CFP last date
20 December 2024
Reseach Article

A Novel Approach of Digital Video Encryption

by Mayank Arya Chandra, Ravindra Purwar, Navin Rajpal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 4
Year of Publication: 2012
Authors: Mayank Arya Chandra, Ravindra Purwar, Navin Rajpal
10.5120/7619-0673

Mayank Arya Chandra, Ravindra Purwar, Navin Rajpal . A Novel Approach of Digital Video Encryption. International Journal of Computer Applications. 49, 4 ( July 2012), 38-42. DOI=10.5120/7619-0673

@article{ 10.5120/7619-0673,
author = { Mayank Arya Chandra, Ravindra Purwar, Navin Rajpal },
title = { A Novel Approach of Digital Video Encryption },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 4 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number4/7619-0673/ },
doi = { 10.5120/7619-0673 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:27.246002+05:30
%A Mayank Arya Chandra
%A Ravindra Purwar
%A Navin Rajpal
%T A Novel Approach of Digital Video Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 4
%P 38-42
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the recent years with the development of internet technologies, video technologies have been broadly used in TV, communication and multimedia, So security is required on video data. Although much video encryption technique has been develop but not give so much efficiency in terms of encryption and decryption process. However, they are more complex to implement as a system and are difficult to be applied in a widespread manner. Here we propose a new novel scheme for digital video encryption. In this paper we give a method to generate an encrypted video by encrypted Video-frame. Based on novel secure video scheme, an effective and generalized scheme of video encryption. It is a matrix computation scheme which uses a concept of Video-frame and xor(?) operation. This paper proves that proposed scheme is able to fully encrypt the video frame and have a better performance that can be measured by different Parameters. Further we can extend our approach into a digital video stenography.

References
  1. Tuchman W. : A brief history of the data encryption standard. ACM Press Addison-Wesley Publishing Co. , New York (1997))
  2. Zeghid, M. , Machhout, M. , Khriji, L. , Baganne, A. , et al. : A modified AES based algorithm for image encryption. International Journal of Computer Science and Engineering 1 (1), 70…75(2007).
  3. Cormen, T. H. , Leiserson, C. E. , Rivest, R. L. , Stein, C. : Introduction to algorithms, 2ndedn. MITPress, McGraw-Hill,Cambridge(2001)
  4. Y. Zhou, S. Agaian, V. M. Joyner, and K. Panetta, "Two Fibonacci P- code based image scrambling algorithms," in Image Processing: Algorithms and Systems VI, San Jose, CA, USA, 2008, pp. 681215-12.
  5. D. Socek, H. Kalva, O. Marques, D. Culibrk, B. Furht : "New Approaches to encryption and steganography for digital videos", Multimedia Systems DOI10. 1007/s00530-007-0083-z,Springer-Verlag 2007.
  6. Devaney, R. L. :An introduction to chaotic dynamical systems, 2nd edn. West- view Press, San Francisco (2003).
  7. Alligood, K. T. , Sauer, T. , Yorke, J. A. : Chaos: an introduction to dynamical systems. Springer, Heidelberg (1997).
  8. Yang, T. , Wu, C. W. , Chua, L. O. : Cryptography based on chaotic systems. IEEE Transactionson Circuits and Systems-I : Fundamental Theory and Applications 44, 469…472 (1997).
  9. Solak, E. : Cryptanalysis of observer based discrete-time chaotic encryption schemes. International Journal of Bifurcation and Chaos 15 (2), 653…658 (2005).
  10. He, J. , Qian, H. , Zhou, Y. , Li, Z. : Cryptanalysis and improvement of a block cipher based on multiple chaotic systems. Mathematical Problems in Engineering 2010,1…14 (2010).
  11. Yicong Zhou, Karen Panetta, Sos Agaian "Image Encryption Using Binary Key-images" Proceedings of the 2009 IEEE International Conference on Systems Man and Cybernetics San Antonio TX, USA-October 2009.
  12. Tzouveli Paasikivi, Ntalianis Klimis, Kollias Stefanos "Security of Human Video Objects by Incorporating a Chaos-Based Feedback Cryptographic Scheme".
  13. Daniel Socek,Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht "New approaches to encryption and steganography for digital videos" Springer-Verlag 2007.
  14. MPEG. (1988). The MPEG Home Page. Retrieved Jan 13, 2009, from http://www. chiariglione. org/mpeg/
  15. Agi, I. , & Gong, L. (1996). An emprical study of MPEG video transmissions. Proceedings of The Internet Society Symposium on Network and Distributed System Security (SNDSS 96) , 137. 144.
  16. Salah, A. (2003). A Light-Weight Encrypting For Real Time Video Transmission. Retrieved Nov 2008, 22, from http://www. cdm. depaul. edu/legacy/checksite. aspx?oldUrl=http://www. cdm. depaul. edu/research/Documents/TechnicalReports/2004/TR04-002. pdf
  17. Habib Mir M. , H. , & Pong Mee, T. (2006). Encryption of MPEG Video Streams. 2006 IEEE Region 10 Conference TENCON 2006. 1-4. Hong Kong, China.
  18. Tang, L. (1996). For encrypting and decrypting MPEG video data e±ciently. in Proceedings of The Fourth ACM International Multimedia Conference (ACM Multimedia'96), (Bosten, MA). 219-230.
  19. Gulistan, R. , & Muhammad, J. M. (2004). Performance Comparison of Advanced Video Coding H. 264 Standard with Baseline H. 263 and H. 263+ Standards. IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004. 743-746
  20. Ashrux, G. , & Chong, M. N. (1997). Performance analysis of H. 261 and H. 263 video coding algorithms . Proceedings of IEEE International Symposium on Consumer Electronics (ISCE '97), 153-156.
  21. Karel, R. (1996). H. 263: video coding for low-Bit-Rate Communication. IEEE Communications Magazine, Volume: 34, Issue: 12. 42 - 45.
  22. Sikora, T. (1997). MPEG digital video-coding standards. MPEG digital video-coding standards , Pp 82 - 100.
  23. Morris, O. (1995). MPEG-2: where did it come from and what is it? IEE Colloquium on MPEG- 2 - What it is and What it isn't. 1-5 . 143
  24. Adolfo, R. , David, K. F. , & Steven, C. B. (1996 Jule). MPEG-2 Fundamentals for Broadcast and Post-Production Engineers. A Video and Networking Division White Paper, 1-21.
  25. Atul, P. , & Alexandros, E. (1998). MPEG-4: An object-based multimedia coding standard supporting mobile applications. Mobile Networks and Applications 3, 5-32.
  26. MPEG-4. (2002). Overview of the MPEG-4 Standard. Retrieved JAN 02, 2009, from http://www. chiariglione. org/mpeg/standards/mpeg-4/mpeg-4. htm.
  27. Cheng, H. , & Li. (2000). Partial encryption of compressed images and videos. IEEE Transactions on signal processing, 2439-2451
  28. Olivier, A. , & Philippe, S. (2001). MPEG-7 Systems: overview. IEEE Transactions on Circuits and Systems for Video Technology. 760-764.
  29. Martínez, J. M. (2002). Standards - MPEG-7 overview of MPEG-7 description tools, part 2. IEEE Multimedia,Volume : 9, Issue:3. 83 - 93 .
  30. Atul, P. , Xuemin Chen, & Ajay Luthra (2004). „Video coding using the H. 264/MPEG-4 AVC compression standard. Signal Processing: Image Communication 19, 793–849.
  31. Othman, 0. K. , Islam, M. , Khan, S. , & Shebani, M. (2004). Communications Cryptography. RF and Microwave Conference, (RFM 2004). Proceedings. 220- 223.
  32. Kessler, G. C. (1998). An Overview of Cryptography. Retrieved 20 Des, 2008, from http://www. garykessler. net/library/crypto. html#intro.
  33. David, K. (1980). Cryptology goes public. IEEE Communications Magazine, 19- 28.
  34. White, B. (2003). Cisco Security+ Certification: Exam Guide. McGraw-Hill.
  35. Harris, S. (2007). CISSP® All-in-One Exam Guide. McGraw-Hill.
  36. Federal Information processing standand. (1999). Data Encryption Standard (DES). Retrieved Des 20, 2008, from http://csrc. nist. gov/publications/fips/fips46-3/fips46-3. pdf.
  37. Whitfield, D. , & Hellman, E. M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory. 644--654.
  38. Agi and L. Gong. An empirical study of MPEG video transmission. In Proc. of the Internet Society Symposium on Network and Distributed Systems Security, pages 137–144,1996.
  39. T. B. Maples and G. A. Spanos. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In Proc. of Fourth International Workshop on Multimedia Software Development '96), 1995.
  40. L. Qiao and K. Nahrstedt. A new algorithm for MPEG video encryption. In Proc. of First International Conference on Imaging Science System and Technology, pages 21–29,1997.
Index Terms

Computer Science
Information Sciences

Keywords

video encryption video-frame security sorting formation algorithm