The Video Encryption Scheme Based on Perceptual Encryption Algorithm in H.264 Standards

2013 ◽  
Vol 765-767 ◽  
pp. 615-619
Author(s):  
Xue Yan Zhang ◽  
Hu Chao Deng ◽  
Liang Wei Chen

To meet the requirement of multimedia video transmission's safety and real-time, this paper provides a conclusion based on video encryption schemes of the encryption algorithm. The solution sorts video data into VLC(variable length code) and FLC(fix-length code) ,only choose to reconstruction images FLC compared to encrypt the important element of the operation. The analysis and the simulation results show that the encryption scheme is not only high safety but also low cost system.

Symmetry ◽  
2020 ◽  
Vol 12 (3) ◽  
pp. 332 ◽  
Author(s):  
Shuli Cheng ◽  
Liejun Wang ◽  
Naixiang Ao ◽  
Qingqing Han

The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information. We propose an encryption scheme that can protect video information with higher security by combining the video coding algorithm with encryption algorithm. The H.264/AVC encoding algorithm encodes the video into multiple slices, and the slices are independent of each other. With this feature, we encrypt each slice while using the cipher feedback (CFB) mode of the advanced encryption standard (AES) with the dynamic key. The key is generated by the pseudo-random number generator (PRNG) and updated in real time. The encryption scheme goes through three phases: constructing plaintext, encrypting plaintext, and replacing the original bitstream. In our scheme, we encrypt the code stream after encoding, so it does not affect the coding efficiency. The purpose of the CFB mode while using the AES encryption algorithm is to maintain the exact same bit rate and produce a format compatible bitstream. This paper proposes a new four-dimensional (4-D) hyperchaotic algorithm to protect data privacy in order to further improve the security of video encryption. Symmetric encryption requires that the same key is used for encryption and decoding. In this paper, the symmetry method is used to protect the privacy of video data due to the large amount of video encrypted data. In the experiment, we evaluated the proposed algorithm while using different reference video sequences containing motion, texture, and objects.


Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


2020 ◽  
Vol 5 (2) ◽  
pp. 67-75
Author(s):  
A.A. Adenowo ◽  
L.F. Oderinu

The prevalence of internet, as well as low-cost mobile computing devices, makes video the preferred option for information archival and transmission. Also, the geometric growth in the generation and use of digital videos is massive and challenging to determine. Meanwhile, this growth has come with security and privacy issues such as unauthorized access, piracy, hacking and other digital attack every year. Restricting unauthorized access measure can be adopted to protect multimedia information, but does not guarantee the physical security of information. Cryptography which is a better and more secure approach is therefore required. Thus, this paper presents performance evaluation of Enhanced Novel Selective Video Encryption Algorithm, an AES-based video encryption algorithm. Properties of I frame are used randomly to generate the encryption key and a jump factor is used to determine which of the remaining P and B frame is selected for encryption. The results show that the more frames selected for encryption/decryption, the higher the encryption/decryption time and the higher the encrypted video size. Also, the PSNR value of this algorithm is around 40dB which indicates that the quality of the decrypted video is as high as that of the original video. The performance of this algorithm does not diminish with increase in size of video and number of frames. Hence, this algorithm is scalable, fast and highly secure for video encryption.


2015 ◽  
Vol 75 (1) ◽  
Author(s):  
Ali Abdulgader Mohamed ◽  
Mahamod Ismail ◽  
Nasharuddin Zainal

With rapid growth in communication techniques and multimedia application, security is becoming more important for multimedia data storage or transmission. Traditional encryption algorithm such as Advance Encryption Standard (AES) and Data Encryption Standard (DES) are not suitable for video data because it caused large computational overhead and reduce the MPEG compression efficiency. The encryption algorithm that has less computation overhead is needed. The proposed algorithm combines encryption process with MPEG video compression. Some modifications of the RC4 algorithm were proposed in this paper to enhance the performance of video encryption algorithm in terms of encryption time, compression ratio and to provide accepted level of the security. The modification of the RC4 algorithm depends on the maximum value of the plain text, chaotic map and circular shift operation. This modification will reduce the number of iteration in the Key scheduling Algorithm (KSA) and make the Pseudo Random Generator Algorithm (PRGA) depend on initial condition of chaotic maps to provide the strong shuffling inside the PRGA. The random rotation technique based on chaotic map is proposed to increase security of MPEG video. This technique depends on the value generated from chaotic map to rotate the Y blocks in I frame. The experimental results indicate that the proposed method provided better encryption times and provides sufficient level of the security. Thus the proposed method is suitable to protect the MPEG video with minimizing the overhead. 


2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
Shenyong Xiao ◽  
ZhiJun Yu ◽  
YaShuang Deng

Chaos has been widely used in image encryption due to its rich properties. However, it remains an irreconcilable contradiction for security and implementation efficiency for image encryption schemes. In this paper, a novel chaos-based image encryption scheme has been proposed, where the Lorenz chaotic system is applied to generate pseudorandom sequences with good randomness, and a random switch control mechanism is introduced to ensure the security of the encryption scheme. Experimental results demonstrate the effectiveness and superiority of the algorithm.


Author(s):  
Evgueni Doukhnitch ◽  
Alexander G. Chefranov ◽  
Ahmed Mahmoud

Quaternion Encryption Scheme (QES) is shown to be susceptible to the Known Plaintext-Ciphertext Attack (KPCA) due to improper choice of frame size and the procedure of secret quaternion updating. In this chapter, the authors propose a modification of the QES (M-QES) that is resistant to the KPCA. The M-QES is based on adjusting the frame size and the quaternion update procedure. An approach for effective hardware implementation of the proposed algorithm, HW-QES, is discussed. The HW-QES uses addition and shift operations. Extension of quaternion approach to another hyper-complex number systems, octonions, is used for designing a new hardware-oriented encryption algorithm, HW-OES. Experimental results show that the proposed M-QES and HW-QES are six-eight times more effective in the encryption quality of signals than the original QES. Additionally, M-QES and HW-OES are shown to be significantly more effective in the encryption quality of images than the original QES and well-known AES. The results show that the performance of the HW-QES is only 10% worse than that of QES.


Entropy ◽  
2020 ◽  
Vol 22 (1) ◽  
pp. 73 ◽  
Author(s):  
Wei Zhang ◽  
Shuwen Wang ◽  
Weijie Han ◽  
Hai Yu ◽  
Zhiliang Zhu

In graph theory, Hamiltonian path refers to the path that visits each vertex exactly once. In this paper, we designed a method to generate random Hamiltonian path within digital images, which is equivalent to permutation in image encryption. By these means, building a Hamiltonian path across bit planes can shuffle the distribution of the pixel’s bits. Furthermore, a similar thought can be applied for the substitution of pixel’s grey levels. To ensure the randomness of the generated Hamiltonian path, an adjusted Bernoulli map is proposed. By adopting these novel techniques, a bit-level image encryption scheme was devised. Evaluation of simulation results proves that the proposed scheme reached fair performance. In addition, a common flaw in calculating correlation coefficients of adjacent pixels was pinpointed by us. After enhancement, correlation coefficient becomes a stricter criterion for image encryption algorithms.


2007 ◽  
Vol 40 (11) ◽  
pp. 53
Author(s):  
BRUCE K. DIXON
Keyword(s):  
Low Cost ◽  

2020 ◽  
Vol 64 (1-4) ◽  
pp. 1381-1389
Author(s):  
Dezhi Chen ◽  
Chengwu Diao ◽  
Zhiyu Feng ◽  
Shichong Zhang ◽  
Wenliang Zhao

In this paper, a novel dual-stator permanent magnet machine (DsPmSynM) with low cost and high torque density is designed. The winding part of the DsPmSynM adopts phase-group concentrated-coil windings, and the permanent magnets are arranged by spoke-type. Firstly, the winding structure reduces the amount of copper at the end of the winding. Secondly, the electromagnetic torque ripple of DsPmSynM is suppressed by reducing the cogging torque. Furthermore, the dynamic performance of DsPmSynM is studied. Finally, the experimental results are compared with the simulation results.


Sign in / Sign up

Export Citation Format

Share Document