Affiliation:
1. Delta University for Science and Technology
Abstract
Abstract
The massive growth and use of digital multimedia through computer networks, including video and images, has increased the demand for protecting this digital data. In order to secure digital video, video encryption is frequently utilized. In this paper, a brand-new video scrambling technique based on two chaotic linearly symmetric maps and one chaotic tent map that has been twisted is suggested. The permutation procedure moves every frame pixel's position using a P-box created by permuting a linearly symmetric chaotic sequence. The diffusion technique employs both linearly symmetric chaos maps and distorted tent maps to create key streams. The keystream closely resembles simple frames because the pixels in the permuted frame indicate which of the two even symmetric chaos maps is replicated each time for the following byte. The information entropy, histogram, neighboring pixel correlation and sensitivity analysis, number of pixel changing regions (NPCR), and unified mean change intensity are used to thoroughly evaluate the recommended method's capacity to improve performance and security (UACI). Comparatively to other methods, the suggested algorithm is resistant to clipping, salt and pepper noise, speckle noise rotation assaults, and clipping. This positive outcome indicates that the plan can be successfully implemented for secure video communication applications.
Publisher
Research Square Platform LLC
Reference26 articles.
1. 1. K.C. Murthy, M. V. Mandi, R. Murali, “Binary sequence using chaotic map for cryptogrphic applications”, matrialstoday: proceedings, Elsevier, 2020, https://doi.org/10.1016/j.matpr.2020.11.088
2. 2. F. Liu, H. Koenig, “A survey of video encryption algorithms”, Computers & Security, Elsevier, 2010, Vol. 29, pp. 3–15.
3. 3. J. Yun, M. Kim,” JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things”, sensors, MDPI, 2020, vol. 20.
4. 4. M. Habib, T. P. Mee, “Encryption of MPEG Video Streams”, TENCON 2006–2006 IEEE Region 10 Conference, 1–4, Hong Kong, China.
5. 5. F. Liu, H. Koenig, “A survey of video encryption algorithms”, Computers & Security, Elsevier, 2010, Vol. 29, pp. 3–15.