Enhancing the performance of video encryption used for security and privacy protection in secure multimedia transfer

  • Authors

    • Khattab O. Khorsheed Ministry of Education / General Directorate of Education in Kirkuk, Kirkuk - Iraq
    • Omar G. Abood Department of Information Technology Institute of Graduate Studies and Researches, Alexandria University, Egypt.
    • Shawkat K. Guirguis Department of Information Technology Institute of Graduate Studies and Researches, Alexandria University, Egypt.
    2019-05-27
    https://doi.org/10.14419/ijet.v7i4.17936
  • Key Exchange, Pixel Shuffling, RGB Pixel Displacement, Video Decryption, Video Encryption.
  • It is taken for granted that the techy core transfer has showed an upward indicator recently. Data exchanges could be a mutual subject over unsecure network, the matter that made the multi-media security an inevitable and crucial issue. Applications that require image and video processing became extremely popular in many fields, e.g. Medical imaging, manufacturing, and security systems. Real time image and video processing is considered a vital matter, since it requires high computations for a huge a video data and complicated process in return. Thus, to guarantee the confidentiality via the vulnerable network, along transmission, a video encoding is considered a priority. As a matter of fact, valid algorithms are subject for violating. However, our academic research tackles an up-to-date system for real time video encrypting by using pixel encryption. Pixel encryption thesis relays on shuffling and manipulating pixel values. According to unscrambled order generated, the position of pixel values is changed. All in all, decrypting to edit the initial video would be hold by rearranging the pixel values first, then manipulating them reversely for a recipient side.

     

     

  • References

    1. [1] S. Somaraj and M. A. Hussain, “A Novel Image Encryption Technique using RGB Pixel Displacement for Color Images,†2016 IEEE 6th International Conference on Advanced Computing (IACC), Feb. 2016. https://doi.org/10.1109/IACC.2016.59.

      [2] Q.-A. Kester, L. Nana, and A. C. Pascu, “A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement,†2013 European Modelling Symposium, Nov. 2013. https://doi.org/10.1109/EMS.2013.51.

      [3] A. Kulkarni, “Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study,†International Journal of Computer Applications, vol. 102, no. 16, Mar. 2013. https://doi.org/10.5120/10885-5777.

      [4] K. Thiyagarajan, R. Lu, K. El-Sankary, and H. Zhu, “Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things,†IEEE Transactions on Circuits and Systems for Video Technology, 2018. https://doi.org/10.1109/TCSVT.2018.2808174.

      [5] M. A. Saleh, N. M. Tahir, E. Hisham, and H. Hashim, “An Analysis and Comparison for Popular Video Encryption Algorithms,†2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Apr. 2015. https://doi.org/10.1109/ISCAIE.2015.7298334.

      [6] F. Sbiaa, S. Kotel, M. Zeghid, R. Tourki, M. Machhout, and A. Baganne, “A Selective Encryption Scheme with Multiple Security Levels for the H.264/AVC Video Coding Standard,†2016 IEEE International Conference on Computer and Information Technology (CIT), Dec. 2016. https://doi.org/10.1109/CIT.2016.53.

      [7] O. G. Abood, M. A. Elsadd, and S. K. Guirguis, “Investigation of Cryptography Algorithms used for Security and Privacy Protection in Smart Grid,†2017 Nineteenth International Middle East Power Systems Conference (MEPCON), Dec. 2017. https://doi.org/10.1109/MEPCON.2017.8301249.

      [8] S. K. Abd-El-Hafiz, S. H. Abd ElHaleem, and A. G. Radwan, “Permutation Techniques based on Discrete Chaos and Their Utilization in Image Encryption,†2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Jun. 2016. https://doi.org/10.1109/ECTICon.2016.7561265.

      [9] A. Goel and N. Chandra, “A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based on Sorting Group-Wise of RGB Values and Explosive Inter-Pixel Displacement,†International Journal of Image, Graphics and Signal Processing, vol. 4, no. 2, Mar. 2012. https://doi.org/10.5815/ijigsp.2012.02.03.

      [10] P. Deshmukh and V. Kolhe, “Modified AES based Algorithm for MPEG Video Encryption,†International Conference on Information Communication and Embedded Systems (ICICES2014), Feb. 2014. https://doi.org/10.1109/ICICES.2014.7033928.

  • Downloads

  • How to Cite

    O. Khorsheed, K., G. Abood, O., & K. Guirguis, S. (2019). Enhancing the performance of video encryption used for security and privacy protection in secure multimedia transfer. International Journal of Engineering & Technology, 7(4), 6167-6170. https://doi.org/10.14419/ijet.v7i4.17936