New video encryption schemes based on chaotic maps

被引:14
|
作者
Elkamchouchi, Hassan [1 ]
Salama, Wessam M. [2 ]
Abouelseoud, Yasmine [3 ]
机构
[1] Alexandria Univ, Fac Engn, Dept Elect Engn, Alexandria, Egypt
[2] Pharos Univ, Dept Basic Sci, Alexandria, Egypt
[3] Alexandria Univ, Fac Engn, Dept Engn Math, Alexandria, Egypt
关键词
video coding; cryptography; video streaming; data compression; new video encryption schemes; chaotic maps; transferred video streams; unauthorised access; malicious users; encryption algorithms; secure video transmission; video frames; substitution step; permutation step; diffusion requirements; secure encryption scheme; video file; authors; MPEG-2; standard; compression technique; block size; shuffling process; smaller blocks; processing time; peak-signal-to-noise ratio; encrypted frame; encryption time; different tradeoffs; secret encryption key;
D O I
10.1049/iet-ipr.2018.5250
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Two new encryption algorithms for secure video transmission are proposed in this paper. The two algorithms employ different types of chaotic maps to generate the keystream for encrypting the video frames. Both algorithms involve a substitution step and a permutation step to achieve confusion and diffusion requirements. For efficient transmission, the video file is compressed before being encrypted. In the basic implementation of both algorithms, MPEG-2 standard is used for compression. However, the algorithms are shown to be compliant with other compression techniques. In the permutation step, the effect of the block size used in the shuffling process is examined. Smaller blocks result in increasing the processing time, while reducing both the correlation between adjacent pixels and the peak-signal-to noise ratio of an encrypted frame. The use of a Feistel structure is investigated to enhance security and its negative impact on the encryption time is demonstrated. The experimental results of the two proposed schemes confirm that they represent different tradeoffs between security and computational efficiency. Both schemes are sensitive to slight variations in the encryption key as apparent from the obtained differential measures. The conducted comparative study shows the competitiveness of the proposed schemes to existing schemes in literature.
引用
收藏
页码:397 / 406
页数:10
相关论文
共 50 条
  • [1] From chaotic maps to encryption schemes
    Kocarev, L
    Jakimoski, G
    Stojanovski, T
    Parlitz, U
    [J]. ISCAS '98 - PROCEEDINGS OF THE 1998 INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-6, 1998, : C514 - C517
  • [2] A video encryption method based on chaotic maps in DCT domain
    Shuguo Yang~(a
    [J]. Progress in Natural Science:Materials International, 2008, (10) : 1299 - 1304
  • [3] A video encryption method based on chaotic maps in DCT domain
    Yang, Shuguo
    Sun, Shenghe
    [J]. PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2008, 18 (10) : 1299 - 1304
  • [4] Image encryption based on new Beta chaotic maps
    Zahmoul, Rim
    Ejbali, Ridha
    Zaied, Mourad
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 96 : 39 - 49
  • [5] A New One Round Video Encryption Scheme Based on 1D Chaotic Maps
    Kumar, R. Ranjith
    Ganeshkumar, D.
    Suresh, A.
    Manigandan, K.
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 439 - 444
  • [6] Selective Encryption of Video Using Multiple Chaotic Maps
    Varalakshmi, L. M.
    Sudha, G. Florence
    [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 164 - +
  • [7] A New Image Encryption Scheme Based on Hybrid Chaotic Maps
    Yasser, Ibrahim
    Khalifa, Fahmi
    Mohamed, Mohamed A.
    Samrah, Ahmed S.
    [J]. COMPLEXITY, 2020, 2020
  • [8] A new image encryption scheme based on hybrid chaotic maps
    Pourjabbar Kari, Ahmad
    Habibizad Navin, Ahmad
    Bidgoli, Amir Massoud
    Mirnia, Mirkamal
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 2753 - 2772
  • [9] A new image encryption scheme based on hybrid chaotic maps
    Ahmad Pourjabbar Kari
    Ahmad Habibizad Navin
    Amir Massoud Bidgoli
    Mirkamal Mirnia
    [J]. Multimedia Tools and Applications, 2021, 80 : 2753 - 2772
  • [10] Image encryption based on chaotic maps
    Fridrich, J
    [J]. SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 1105 - 1110