Blockchain enabled dual level security scheme with spiral shuffling and hashing technique for secret video transmission

IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS International Journal on Information Technologies and Security Pub Date : 2023-06-01 DOI:10.59035/ubsn9044
PL. Chithra, R. Aparna
{"title":"Blockchain enabled dual level security scheme with spiral shuffling and hashing technique for secret video transmission","authors":"PL. Chithra, R. Aparna","doi":"10.59035/ubsn9044","DOIUrl":null,"url":null,"abstract":"In the modern digital era, data is considered to be the most valuable asset. Multimedia data includes audio, image and video forms which grabs attention and vulnerable for hacking. Transmission of multimedia data in open network is always unsecure. In this research paper, a novel method to transmit secret video is proposed. First, keyframes are detected by processing the ROI (region of interest) to classify segments. Spiral Shuffling and SHA512 hashing technique are applied to build the cipher blocks. Blockchain technique enhances strength of the Dual Level (Crypto-Stegano) Security Scheme. Discrete cosine transformation with normalization is applied to embed cipher blocks in audio files without any traces of hidden data. Combining the major security techniques such as Cryptography, Steganography and Blockchain enhances the strength of the proposed BDLSS (Blockchain enabled Dual Level Security Scheme). Experimental analysis is carried out with PSNR, SSIM, MSE, NPCR and Correlation coefficient values to prove the efficiency and the proposed method outperforms well over existing methods.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal on Information Technologies and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59035/ubsn9044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In the modern digital era, data is considered to be the most valuable asset. Multimedia data includes audio, image and video forms which grabs attention and vulnerable for hacking. Transmission of multimedia data in open network is always unsecure. In this research paper, a novel method to transmit secret video is proposed. First, keyframes are detected by processing the ROI (region of interest) to classify segments. Spiral Shuffling and SHA512 hashing technique are applied to build the cipher blocks. Blockchain technique enhances strength of the Dual Level (Crypto-Stegano) Security Scheme. Discrete cosine transformation with normalization is applied to embed cipher blocks in audio files without any traces of hidden data. Combining the major security techniques such as Cryptography, Steganography and Blockchain enhances the strength of the proposed BDLSS (Blockchain enabled Dual Level Security Scheme). Experimental analysis is carried out with PSNR, SSIM, MSE, NPCR and Correlation coefficient values to prove the efficiency and the proposed method outperforms well over existing methods.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
区块链支持双级安全方案,采用螺旋洗牌和哈希技术进行秘密视频传输
在现代数字时代,数据被认为是最有价值的资产。多媒体数据包括音频、图像和视频等形式,容易引起人们的注意,容易被黑客攻击。在开放网络中传输多媒体数据是不安全的。本文提出了一种新的秘密视频传输方法。首先,通过处理感兴趣区域(ROI)来检测关键帧并对片段进行分类。采用螺旋洗牌和SHA512哈希技术构建密码块。区块链技术增强了双级(Crypto-Stegano)安全方案的强度。采用归一化离散余弦变换将密码块嵌入音频文件中,不留下任何隐藏数据的痕迹。结合主要的安全技术,如密码学、隐写术和区块链,增强了提议的BDLSS(区块链启用双级安全方案)的强度。用PSNR、SSIM、MSE、NPCR和相关系数值进行了实验分析,证明了该方法的有效性,并且优于现有方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
66.70%
发文量
0
期刊最新文献
Low-Traffic Aware Hybrid MAC (LTH-MAC) Protocol for Wireless Sensor Networks Development of a neural network model of an intelligent monitoring agent based on a recurrent neural network with a long chain of short-term memory elements A smart parking system combining IoT and AI to address improper parking Kali Linux – a simple and effective way to study the level of cyber security and penetration testing of power electronic devices Enhancing autism severity prediction: A fusion of convolutional neural networks and random forest model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1