Chaotic Maps Based Video Encryption: A New Approach

Wessam M. Salama, M. Aly
{"title":"Chaotic Maps Based Video Encryption: A New Approach","authors":"Wessam M. Salama, M. Aly","doi":"10.1109/ICCTA54562.2021.9916605","DOIUrl":null,"url":null,"abstract":"This study proposes a new encryption method for safe video transmission. The approach introduced in this paper is based on MPEG-2 compression and several chaotic maps. The Arnold map is used to encrypt an explicit chosen frame, which is then XORed with the encrypted video frames produced by the Skew Tent map. This map achieves high performance and low time consuming. Furthermore, bit shifts of pixel values are utilized to produce a more uniform histogram for the encrypted video, improve the encryption scheme’s speed, and boost security. To reduce processing time before the encryption process begins, the row vector method is applied. According to the experimental results, the encrypted video exhibits low correlation coefficients between adjacent pixels, excellent entropy, a decent histogram, a low time consumption, and resistance to differential assaults, additive noise, and cropping attacks. The average correlation coefficients between pixels are obtained as -0.0133, -0.0155 and 0.0037 for horizontal, vertical and diagonal components for foreman frame. Moreover, the entropy for the encrypted foremen frame is 7.3348. Furthermore, the processing time 0.7015 s and 1.81 s, respectively, for encryption and decryption.","PeriodicalId":258950,"journal":{"name":"2021 31st International Conference on Computer Theory and Applications (ICCTA)","volume":"28 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 31st International Conference on Computer Theory and Applications (ICCTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTA54562.2021.9916605","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

This study proposes a new encryption method for safe video transmission. The approach introduced in this paper is based on MPEG-2 compression and several chaotic maps. The Arnold map is used to encrypt an explicit chosen frame, which is then XORed with the encrypted video frames produced by the Skew Tent map. This map achieves high performance and low time consuming. Furthermore, bit shifts of pixel values are utilized to produce a more uniform histogram for the encrypted video, improve the encryption scheme’s speed, and boost security. To reduce processing time before the encryption process begins, the row vector method is applied. According to the experimental results, the encrypted video exhibits low correlation coefficients between adjacent pixels, excellent entropy, a decent histogram, a low time consumption, and resistance to differential assaults, additive noise, and cropping attacks. The average correlation coefficients between pixels are obtained as -0.0133, -0.0155 and 0.0037 for horizontal, vertical and diagonal components for foreman frame. Moreover, the entropy for the encrypted foremen frame is 7.3348. Furthermore, the processing time 0.7015 s and 1.81 s, respectively, for encryption and decryption.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于混沌映射的视频加密新方法
本研究提出了一种新的安全视频传输加密方法。本文介绍的方法是基于MPEG-2压缩和几个混沌映射。Arnold地图用于加密显式选择的帧,然后将其与歪斜帐篷地图生成的加密视频帧进行xor。此映射实现了高性能和低耗时。此外,利用像素值的位移位为加密视频生成更均匀的直方图,提高了加密方案的速度,提高了安全性。为了减少加密过程开始前的处理时间,应用了行向量方法。实验结果表明,该加密视频具有相邻像素间相关系数低、熵值高、直方图性能好、耗时短、抗差分攻击、加性噪声和裁剪攻击等特点。工头框架的水平、垂直和对角线分量的像素间平均相关系数分别为-0.0133、-0.0155和0.0037。加密后的工头帧的熵为7.3348。加密和解密的处理时间分别为0.7015 s和1.81 s。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Laser Odometry for Agricultural Environment Based on Point Cloud Intensity and Covariance Tuberculosis Detection from Chest Radiographs with Pre-trained Deep Learning Scheme: A Study Keynote Speech 3: Collaboration of Cloud, Fog and Mist Computing for Real-Time Applications: Resource Allocation and Scheduling Challenges Chaotic Maps Based Video Encryption: A New Approach Arabic Language Sentiment Analysis Using Feature Engineering and Deep Learning RNN-LSTM Framework
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1