1st International ICST Workshop on Multimedia Security in Communication

Research Article

Visual Security Assessment for Video Encryption

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685269,
        author={Ye Yao and Zhengquan Xu and Wei Li},
        title={Visual Security Assessment for Video Encryption},
        proceedings={1st International ICST Workshop on Multimedia Security in Communication},
        publisher={IEEE},
        proceedings_a={MUSIC},
        year={2008},
        month={11},
        keywords={video encryption; visual security assessment; structure distortion; image entropy; spatial correlation},
        doi={10.1109/CHINACOM.2008.4685269}
    }
    
  • Ye Yao
    Zhengquan Xu
    Wei Li
    Year: 2008
    Visual Security Assessment for Video Encryption
    MUSIC
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685269
Ye Yao1,*, Zhengquan Xu2,*, Wei Li2,*
  • 1: College of Computer and Information Engineering, Zhejiang Gongshang University Hangzhou, China
  • 2: State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University Wuhan, China
*Contact email: yesiryao@hotmail.com, xuzq@whu.edu.cn, liw@alcatel-lucent.com

Abstract

Video data security is very important for multimedia applications, such as video surveillance and real time videoconference. Although many video encryption methods have been reported, no systematic visual security assessment means have been proposed. Now, security analysis of video encryption put emphasis only on the encryption algorithm itself. However, the intelligibility of the encrypted video needs also to be investigated. Typically, the objective assessment is required to assess how much the video information in cipher-videos is distorted, shuffled, and unrecognized. In this paper, three visual security assessment methods are presented for video encryption. They are structure distortion, image entropy, and spatial correlation. Experiment results are presented and analyzed. It shows that our scheme can provide objective assessment compliant with subjective assessment, and is also suitable for the security assessment of other selective video encryption algorithms.