We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study

by Ajay Kulkarni, Saurabh Kulkarni, Ketki Haridas, Aniket More
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 1
Year of Publication: 2013
Authors: Ajay Kulkarni, Saurabh Kulkarni, Ketki Haridas, Aniket More
10.5120/10885-5777

Ajay Kulkarni, Saurabh Kulkarni, Ketki Haridas, Aniket More . Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study. International Journal of Computer Applications. 65, 1 ( March 2013), 1-5. DOI=10.5120/10885-5777

@article{ 10.5120/10885-5777,
author = { Ajay Kulkarni, Saurabh Kulkarni, Ketki Haridas, Aniket More },
title = { Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 1 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number1/10885-5777/ },
doi = { 10.5120/10885-5777 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:29.976035+05:30
%A Ajay Kulkarni
%A Saurabh Kulkarni
%A Ketki Haridas
%A Aniket More
%T Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 1
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing multimedia data has become of utmost importance especially in the applications related to military purposes. With the rise in development in computer and internet technology, multimedia data has become the most convenient method for military training. An innovative encryption algorithm for videos compressed using H. 264 was proposed to safely exchange highly confidential videos. To maintain a balance between security and computational time, the proposed algorithm shuffles the video frames along with the audio, and then AES is used to selectively encrypt the sensitive video codewords. Using this approach unauthorized viewing of the video file can be prevented and hence this algorithm provides a high level of security. A comparative study of the proposed algorithm with other existing algorithms has been put forward in this paper to prove the effectiveness of the proposed algorithm.

References
  1. S. Lian, Multimedia Content Encryption: Techniques and Application, CRC, 2008.
  2. C. -P. Wu, C. -C. J. Kuo, "Design of integrated multimedia compression and encryption systems", IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828-839, 2005.
  3. Adam J. Slagell. Known-Plaintext Attack Against a Permutation Based VideoEncryption Algorithm. Available from http://eprint. iacr. org/2004/011. pdf.
  4. L. Tang, For encrypting and decrypting MPEG video data efficiently," in Proceedings of The Fourth ACM Intl. Multimedia Conference (ACM Multimedia), (Boston, MA), pp. 219-230, November 1996.
  5. T. B. Maples and G. A. Spanos, "Performance study of selective encryption scheme for the security of networked real-time video," in Proceedings of the 4th International Conference on Computer and Communications, Las Vegas, NV, 1995.
  6. C. Bergeron and C. Lamy-Bergot, "Compliant Selective Encryption for H. 264/AVC Video Streams," in Proceedings of the 7th IEEE Workshop on Multimedia Signal Processing ,2005, pp. 1–4.
  7. Shiguo Lian, Zhongxuan Liu, Zhen Ren and Haila Wang, "Secure Advanced Video Coding Based on Selective Encryption Algorithms," IEEE Transaction on Consumer Electronics, Vol. 52, No. 2 ,2006, pp. 621-629.
  8. S. Lian, X. Wang, J. Sun, and Z. Wang, "Perceptual Cryptography on Wavelet Transform Encoded Videos, "in Proceedings of IEEE International. Symposium on Intelligent Multimedia, Video and Speech Processing, 2004, pp. 57-60.
  9. S. Lian, J. Sun, and Z. Wang, "Perceptual Cryptography on SPIHT Compressed Images and Videos, "in Proceedings of IEEE International Conference on Multimedia and Expo,2004, Vol. 3, pp. 57-60.
  10. S. Lian, "Perceptual Cryptography on JPEG2000 Compressed Images or Videos, " in Proceedings of International Conference on Computer and Information Technology, IEEE Consumer Society, 2004, pp. 78-83.
  11. Shunjun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, and Kwok-Tung Lo, "On the Design of Perceptual MPEG Video Encryption Algorithm", IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, No. 2, 2007, pp. 214-223.
Index Terms

Computer Science
Information Sciences

Keywords

H. 264 encryption shuffle video codewords AES