Partial Encryption of Entropy-Coded Video Compression Using Coupled Chaotic Maps

被引:7
作者
Almasalha, Fadi [1 ]
Hasimoto-Beltran, Rogelio [2 ]
Khokhar, Ashfaq A. [3 ]
机构
[1] Appl Sci Private Univ, Fac Informat Technol, Amman 11931, Jordan
[2] Ctr Res Math CIMAT, Guanajuato 36000, Mexico
[3] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
关键词
chaotic maps; Real-Time Protocol (RTP); video encoding; Huffman code; ERROR RECOVERY; SYNCHRONIZATION RECOVERY;
D O I
10.3390/e16105575
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Due to pervasive communication infrastructures, a plethora of enabling technologies is being developed over mobile and wired networks. Among these, video streaming services over IP are the most challenging in terms of quality, real-time requirements and security. In this paper, we propose a novel scheme to efficiently secure variable length coded (VLC) multimedia bit streams, such as H.264. It is based on code word error diffusion and variable size segment shuffling. The codeword diffusion and the shuffling mechanisms are based on random operations from a secure and computationally efficient chaos-based pseudo-random number generator. The proposed scheme is ubiquitous to the end users and can be deployed at any node in the network. It provides different levels of security, with encrypted data volume fluctuating between 5.5-17%. It works on the compressed bit stream without requiring any decoding. It provides excellent encryption speeds on different platforms, including mobile devices. It is 200% faster and 150% more power efficient when compared with AES software-based full encryption schemes. Regarding security, the scheme is robust to well-known attacks in the literature, such as brute force and known/chosen plain text attacks.
引用
收藏
页码:5575 / 5600
页数:26
相关论文
共 35 条
[1]  
[Anonymous], 2001, FIPS197 NIST AES
[2]  
Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5365, P322, DOI 10.1007/978-3-540-89754-5_25
[3]   ON THE CONSTRUCTION OF STATISTICALLY SYNCHRONIZABLE CODES [J].
CAPOCELLI, RM ;
DESANTIS, AA ;
GARGANO, L ;
VACCARO, U .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1992, 38 (02) :407-414
[4]   SELF-SYNCHRONIZING HUFFMAN CODES [J].
FERGUSON, TJ ;
RABINOWITZ, JH .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1984, 30 (04) :687-693
[5]  
Gladman B., AES COMB ENCRYPTION
[6]   Cycle detection for secure chaos-based encryption [J].
Hasimoto-Beltran, Rogelio ;
Ramirez-Ramirez, Roxana .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (08) :3203-3211
[7]   High-performance multimedia encryption system based on chaos [J].
Hasimoto-Beltran, Rogelio .
CHAOS, 2008, 18 (02)
[8]   Robust image transmission using resynchronizing variable-length codes and error concealment [J].
Hemami, SS .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (06) :927-939
[9]   A METHOD FOR THE CONSTRUCTION OF MINIMUM-REDUNDANCY CODES [J].
HUFFMAN, DA .
PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1952, 40 (09) :1098-1101
[10]   Cryptanalysis of some multimedia encryption schemes [J].
Jakimoski, Goce ;
Subbalakshmi, K. P. .
IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (03) :330-338