2021
DOI: 10.5815/ijcnis.2021.05.04
|View full text |Cite
|
Sign up to set email alerts
|

Selective Video Encryption Using the Cross Coupling of One-dimensional Logistic Maps

Abstract: H.264 videos have been the most shared type of video format in recent times and hence its security is a major issue. The techniques presented in the recent times incur complex computations. The major research objective is to design an efficient Chaotic Selective Video Encryption (CSVE) technique which can result in a better visual degradation of the encrypted video with less computational complexity. In the proposed work, in order to secure the H.264 videos, two one-dimensional logistic maps are cross coupled … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…The single encrypted intra-frame prediction pattern approach also lacks adequate protection for P and B frames in videos. Rohit [5] used two one-dimensional logistic maps cross-coupled with each other as a pseudo-random series generator and encrypted the motion vector according to the congruence rule, which thoroughly corrupted the contour information of the video object. The cross-coupling enhances the complexity of chaotic sequences, but only the double mapping iterates over each other, making it weak against differential attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The single encrypted intra-frame prediction pattern approach also lacks adequate protection for P and B frames in videos. Rohit [5] used two one-dimensional logistic maps cross-coupled with each other as a pseudo-random series generator and encrypted the motion vector according to the congruence rule, which thoroughly corrupted the contour information of the video object. The cross-coupling enhances the complexity of chaotic sequences, but only the double mapping iterates over each other, making it weak against differential attacks.…”
Section: Introductionmentioning
confidence: 99%
“…With encryption in place, even if unauthorized individuals gain access to the stored or transmitted video data, they would not be able to understand or make use of it without the encryption key. The algorithms used to encrypt surveillance videos can be categorized into two types: (1) Selective Encryption and (2) Full Encryption [4,5]. In Selective encryption region of a video called ROI (Region of Interest) can be encrypted in a video to preserve privacy.…”
Section: Introductionmentioning
confidence: 99%
“…In regular mode, the probability is selected from the content based on previously encoded syntax elements whereas, in bypass mode, the fixed probability is used. The selective encryption is performed by using the bypass mode (Malladar and Kunte, 2021), ensuring format compliance and maintaining the bit rate of HEVC-encoded videos.…”
Section: Introductionmentioning
confidence: 99%