A Light Chaotic Encryption Algorithm for Real-Time Video Encryption

Author(s):  
Beisheng Liu ◽  
Xiaodong Li ◽  
Haoyang Yu ◽  
Jianwen Lv
Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


2016 ◽  
Vol 45 ◽  
pp. 297-309 ◽  
Author(s):  
M.A. Murillo-Escobar ◽  
C. Cruz-Hernández ◽  
F. Abundiz-Pérez ◽  
R.M. López-Gutiérrez

2018 ◽  
Vol 8 (7) ◽  
pp. 1183 ◽  
Author(s):  
Carlos Villaseñor ◽  
Eric Gutierrez-Frias ◽  
Nancy Arana-Daniel ◽  
Alma Alanis ◽  
Carlos Lopez-Franco

Hyperspectral images (HI) collect information from across the electromagnetic spectrum, and they are an essential tool for identifying materials, recognizing processes and finding objects. However, the information on an HI could be sensitive and must to be protected. Although there are many encryption schemes for images and raw data, there are not specific schemes for HI. In this paper, we introduce the idea of crossed chaotic systems and we present an ad hoc parallel crossed chaotic encryption algorithm for HI, in which we take advantage of the multidimensionality nature of the HI. Consequently, we obtain a faster encryption algorithm and with a higher entropy result than others state of the art chaotic schemes.


Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3627 ◽  
Author(s):  
Junhyeok Yun ◽  
Mihui Kim

Along with the recent growth of Internet of Things (IoT) security camera market, there have been a number of personal information leakage incidents from security attacks targeting such cameras. Therefore, a permutation-based video encryption algorithm was proposed to secure video streams in low-performance processors such as IoT security cameras. However, existing permutation-based video encryption algorithms are vulnerable to known-plaintext attacks since they use the same permutation list for every frame. Moreover, situation deduction based on the color composition is possible. In this paper, we propose a new permutation-based video encryption algorithm that updates the permutation list for every frame using a crypto secure pseudo-random number generator without significantly increasing memory usage. By doing so, the algorithm becomes robust to known-plaintext attacks, which has been a common problem with existing permutation-based video encryption algorithms. In addition, color channel separation can prevent attackers from deducing situations through color composition. Pre-compression encryption is applied to make the algorithm robust to data loss because of packet loss. We implement the proposed algorithm and conduct an experiment to show its performance in terms of probability of data loss because of packet loss, encryption speed, and memory usage.


2013 ◽  
Vol 765-767 ◽  
pp. 615-619
Author(s):  
Xue Yan Zhang ◽  
Hu Chao Deng ◽  
Liang Wei Chen

To meet the requirement of multimedia video transmission's safety and real-time, this paper provides a conclusion based on video encryption schemes of the encryption algorithm. The solution sorts video data into VLC(variable length code) and FLC(fix-length code) ,only choose to reconstruction images FLC compared to encrypt the important element of the operation. The analysis and the simulation results show that the encryption scheme is not only high safety but also low cost system.


Author(s):  
Bo Liu ◽  
Jiandong Liu ◽  
Shuhong Wang ◽  
Ming Zhong ◽  
Bo Li ◽  
...  

A selective encryption algorithm is proposed to improve the efficiency of high efficiency video coding (HEVC) video encryption and ensure the security of HEVC videos. The algorithm adopts the integer dynamic coupling tent mapping optimization model as the pseudo-random sequence generator, and multi-core parallelization is used as the sequence generation mechanism. The binstrings during the process of context adaptive binary arithmetic coding are selected for encryption, which conforms to the features of invariable binstream and compatible format in terms of video encryption. Performance tests for six types of standard videos with different resolutions were performed. The results indicated that the encryption algorithm has a large key space and benefits from a high encryption effect.


Sign in / Sign up

Export Citation Format

Share Document