Real-time video security system using chaos- improved advanced encryption standard (IAES)

被引:28
作者
Hafsa, Amal [1 ]
Fradi, Marwa [1 ]
Sghaier, Anissa [1 ]
Malek, Jihene [1 ,2 ]
Machhout, Mohsen [1 ]
机构
[1] Univ Monastir, Elect & Microelect Lab, Monastir, Tunisia
[2] Sousse Univ, Higher Inst Appl Sci & Technol, Dept Elect, LR99ES30 E E Lab, Sousse, Tunisia
关键词
Video encryption; Security; Real time; IAES; Chaos theory; SCHEME; QUALITY;
D O I
10.1007/s11042-021-11668-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800-22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2(128) which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission.
引用
收藏
页码:2275 / 2298
页数:24
相关论文
共 44 条
[1]  
AGAIAN S, 2010, IEEE INT C SYSTEMS M, DOI DOI 10.1109/ICSMC.2010.5642260
[2]  
[Anonymous], 2001, 197 FIPS
[3]   An image encryption method based on chaos system and AES algorithm [J].
Arab, Alireza ;
Rostami, Mohammad Javad ;
Ghavami, Behnam .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (10) :6663-6682
[4]   Generalized Hardware Post-processing Technique for Chaos-Based Pseudorandom Number Generators [J].
Barakat, Mohamed L. ;
Mansingka, Abhinav S. ;
Radwan, Ahmed G. ;
Salama, Khaled N. .
ETRI JOURNAL, 2013, 35 (03) :448-458
[5]   FPGA implementation of a HW/SW platform for multimedia embedded systems [J].
Ben Atitallah, A. ;
Kadionik, P. ;
Masmoudi, N. ;
Levi, H. .
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (04) :293-311
[6]  
Bentoutou Y., 2019, ADV SPACE RES
[7]   The improved image inpainting algorithm via encoder and similarity constraint [J].
Chen, Yuantao ;
Liu, Linwu ;
Tao, Jiajun ;
Xia, Runlong ;
Zhang, Qian ;
Yang, Kai ;
Xiong, Jie ;
Chen, Xi .
VISUAL COMPUTER, 2021, 37 (07) :1691-1705
[8]   Saliency Detection via the Improved Hierarchical Principal Component Analysis Method [J].
Chen, Yuantao ;
Tao, Jiajun ;
Zhang, Qian ;
Yang, Kai ;
Chen, Xi ;
Xiong, Jie ;
Xia, Runlong ;
Xie, Jingbo .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
[9]   Research of improving semantic image segmentation based on a feature fusion model [J].
Chen, Yuantao ;
Tao, Jiajun ;
Liu, Linwu ;
Xiong, Jie ;
Xia, Runlong ;
Xie, Jingbo ;
Zhang, Qian ;
Yang, Kai .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 13 (11) :5033-5045
[10]   A novel online incremental and decremental learning algorithm based on variable support vector machine [J].
Chen, Yuantao ;
Xiong, Jie ;
Xu, Weihong ;
Zuo, Jingwen .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3) :S7435-S7445