Skip to main content

Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream


This work investigates the problem of efficient multimedia data encryption. A novel methodology is proposed to achieve encryption by controlling certain operations in the data compression process using a secret key. The new encryption approach consists of two cascaded modules. The first one is called randomized entropy coding (REC) while the second one is called rotation in partitioned bitstream (RPB). By leveraging the structure of the entropy coder, the joint REC/RPB encryption scheme incurs extremely low computational and implementation costs. Security analysis shows that the proposed scheme can withstand the ciphertext-only attack as well as the known/chosen plaintext attack. The efficiency and security of the proposed encryption scheme makes it an ideal choice in secure media applications where a large amount of multimedia data has to be encrypted/decrypted in real time.



  1. 1.

    Cheng H, Li X: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 2000, 48(8):2439-2451. 10.1109/78.852023

    Article  Google Scholar 

  2. 2.

    Droogenbroeck MV, Benedett R: Techniques for a selective encryption of uncompressed and compressed images. Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS '02), September 2002, Ghent, Belgium

    Google Scholar 

  3. 3.

    Pommer A, Uhl A: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 2003, 9(3):279-287. special issue on Multimedia Securit 10.1007/s00530-003-0099-y

    Article  Google Scholar 

  4. 4.

    Podesser M, Schmidt H-P, Uhl A: Selective bitplane encryption for secure transmission of image data in mobile environments. 5th Nordic Signal Processing Symposium, October 2002, Trondheim, Norway

    Google Scholar 

  5. 5.

    Spanos GA, Maples TB: Performance study of a selective encryption scheme for the security of networked, real-time video. Proceedings of the 4th ACM International Conference on Computer Communications and Networks (ICCCN '95), September 1995, Las Vegas, Nev, USA 2-10.

    Google Scholar 

  6. 6.

    Agi I, Gong L: An empirical study of secure mpeg video transmission. Internet Society Symposium on Network and Distributed System Security, February 1996, San Diego, Calif, USA 137-144.

    Chapter  Google Scholar 

  7. 7.

    Tang L: Methods for encrypting and decrypting MPEG video data efficiently. Proceedings of the 4th ACM International Multimedia Conference & Exhibition, November 1996, Boston, Mass, USA 219-229.

    Google Scholar 

  8. 8.

    Shi C, Bhargava B: A fast mpeg video encryption algorithm. Proceedings of the 6th ACM International Conference on Multimedia, September 1998, Bristol, UK

    Google Scholar 

  9. 9.

    Shi C, Wang S-Y, Bhargava B: Mpeg video encryption in real-time using secret key cryptography. International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '99), June 1999, Las Vegas, Nev, USA

    Google Scholar 

  10. 10.

    Wu C-P, Kuo C-CJ: Efficient multimedia encryption via entropy codec design. Security and Watermarking of Multimedia Contents, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 128-138.

    Article  Google Scholar 

  11. 11.

    Meyer J, Gadegast F: Security mechanisms for multimedia data with the example mpeg-1 video. 1995.

    Google Scholar 

  12. 12.

    Qiao L, Nahrstedt K: A new algorithm for mpeg video encryption. Proceedings of the 1st International Conference on Imaging Science, Systems, and Technology (CISST '97), July 1997, Las Vegas, Nev, USA 21-29.

    Google Scholar 

  13. 13.

    Chu H-H, Qiao L, Nahrstedt K: Secure multicast protocol with copyright protection. Symposium on Electronic Imaging: Science and Technology, January 1999, San Jose, Calif, USA, Proceedings of SPIE 3657: 460-471.

    Google Scholar 

  14. 14.

    Slagell A: Known plaintext attack against a permutation based video encryption algorithm. 2002.

    Google Scholar 

  15. 15.

    Wu C-P, Kuo C-CJ: Fast encryption methods for audiovisual data confidentiality. Symposium on Photonics East, Voice, Video, and Data Communication, October 2001, Ottawa, Canada, Proceedings of SPIE 4209: 284-295.

    Google Scholar 

  16. 16.

    Wu C-P, Kuo C-CJ: Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 2005, 7(5):828-839.

    Article  Google Scholar 

  17. 17.

    Xie D, Kuo C-CJ: Efficient multimedia data encryption based on flexible QM coder. Security, Steganography, and Watermarking of Multimedia Contents VI, January 2004, San Jose, Calif, USA, Proceedings of SPIE 5306: 696-704.

    Article  Google Scholar 

  18. 18.

    Grangetto M, Magli E, Olmo G: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 2006, 8(5):905-917.

    Article  Google Scholar 

  19. 19.

    Wen JG, Kim H, Villasenor JD: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 2006, 13(2):69-72.

    Article  Google Scholar 

  20. 20.

    Kim H, Wen J, Villasenor JD: Secure arithmetic coding. IEEE Transactions on Signal Processing 2007, 55(5):2263-2272.

    MathSciNet  Article  Google Scholar 

  21. 21.

    Bose R, Pathak S: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Transactions on Circuits and Systems I 2006, 53(4):848-857.

    MathSciNet  Article  Google Scholar 

  22. 22.

    Xie D, Kuo C-CJ: Multimedia data encryption via random rotation in partitioned bit streams. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 5: 5533-5536.

    Google Scholar 

  23. 23.

    Zhou J, Liang Z, Chen Y, Au OC: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Processing Letters 2007, 14(3):201-204.

    Article  Google Scholar 

  24. 24.

    Menezes AJ, van Oorschot PC, Vanstone SA: Handbook of Applied Cryptography. CRC Press, Boca Raton, Fla, USA; 1996.

    Book  Google Scholar 

  25. 25.

    Witten IH, Cleary JG: On the privacy afforded by adaptive text compression. Computers and Security 1988, 7(4):397-408. 10.1016/0167-4048(88)90580-9

    Article  Google Scholar 

  26. 26.

    Bergen HA, Hogan JM: Chosen plaintext attack on an adaptive arithmetic coding compression algorithm. Computers and Security 1993, 12(2):157-167. 10.1016/0167-4048(93)90099-Q

    Article  Google Scholar 

  27. 27.

    Cleary JG, Irvine SA, Rinsma-Melchert I: On the insecurity of arithmetic coding. Computers and Security 1995, 14(2):167-180. 10.1016/0167-4048(95)97050-K

    Article  Google Scholar 

  28. 28.

    Lim J, Boyd C, Dawson E: Cryptanalysis of adaptive arithmetic coding encryption scheme. The 2nd Australasian Conference on Information Security and Privacy, July 1997, Tokyo, Japan 216-227.

    Chapter  Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Dahua Xie.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and Permissions

About this article

Cite this article

Xie, D., Kuo, CC. Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream. EURASIP J. on Info. Security 2007, 035262 (2007).

Download citation


  • Entropy
  • Encryption Scheme
  • Security Analysis
  • Data Compression
  • Data Security