Skip to main content


Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream

Article metrics


This work investigates the problem of efficient multimedia data encryption. A novel methodology is proposed to achieve encryption by controlling certain operations in the data compression process using a secret key. The new encryption approach consists of two cascaded modules. The first one is called randomized entropy coding (REC) while the second one is called rotation in partitioned bitstream (RPB). By leveraging the structure of the entropy coder, the joint REC/RPB encryption scheme incurs extremely low computational and implementation costs. Security analysis shows that the proposed scheme can withstand the ciphertext-only attack as well as the known/chosen plaintext attack. The efficiency and security of the proposed encryption scheme makes it an ideal choice in secure media applications where a large amount of multimedia data has to be encrypted/decrypted in real time.



  1. 1.

    Cheng H, Li X: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 2000, 48(8):2439-2451. 10.1109/78.852023

  2. 2.

    Droogenbroeck MV, Benedett R: Techniques for a selective encryption of uncompressed and compressed images. Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS '02), September 2002, Ghent, Belgium

  3. 3.

    Pommer A, Uhl A: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 2003, 9(3):279-287. special issue on Multimedia Securit 10.1007/s00530-003-0099-y

  4. 4.

    Podesser M, Schmidt H-P, Uhl A: Selective bitplane encryption for secure transmission of image data in mobile environments. 5th Nordic Signal Processing Symposium, October 2002, Trondheim, Norway

  5. 5.

    Spanos GA, Maples TB: Performance study of a selective encryption scheme for the security of networked, real-time video. Proceedings of the 4th ACM International Conference on Computer Communications and Networks (ICCCN '95), September 1995, Las Vegas, Nev, USA 2-10.

  6. 6.

    Agi I, Gong L: An empirical study of secure mpeg video transmission. Internet Society Symposium on Network and Distributed System Security, February 1996, San Diego, Calif, USA 137-144.

  7. 7.

    Tang L: Methods for encrypting and decrypting MPEG video data efficiently. Proceedings of the 4th ACM International Multimedia Conference & Exhibition, November 1996, Boston, Mass, USA 219-229.

  8. 8.

    Shi C, Bhargava B: A fast mpeg video encryption algorithm. Proceedings of the 6th ACM International Conference on Multimedia, September 1998, Bristol, UK

  9. 9.

    Shi C, Wang S-Y, Bhargava B: Mpeg video encryption in real-time using secret key cryptography. International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '99), June 1999, Las Vegas, Nev, USA

  10. 10.

    Wu C-P, Kuo C-CJ: Efficient multimedia encryption via entropy codec design. Security and Watermarking of Multimedia Contents, January 2001, San Jose, Calif, USA, Proceedings of SPIE 4314: 128-138.

  11. 11.

    Meyer J, Gadegast F: Security mechanisms for multimedia data with the example mpeg-1 video. 1995.

  12. 12.

    Qiao L, Nahrstedt K: A new algorithm for mpeg video encryption. Proceedings of the 1st International Conference on Imaging Science, Systems, and Technology (CISST '97), July 1997, Las Vegas, Nev, USA 21-29.

  13. 13.

    Chu H-H, Qiao L, Nahrstedt K: Secure multicast protocol with copyright protection. Symposium on Electronic Imaging: Science and Technology, January 1999, San Jose, Calif, USA, Proceedings of SPIE 3657: 460-471.

  14. 14.

    Slagell A: Known plaintext attack against a permutation based video encryption algorithm. 2002.

  15. 15.

    Wu C-P, Kuo C-CJ: Fast encryption methods for audiovisual data confidentiality. Symposium on Photonics East, Voice, Video, and Data Communication, October 2001, Ottawa, Canada, Proceedings of SPIE 4209: 284-295.

  16. 16.

    Wu C-P, Kuo C-CJ: Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 2005, 7(5):828-839.

  17. 17.

    Xie D, Kuo C-CJ: Efficient multimedia data encryption based on flexible QM coder. Security, Steganography, and Watermarking of Multimedia Contents VI, January 2004, San Jose, Calif, USA, Proceedings of SPIE 5306: 696-704.

  18. 18.

    Grangetto M, Magli E, Olmo G: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 2006, 8(5):905-917.

  19. 19.

    Wen JG, Kim H, Villasenor JD: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 2006, 13(2):69-72.

  20. 20.

    Kim H, Wen J, Villasenor JD: Secure arithmetic coding. IEEE Transactions on Signal Processing 2007, 55(5):2263-2272.

  21. 21.

    Bose R, Pathak S: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Transactions on Circuits and Systems I 2006, 53(4):848-857.

  22. 22.

    Xie D, Kuo C-CJ: Multimedia data encryption via random rotation in partitioned bit streams. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 5: 5533-5536.

  23. 23.

    Zhou J, Liang Z, Chen Y, Au OC: Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Processing Letters 2007, 14(3):201-204.

  24. 24.

    Menezes AJ, van Oorschot PC, Vanstone SA: Handbook of Applied Cryptography. CRC Press, Boca Raton, Fla, USA; 1996.

  25. 25.

    Witten IH, Cleary JG: On the privacy afforded by adaptive text compression. Computers and Security 1988, 7(4):397-408. 10.1016/0167-4048(88)90580-9

  26. 26.

    Bergen HA, Hogan JM: Chosen plaintext attack on an adaptive arithmetic coding compression algorithm. Computers and Security 1993, 12(2):157-167. 10.1016/0167-4048(93)90099-Q

  27. 27.

    Cleary JG, Irvine SA, Rinsma-Melchert I: On the insecurity of arithmetic coding. Computers and Security 1995, 14(2):167-180. 10.1016/0167-4048(95)97050-K

  28. 28.

    Lim J, Boyd C, Dawson E: Cryptanalysis of adaptive arithmetic coding encryption scheme. The 2nd Australasian Conference on Information Security and Privacy, July 1997, Tokyo, Japan 216-227.

Download references

Author information

Correspondence to Dahua Xie.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and Permissions

About this article


  • Entropy
  • Encryption Scheme
  • Security Analysis
  • Data Compression
  • Data Security