CFP last date
20 December 2024
Reseach Article

Lossless Encryption for Color video using a Binary Key-Image

Published on March 2014 by Swati G. Devakate, S. M. Mukane
Emerging Trends in Electronics and Telecommunication Engineering 2013
Foundation of Computer Science USA
NCET - Number 1
March 2014
Authors: Swati G. Devakate, S. M. Mukane
56843787-0390-40cf-a177-fc7f8c104bcb

Swati G. Devakate, S. M. Mukane . Lossless Encryption for Color video using a Binary Key-Image. Emerging Trends in Electronics and Telecommunication Engineering 2013. NCET, 1 (March 2014), 9-12.

@article{
author = { Swati G. Devakate, S. M. Mukane },
title = { Lossless Encryption for Color video using a Binary Key-Image },
journal = { Emerging Trends in Electronics and Telecommunication Engineering 2013 },
issue_date = { March 2014 },
volume = { NCET },
number = { 1 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/ncet/number1/15648-1411/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Electronics and Telecommunication Engineering 2013
%A Swati G. Devakate
%A S. M. Mukane
%T Lossless Encryption for Color video using a Binary Key-Image
%J Emerging Trends in Electronics and Telecommunication Engineering 2013
%@ 0975-8887
%V NCET
%N 1
%P 9-12
%D 2014
%I International Journal of Computer Applications
Abstract

The science of cryptography has recently attracted significant attention, as more information is stored and transmitted in electronic form. Cryptography is the discipline of using codes to encrypt data into an unreadable format that only the targeted recipient can decrypt and read. Lossless Encryption for Color video using a Binary Key-image. The condition, the key image size is either same or less than the original images. The key image is either a bit plane or an edge map generated from another image. The lossless image encryption algorithms using this key image technique. The key is selected to the grayscale image for new/existing grayscale image and the key is selected to the color image for new/existing color image of video. The code is done in both grayscale and color images using lossless encryption algorithms. The execution of these algorithms is discussed against common attacks such as the plaintext attacks, brute force attack and cipher text attacks. The security analysis and experimental results show that the proposed algorithms can fully encrypt all types of images of video. This makes them suitable for securing video surveillance systems, multimedia applications and real-time applications such as mobile phone services.

References
  1. National Institute of Standards and Technology, "Data Encryption Standard (DES)," http://csrc. nist. gov/publications/fips/fips46-3/fips46- 3. pdf, 1999.
  2. National Institute of Standards and Technology, "Advanced Encryption Standards (AES)," http://csrc. nist. gov/publications/fips/fips197/fips-197. pdf, 2001.
  3. Image Encryption by Using Pixel Value Rotation Honnaraju B, Manoj Kumar M,Shiva Sumanth Reddy.
  4. R. Gopinath and M. Sowjanya, M. tech. Student, Sri Indu College of Engineering & Technology, Hyderabad and Associate Professor, Sri Indu College of Engineering & Technology, Hyderabad, "Image Encryption For Color Images Using Bit Plane And Edge Map Cryptography Algorithm", International Journal of Engineering Research & Technology (IJERT). Vol. 1 Issue 8, October – 2012.
  5. Riccardo Lazzeretti, Mauro Barni, "Lossless compression of encrypted grey-level and color images", Department of Information Engineering (University of Siena)
  6. Sara Tedmori and Nijad Al-Najdawi, "Lossless image cryptography algorithm based on DCT", The International Arab Journal of Information Technology.
  7. Simhadri Kollu and P. Soundarya, " Lossless Encryption for Color Images using a Binary Key-image", simhadri kollu international journal of advanced engineering sciences and technologies vol no. 9, issue no. 2, 314 – 321.
  8. Mu Li, Student Member, IEEE, and Vishal Monga, Member, IEEE, "Robust Video Hashing via Multilinear Subspace Projections", IEEE transactions on image processing, vol. 21, no. 10, october 2012.
  9. Mani Malek Esmaeili, Mehrdad Fatourechi, and Rabab Kreidieh Ward, Fellow, IEEE, "A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting", IEEE Transactions on information forensics and security, vol. 6, no. 1, march 2011.
  10. Tzuo-Yau Fan Bin-Chang Chieu and Her-Chang Chao, "Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques" , National Taiwan University of Science and Technology Department of Electronic Engineering Taipei, Taiwan.
  11. Shujun Li, Guanrong Chen, Fellow, IEEE, Albert Cheung, Member, IEEE, Bharat Bhargava, Fellow, IEEE and Kwok-Tung Lo, Member, IEEE, "On the Design of Perceptual MPEG-Video Encryption Algorithms", IEEE transactions on circuits and systems for video technology, vol. 17, no. 2, pages 214-223, february 2007.
  12. Tzuo-Yau Fan Bin-Chang Chieu and Her-Chang Chao," Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques" National Taiwan University of Science and Technology Department of Electronic Engineering Taipei, Taiwan, Journal of Electronic Imaging 21(4), 043018 (Oct–Dec 2012)
  13. Mani Malek Esmaeili, Mehrdad Fatourechi, and Rabab Kreidieh Ward," A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting", IEEE transactions on information forensics and security, vol. 6, no. 1, march 2011.
  14. "The Essential guide to video processing" by AL BOVIK.
  15. Sunil Lee and Chang D. Yoo," Robust Video Fingerprinting for Content-Based Video Identification", IEEE transactions on circuits and systems for video technology, vol. 18, no. 7, july 2008. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
Index Terms

Computer Science
Information Sciences

Keywords

Lossless Video Encryption Key-image Plaintext Attack Brute Force Attack Ciphertext Attack Bit Plane Edge Map.