Encryption Techniques for H.264 Video

Bai Ying Lei*, Kwok Tung Lo, Jian FENG

*Corresponding author for this work

Research output: Chapter in book/report/conference proceedingChapterpeer-review

1 Citation (Scopus)


Data encryption is one of the important information security technologies used for safeguarding multimedia content. This book chapter will focus on the encryption techniques for H.264, which is the latest video coding standard and has become one of the most promising techniques for future video communications. A major concern in the design of H.264 encryption algorithms is how to achieve a sufficiently high level of security, while maintaining the efficiency of the underlying compression algorithm. In this chapter, a review on various H.264 video encryption methods will first be performed. Feasibility study on various techniques meeting application specific criteria will be carried out and some problems of the existing techniques will be pointed out. As chaos has intrinsic properties such as sensitivity to initial conditions, deterministic oscillations and noise-like behavior, it has acquired much attention for video content protection. A novel joint compression and encryption scheme based on the context-based adaptive binary arithmetic coding (CABAC) module of H.264 video codec is then presented using a chaotic stream cipher. It is shown that the proposed H.264 encryption scheme based on a discrete piecewise linear chaotic map is secure in perception, efficient and format compliant and suitable for practical video protection. Finally, some possible directions on H.264 encryption will also be discussed in this chapter.

Original languageEnglish
Title of host publicationThe Handbook of MPEG Applications
Subtitle of host publicationStandards in Practice
PublisherJohn Wiley & Sons Ltd.
Number of pages23
ISBN (Print)9780470750070
Publication statusPublished - 4 Oct 2010

Scopus Subject Areas

  • Engineering(all)

User-Defined Keywords

  • Chaotic encryption algorithm
  • H.264 video
  • Video encryption
  • Video security


Dive into the research topics of 'Encryption Techniques for H.264 Video'. Together they form a unique fingerprint.

Cite this