Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams

被引:13
作者
Shifa, Amna [1 ]
Asghar, Mamoona Naveed [1 ,2 ]
Ahmed, Adeel [1 ]
Fleury, Martin [3 ]
机构
[1] Islamia Univ Bahawalpur, Bahawalpur, Punjab, Pakistan
[2] Athlone Inst Technol, Software Res Inst, Athlone, Ireland
[3] Univ Suffolk, Sch EAST, Ipswich, Suffolk, England
关键词
Classification model; CDN; Edge servers; Fuzzy rule-based system; HEVC and H; 264; AVC codecs; Confidentiality levels; Selective encryption; DELIVERY NETWORKS CHALLENGES; AUTHENTICATION PROTOCOL; IOT DEVICES; H.264/AVC; SYSTEM; CABAC; CRYPTANALYSIS; PERFORMANCE; PROTECTION; ALGORITHM;
D O I
10.1007/s12652-020-01895-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a method to auto-detect three different confidentiality levels for videos streamed from heterogeneous, mobile devices via web edge servers, possibly part of a Content Distribution Network (CDN). The FTC consists of three parallel Fuzzy Inference Systems (FIS) corresponding to device, network, and type of video application, for the real-time, intelligent selection of an appropriate confidentiality level for a specific end-user. After selection of the level, an encryption module implements the corresponding form of encryption. In tests to demonstrate the concept, there were three increasing confidentiality levels, namely (1) low-level with no encryption, (2) Medium level with an in-house cipher [variant of eXclusive OR (XOR)], named P-XOR (XOR with additional rounds of permutation) applied to Selective Encryption (SE) and (3) high level with the Advanced Encryption Standard again for SE of compressed video syntax components. Results were obtained by considering realistic specifications of multiple digital devices, networks, and differing real-time streaming applications. Visual analysis of encrypted test video clips established that the FTC outputs an appropriate privacy level by reason of the implemented FISs. Absolute encryption times across the privacy levels were distinguished by their real-time response level, which is proportionate to the required degree of confidentiality.
引用
收藏
页码:5369 / 5397
页数:29
相关论文
共 80 条
  • [1] [Anonymous], 2018, Cisco Global Cloud Index: Forecast and Methodology
  • [2] [Anonymous], 2003, Standard codecs: Image compression to advanced video coding
  • [3] [Anonymous], 2015, IOT SECURITY INTERNE
  • [4] [Anonymous], 2005, Digital Video Quality: Vision Models and Metrics
  • [5] Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
    Arroyo, David
    Li, Chengqing
    Li, Shujun
    Alvarez, Gonzalo
    Halang, Wolfgang A.
    [J]. CHAOS SOLITONS & FRACTALS, 2009, 41 (05) : 2613 - 2616
  • [6] Sufficient encryption based on entropy coding syntax elements of H.264/SVC
    Asghar, Mamoona N.
    Ghanbari, Mohammed
    Fleury, Martin
    Reed, Martin J.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (23) : 10215 - 10241
  • [7] Interoperable conditional access with video selective encryption for portable devices
    Asghar, Mamoona Naveed
    Fleury, Martin
    Makki, Sohail
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13139 - 13152
  • [8] An Efficient Security System for CABAC Bin-Strings of H.264/SVC
    Asghar, Mamoona Naveed
    Ghanbari, Mohammad
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2013, 23 (03) : 425 - 437
  • [9] Fuzziness based semi-supervised learning approach for intrusion detection system
    Ashfaq, Rana Aamir Raza
    Wang, Xi-Zhao
    Huang, Joshua Zhexue
    Abbas, Haider
    He, Yu-Lin
    [J]. INFORMATION SCIENCES, 2017, 378 : 484 - 497
  • [10] Badve O., 2016, Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, P479, DOI DOI 10.4018/978-1-5225-0105-3.CH020