Computationally efficient selective video encryption with chaos based block cipher

被引:23
作者
Altaf, Muhammad [1 ]
Ahmad, Ayaz [1 ]
Khan, Farman Ali [2 ]
Uddin, Zahoor [1 ]
Yang, Xiaodong [3 ]
机构
[1] COMSATS Inst Informat Technol, Wah, Pakistan
[2] COMSATS Inst Informat Technol, Attock, Pakistan
[3] Xidian Univ, Xian, Shaanxi, Peoples R China
关键词
Selective encryption; Chaos based block cipher; Video streaming; CRYPTOGRAPHY; DESIGN;
D O I
10.1007/s11042-018-6022-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Selective encryption techniques are usually used with resource limited communication infrastructure and devices like wireless networks and mobile devices, to reduce computational burden in securing large video data. This technique of securing a subset of data and hence reducing computation is usually considered a compromise on security. Similarly, if the data is not properly selected then the encryption procedure will result in compression inefficiency and format non-compliance. In this research work, these requirements of reduced computation with increased security, format compliance and compression efficiency are addressed. The security issue is addressed by carefully selecting the substitution boxes for the block cipher in use. For compression efficiency and compliance to the format the video data is selected such that the statistical and structural characteristics are preserved. In order to increase the security, different chaotic based substitution boxes, that are an integral part and the only nonlinear operation of the block ciphers, were studied for cryptographic strengths. The selected substitution boxes were used for permutation of selected video data and its encryption by integrating the S-box with the Advanced Encryption Standard and H.264/AVC. The video data selected to be secured, consist of discrete cosine transform coefficients; signs of trailing ones and non-zero transform coefficients. The discrete cosine transform coefficients were permuted using the selected S-box while the signs of trailing ones and non-zero transform coefficients were fully encrypted using AES with the modified S-box. Simulation results showed considerable visual degradation in the decoded video. It is also shown that the compression efficiency and format compliance was not compromised while keeping the computational load at minimum.
引用
收藏
页码:27981 / 27995
页数:15
相关论文
共 66 条
[1]  
Ahmad M., 2016, Perspectives in Science, V8, P465
[2]   An algorithm for the construction of substitution box for block ciphers based on projective general linear group [J].
Altaleb, Anas ;
Saeed, Muhammad Sarwar ;
Hussain, Iqtadar ;
Aslam, Muhammad .
AIP ADVANCES, 2017, 7 (03)
[3]   Internet of multimedia things: Vision and challenges [J].
Alvi, Sheeraz A. ;
Afzal, Bilal ;
Shah, Ghalib A. ;
Atzori, Luigi ;
Mahmood, Waqar .
AD HOC NETWORKS, 2015, 33 :87-111
[4]  
[Anonymous], 2010, INT COMPUT THEORY EN
[5]  
[Anonymous], 2012, J BASIC APPL SCI RES
[6]  
[Anonymous], IM PROC 2007 ICIP 20
[7]  
[Anonymous], 2010, INC2010
[8]  
[Anonymous], INT J COMPUT APPL
[9]  
[Anonymous], IACR CRYPTOL EPRINT
[10]  
[Anonymous], INTERNET EXPERTS WAN