art video-encryption schemes are presented and their performance parameters have been examined. The relationship between encryption algorithms and compression techniques is also discussed and various multimedia applications have been presented in this paper; Additionally, as the synchronisation of real-time continuous streams is necessary for the interchange of these streams in multimedia conferencing services, multiple synchronisation strategies have been given in this study along with video synchronisation challenges.
Downloads
Anbu, T., M. Milton Joe, and G. Murugeswari. "A Comprehensive Survey of Detection of Tampered Video and Localization of Tampered Frame." Wireless Personal Communications (2021): 1-34.
M. A. Saleh, N. M. Tahir, E. Hisham, & H. Hashim., "An analysis and comparison for popular video encryption algorithms" IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE; 2015.
S. Balli & M. Yilmaz, "Multi-criteria usability evaluation of symmetric data encryption algorithms in fuzzy environment". SN Appl Sci, vol. 2, pp. 1–12, 2020.
Saikia, M., S. J. Bora, and Md A. Hussain. "A review on applications of multimedia encryption." national conference on Network Security-issues, challenges and Techniques, 2012.
Elkilani, Wail S., and Hatem M. Abdul-Kader. "Performance of encryption techniques for real time video streaming." 2009 International Conference on Networking and Media Convergence. IEEE, 2009.
Hoque, Mohammad Aminul, and Ragib Hasan. "Towards a threat model for vehicular fog computing." 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE, 2019.
Rathore, Shailendra, et al. "Social network security: Issues, challenges, threats, and solutions." Information sciences 421 (2017): 43-69.
Sharma, Chirag, et al. "A secured frame selection based video watermarking technique to address quality loss of data: combining graph based transform, singular valued decomposition, and hyperchaotic encryption." Security and Communication Networks 2021 (2021).
Mekki, Neila, et al. "A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system." 2018 International Conference on Advanced Communication Technologies and Networking (CommNet). IEEE, 2018.
Khorsheed, Khattab O., Omar G. Abood, and Shawkat K. Guirguis. "Enhancing the performance of video encryption used for security and privacy protection in secure multimedia transfer." International Journal of Engineering & Technology, (2018).
Yun, Junhyeok, and Mihui Kim. "JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things." Sensors 20.13 (2020): 3627.
S. Alhassan, M. M. Iddrisu & M. I. Daabo, "Perceptual video encryption via unit anti-diagonal matrix". Appl Math Inf Sci, vol. 12, pp. 923–930, 2018.
M. K. Lee & E. S. Jang, "Start code-based encryption and decryption framework for HEVC". IEEE Access, vol. 8 202918, 2020.
Li, Shujun, et al. "On the design of perceptual MPEG-video encryption algorithms." IEEE Transactions on Circuits and Systems for Video Technology 17.2 (2007): 214-223.
A survey of Video Encryption Methodologies. https://1library.net/document/yro02evy-a-survey-of-video-encryption-methodologies.html
M. Dalal & M. Juneja, “A survey on information hiding using video steganography”. Artif Intell Rev, pp. 1–65, 2021.
J. Y. Lee, "Impact of video compression and multimodal embedding on scene description". Electronics, vol. 8, p. 963, 2019.
J. Meyer & F. Gadegast, ``Security mechanisms for multimedia data with the example MPEG-1 video''. Proj Descript SECMPEG Tech UnivBerl, Berlin, Germany, 1995.
G. A. Spanos & T. B. Maples, ``Performance study of a selective encryption scheme for the security of networked, real-time video''. In: Proc. 4th International Conference Comput Commun Netw, Las Vegas, NV, USA; 1995:210.
L. Tang, ``Methods for encrypting and decrypting MPEG video data efficiently''. In: Proc. 4th ACM Int. Conference Multimedia, Boston, MA, USA, 1996 229:219.
C. Shi & B. Bhargava, “An efficient MPEG video encryption algorithm,'' in Proc. 17th IEEE Symposium Reliable Distrib Syst, West Lafayette, IN, USA, vol. 386, p. 381, Oct. 1998.
C. Shi, S. Y. Wang & B. Bhargava, ``MPEG video encryption in realtime using secret key cryptography''. In: Proc. International Conference Parallel Distributed process Techn Appl, Las Vegas, NV, USA 2828; 1999:2822.
D. G. Costa, S. Figuerêdo & G. Oliveira, "Cryptography in wireless multimedia sensor networks: A survey and research directions". Cryptography, vol. 1, p. 4, 2017.
A. A. Adenowo & L. F. Oderinu, "A comparative study of video cryptographic algorithms and the performance metrics used in the literature to measure the algorithms". P-ISSN 2006-1781 Afr J, comp. & ICT 13; 2020:43 – 61.
A. K. Naji & S. N. Alsaad, "Data (Video) Encryption in Mobile devices". Kurdistan J Appl Res, vol. 2, pp. 32–39, 2017.
X. Tian, C. Fan, J. Liu & Q. Ding, "Design and implementation of network video encryption system based on STM32 and AES algorithm". Smart Innov Syst Technol, vol. 82, pp. 51–58, 2018.
A. Chadha, S. Mallik, A. Chadha, R. Johar & M. M. Mani Roja, "Dual-layer video encryption using RSA algorithm". Int J Comput Appl, vol. 116, pp. 33–40, 2015.
P. Deshmukh & V. Kolhe, "Modified AES based algorithm for MPEG video encryption" International Conference on Information Communication and Embedded Systems, ICICES 2014 2015; 2014.
M. Long, F. Peng & H. y. Li, "Separable reversible data hiding and encryption for HEVC video". J Real-Time Image Process, vol. 14, pp. 171–182, 2018.
D. M. Dumbere & N. J. Janwe, "Video encryption using AES algorithm" 2nd International Conference on Current Trends in Engineering and Technology, ICCTET 2014; 2014:332–337.
S. Ali Abaas & A. K. Shibeeb, "A new approach for video encryption based on modified AES algorithm". IOSR JCE (IOSR-JCE), vol. 17, pp. 44–51, 2015.
S. S. Giradkar & A. Bhattacharya, "Securing compressed video streams using RC4 encryption scheme" Global Conference on Communication Technologies, GCCT 2015; 2015:640–644.
F. Liu & H. Koenig, "Puzzle - an efficient, compression independent video encryption algorithm". Multimedia Tool Appl, vol. 73, pp. 715–735, 8 10, 2014.
J. Yun & M. Kim, " JLVEA: lightweight real- time video stream encryption algorithm for Internet of things". Sensors (Basel), vol. 20, pp. 3627–3641, 2020.
S. F. Sultana & D. C. Shubhangi, "Video encryption algorithm and key management using perfect shuffle". Int J Eng Res Appl, vol. 07, pp. 1–5, 2017.
Z. Li, X. Wang & W. Yang, "A fast selective video encryption algorithm by selecting data randomly" Sixth International Conference on Electronics and Information Engineering 9794; 2015.
F. Peng, X. q. Gong, M. Long & X. m. Sun, "A selective encryption scheme for protecting H.264/AVC video in multimedia social network”. Multimedia Tool Appl, vol. 76, pp. 3235–3253, 2017.
F. Sbiaa, S. Kotel, M. Zeghid, R. Tourki, M. Machhout & A. Baganne, "A selective encryption scheme with multiple security levels for the H.264/AVC video coding standard”. Proceedings 16th IEEE International Conference on Computer and Information Technology, CIT 6th International Symposium on Cloud and Service Computing 2016; 2016, institute of electrical and electronics engineers, “SC2 2016 and” International Symposium on Security and Privacy in Social Network 2017; 2016:391–398.
M. Yang, L. Zhuo, J. Zhang & X. Li, "An efficient format compliant video encryption scheme for HEVC bitstream". Proc. 2015 IEEE.
International Conference on Progress in Informatics and Computing, PIC, vol. 2015, pp. 374–378, 2016.
D. Xu, "Commutative encryption and data hiding in HEVC video compression". IEEE Access, vol. 7, pp. 66028–66041, 2019.
R. Huang & C. Lu, "Research of H.264 video transmission encryption technology based on blowfish algorithm". Proc. 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015; 2016:931–935.
G. VanWallendael, A. Boho, J. De Cock, A. Munteanu & R. Van De Walle, ``Encryption for high effciency video coding with video adaptation capabilities''.IEEE Trans Consum Electron, vol. 59, p. 634–642_642, Aug. 2013.
K. Minemura & K. Wong, "Sketch attacks: A note on designing video encryption method in H.264/AVC”, vol. 2014, 2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014.
B. Boyadjis, C. Bergeron, B. Pesquet-Popescu & F. Dufaux, ``Extended selective encryption of H.264/AVC (CABAC)- and HEVC-Encoded Video Streams” of H.264/AVC (CABAC)- and HEVC-encoded video streams. IEEE Trans Circuits Syst Video Technol, vol. 27, p. 892–906_906, Apr. 2017.
Y. Chung, S. Lee, T. Jeon & D. Park, "Fast video encryption using the H.264 error propagation property for smart mobile devices". Sensors (Basel), vol. 15, pp. 7953–7968, 2015.
J. M. Joshi & U. D. Dalal, "Highly secure and fast video encryption using minimum overhead in H.264/AVC Bitstream”. J Test Eval, vol. 44, pp. 140–332, 2016.
Y. Tew, K. Wong & R. C. Phan, "Joint selective encryption and data embedding technique in HEVC video", vol. 2017, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016.
N. Dilkash, A. Gupta & A. Jain. “Real Time Video Encryption for Secure Multimedia Transfer: A Novel Approach. pdfs.semanticscholar.org 8; 2018:17077–17080.
S. Cheng, L. Wang, N. Ao & Q. Han, "A selective video encryption scheme based on coding characteristics". Symmetry, vol. 12, pp. 332–346, 2020.
Z. Shahid & W. Puech, ``Visual protection of HEVC video by selective encryption of CABAC binstrings''. IEEE Trans Multimedia, vol. 16, p. 24–36_36, Jan. 2014.
N. Sidaty, W. Hamidouche & O. Deforges, "A new perceptual assessment methodology for selective HEVC video encryption," ICASSP, IEEE International Conference on Acoustics, Speech and Signal processing. Proceedings, pp. 1542–1546, 2017.
S. K. Au Yeung & B. Zeng, "A new design of multiple transforms for perceptual video encryption". Proc. - International Conference on Image Processing, ICIP; 2012:2637–2640.
N. Kamnoonwatana, "Format-compliant perceptual video encryption based on multiple description coding" 11th Malays International Conference on Communications, MICC 2013. IEEE; 2013:75–80.
A. Kirthanaa, N. Mathan & T. Vino, "Improved perceptual video encryption and decryption using S- transform" International Conference on Control Instrumentation Communication and Computational Technologies, ICCICCT 2015 2016; 2015:145–148.
T. Bernatin, S. Kuzhaloli, M. S. Premi & L. B. Queen, "Perceptual video encryption in multimedia secure communication". Proc. 2016 Online International Conference on Green Engineering and Technologies, IC-GET 2016; 2017.
M. N. Asghar, R. Kousar, H. Majid & M. Fleury, "Transparent encryption with scalable video communication: lower-latency, CABAC-based schemes". J Vis Commun Image Represent, vol. 45, pp. 122–136, 2017.
Jacobs, Martin, and Peter Leydekkers. "Specification of synchronization in multimedia conferencing services using the TINA lifecycle model." Distributed Systems Engineering 3.3 (1996): 185.
Boronat, Fernando, Jaime Lloret, and Miguel Garcia. "Multimedia group and inter-stream synchronization techniques: A comparative study." Information Systems 34.1 (2009): 108-131.
Yang, Hsueh-szu, and Benjamin Kupferschmidt. "Time Stamp Synchronization in Video Systems." International Foundation for Telemetering, 2010.
Saikia, M., S. J. Bora, and Md A. Hussain. "A review on applications of multimedia encryption." national conference on Network Security-issues, challenges and Techniques.
M. Kandias, L. Mitrou, V. Stavrou, D. Gritzalis, which side are you on? A new Panopticon vs. privacy, in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), IEEE, 2013, pp. 1–13.
N.N.G. de Andrade, A. Martin, S. Monteleone, All the better to see you with, my dear: facial recognition and privacy in online social networks, IEEE Secur. Priv. 11 (3) (2013) 21–28.
L. González-Manzano, A.I. González-Tablas, J.M. de Fuentes, A. Ribagorda, cooped: co-owned personal data management, Comput. Secur. 47 (2014) 41–65.
A. Mendelson, does social media distort reality? (http://www.scoop.it/t/social-media-versus-reality). Online; accessed 04 April 2017.
Software informer, Image Distortion Tool Downloads, (http://image-distortion-tool.en.informer.com/). Online; accessed 03 April 2017.
A. Viejo, J. Castella-Roca, G. Rufián, Preserving the user’s privacy in social networking sites, in: Proceedings of the International Conference on Trust, Privacy and Security in Digital Business, Berlin Heidelberg, Springer, 2013, pp. 62–73.
J.C. Dressler, C. Bronk, D.S. Wallach, Exploiting military OpSec through open-source vulnerabilities, in: Proceedings of the Military Communications Conference, MILCOM, IEEE, 2015, pp. 450–458.
O. Van Laere, S. Schockaert, B. Dhoedt, Georeferencing Flickr resources based on textual meta-data, Inf. Sci. 238 (2013) 52–74.
S. Lee, J. Kim, Warningbird: a near real-time detection system for suspicious urls in twitter stream, IEEE Trans. Dependable Secure Comput. 10 (3) (2013) 183–195.
B. Sams, Facebook photo exploit allows you to view any albums of non-friends, (https://www.neowin.net/news/ facebook-photo-exploit-allows-you-to-view-any-albums-of-non-friends). Online; accessed 04 April 2017.
S. Singh, Y.S. Jeong, J.H. Park, A survey on cloud computing security: issues, threats, and solutions, J. Netw. Comput. Appl. 75 (2016) 200–222.
N. Ramzan, H. Park, E. Izquierdo, Video streaming over P2P networks: challenges and opportunities, Signal Process. Image Commun. 27 (5) (2012) 401–411.
A.C. Squicciarini, M. Shehab, J. Wede, Privacy policies for shared content in social network sites, VLDB J. 19 (6) (2010) 777–796.
F. Ahmed, M. Abulaish, A generic statistical approach for spam detection in Online Social Networks, Comput. Commun. 36 (10) (2013) 1120–1129.
L. González-Manzano, A.I. González-Tablas, J.M. de Fuentes, A. Ribagorda, Cooped: co-owned personal data management, Comput. Secur. 47 (2014) 41–65.
J.D. Lee, C.H. Sin, J.H. Park, PPS-RTBF: Privacy protection system for right to be forgotten, J. Converg. 5 (2014) 37–40. S. Rathore et al. / Information Sciences 421 (2017) 43–69 67.
Copyright (c) 2022 Hassan Elkamchouchi, Rosemarie Anton , Yasmine Abouelseoud
This work is licensed under a Creative Commons Attribution 4.0 International License.