INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.13, No.5, Oct. 2021

Selective Video Encryption Using the Cross Coupling of One-dimensional Logistic Maps

Full Text (PDF, 515KB), PP.40-54


Views:1   Downloads:0

Author(s)

Rohit S Malladar, Sanjeev R Kunte

Index Terms

Encryption;computational complexity;JM 19.0 reference model;H.264;cross coupled logistic map

Abstract

H.264 videos have been the most shared type of video format in recent times and hence its security is a major issue. The techniques presented in the recent times incur complex computations. The major research objective is to design an efficient Chaotic Selective Video Encryption (CSVE) technique which can result in a better visual degradation of the encrypted video with less computational complexity. In the proposed work, in order to secure the H.264 videos, two one-dimensional logistic maps are cross coupled in the chaotic encryption technique which uses a lookup table for data conversion. The technique is evaluated using different performance metrics like Peak Signal to Noise Ratio (PSNR), entropy, statistical analysis etc along with the traditional logistic map. The work is compared with some recent techniques in terms of PSNR and was found out that the proposed technique has better encryption effect. 

Cite This Paper

Rohit S Malladar, Sanjeev R Kunte, "Selective Video Encryption Using the Cross Coupling of One-dimensional Logistic Maps", International Journal of Computer Network and Information Security(IJCNIS), Vol.13, No.5, pp.40-54, 2021. DOI: 10.5815/ijcnis.2021.05.04

Reference

[1]J. Yun and M. Kim, “JLVEA: Lightweight real-time video stream encryption algorithm for internet of things,” Sensors (Switzerland), vol. 20, no. 13, pp. 1–14, 2020, doi: 10.3390/s20133627.

[2]H. K. Arachchi, X. Perramon, S. Dogan, and A. M. Kondoz, “Adaptation-aware encryption of scalable H.264/AVC video for content security,” Signal Process. Image Commun., vol. 24, no. 6, pp. 468–483, 2009, doi: 10.1016/j.image.2009.02.004.

[3]S. Sin Myat Than, “Secure Data Transmission in Video Format Based on LSB and Huffman Coding,” Int. J. Image, Graph. Signal Process., vol. 12, no. 1, pp. 10–17, 2020, doi: 10.5815/ijigsp.2020.01.02.

[4]H. Xu, X. Tong, Z. Wang, M. Zhang, Y. Liu, and J. Ma, “Robust video encryption for H . 264 compressed bitstream based on cross ‑ coupled chaotic cipher,” Multimed. Syst., no. 0123456789, 2020, doi: 10.1007/s00530-020-00648-7.

[5]Md. Minhaz Ur Rahman, Mahmudul Hasan Robin, Abu Mohammad Taief, " A New Framework for Video- based Frequent Iris Movement Analysis towards Anomaly Observer Detection", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.13, No.1, pp. 13-27, 2021.DOI: 10.5815/ijigsp.2021.01.02.

[6]M. S. Baptista, “Cryptography with chaos,” Phys. Lett. Sect. A Gen. At. Solid State Phys., vol. 240, no. 1–2, pp. 50–54, 1998, doi: 10.1016/S0375-9601(98)00086-3.

[7]A. Shifa et al., “MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos,” IEEE Access, vol. 8, pp. 177131–177155, 2020, doi: 10.1109/access.2020.3024926.

[8]S. Shafiq, S. Hanif, F. U. Rehman, K. Tariq, and A. Nawaz, “Video Encryption Techniques: A Review,” Proceeding 2019 Int. Conf. Digit. Landscaping Artif. Intell. ICD 2019, pp. 174–177, 2019, doi: 10.1109/ICD47981.2019.9105707.

[9]L. Chen, N. Shashidhar, and Q. Liu, “Scalable secure MJPEG video streaming,” Proc. - 26th IEEE Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2012, pp. 111–115, 2012, doi: 10.1109/WAINA.2012.163.

[10]H. Xu, X. Tong, and X. Meng, “An efficient chaos pseudo-random number generator applied to video encryption,” Optik (Stuttg)., vol. 127, no. 20, pp. 9305–9319, 2016, doi: 10.1016/j.ijleo.2016.07.024.

[11]O. Y. Lui, C. H. Yuen, and K. W. Wong, “Chaos-based selective encryption for AVS video coding standard,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7674 LNCS, pp. 501–512, 2012, doi: 10.1007/978-3-642-34778-8_47.

[12]F. Peng, X. W. Zhu, and M. Long, “An effective selective encryption scheme for H.264 video based on chaotic Qi system,” Int. J. Digit. Crime Forensics, vol. 5, no. 2, pp. 35–49, 2013, doi: 10.4018/jdcf.2013040103.

[13]S. Li, G. Wang, Y. Wang, and Y. Ning, “Selective encryption for format compliance of MPEG based on coupled map lattice,” Proc. - 2010 3rd IEEE Int. Conf. Comput. Sci. Inf. Technol. ICCSIT 2010, vol. 6, no. 2, pp. 453–458, 2010, doi: 10.1109/ICCSIT.2010.5564070.

[14]N. Khlif, A. Masmoudi, F. Kammoun, and N. Masmoudi, “Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection,” IET Image Process., vol. 12, no. 1, pp. 42–52, 2018, doi: 10.1049/iet-ipr.2017.0022.

[15]M. Altaf, A. Ahmad, F. A. Khan, Z. Uddin, and X. Yang, “Computationally efficient selective video encryption with chaos based block cipher,” Multimed. Tools Appl., vol. 77, no. 21, pp. 27981–27995, 2018, doi: 10.1007/s11042-018-6022-5.

[16]Y. Song, Z. Zhu, W. Zhang, and H. Yu, “Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding,” Multimed. Tools Appl., vol. 78, no. 14, pp. 18967–18994, 2019, doi: 10.1007/s11042-019-7253-9.

[17]Lei, B. Y. and Lo, K. T. and Lei, Haijun, “A New H.264 Video Encryption Scheme Based on Chaotic Cipher 2,” International Conference on Communications, Circuits and Systems, (ICCCAS), pp. 373–377, 2010.

[18]S. Cheng, L. Wang, N. Ao, and Q. Han, “A selective video encryption scheme based on coding characteristics,” Symmetry (Basel)., vol. 12, no. 3, 2020, doi: 10.3390/sym12030332.

[19]X. Zhang, S. Yu, P. Chen, J. Lü, J. He, and Z. Lin, “Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption,” Nonlinear Dyn., vol. 89, no. 3, pp. 1949–1965, 2017, doi: 10.1007/s11071-017-3563-5.

[20]Erwin, Dwi Ratna Ningsih, " Improving Retinal Image Quality Using the Contrast Stretching, Histogram Equalization, and CLAHE Methods with Median Filters", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.12, No.2, pp. 30-41, 2020.DOI: 10.5815/ijigsp.2020.02.04

[21]Qiang Xiao, Liang Chen, Ya Wang, "An Efficient Dimension Reduction Quantization Scheme for Speech Vocal Parameters", International Journal of Information Technology and Computer Science(IJITCS), vol.3, vo.1, pp.18-25, 2011. DOI: 10.5815/ijitcs.2011.01.03

[22]S. Etemadi Borujeni and M. Eshghi, “Chaotic image encryption design using tompkins-paige algorithm,” Math. Probl. Eng., vol. 2009, 2009, doi: 10.1155/2009/762652.

[23]Padmavathi C, Veenadevi S.V, "An Automated Detection of CAD Using the Method of Signal Decomposition and Non Linear Entropy Using Heart Signals", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.11, No.2, pp. 30-39, 2019.DOI: 10.5815/ijigsp.2019.02.04