A Modern Encryption Approach to Improve Video Security as an Advanced Standard Adopted

Main Article Content

Baydaa Jaffer Al-Khafaji
https://orcid.org/0000-0002-5982-8983
Abdul Monem S. Rahma
https://orcid.org/0000-0001-6323-9148

Abstract

While transmitting data across a network, it is important to keep in mind that some fields may contain sensitive information. One of the most pressing concerns, then, is the protection of private information. The confidentiality and integrity of an online video are the primary concerns of the suggested approach in this work. Video compression using Moving Picture Experts Group (MPEG), video encryption, and video decryption are the three components that make up the proposed study. The data is encrypted using one of the most used block cipher algorithms, the Advanced Encryption Standard (AES) technique. The real-time needs of frame decoding can be satisfied by a software implementation. Our research leads us to believe that this has the potential for use in safe, real-time video transmission. In this case, the compressed domain is where the video stream encryption takes place. As a result, the compression and decompression time cycles are maintained. Because of this, it is able to cut encryption time by 90% compared to the method that encrypts the entire video. However, the most bits that can be encrypted using this method are 128 bits. As a result, far fewer calculations are needed to get satisfactory encryption results. The software solution has to be fast enough for frame decoding to work in real time. Based on our findings, this might be utilized for secure, real-time video communication. We are applying the C++ programming language for coding.

Article Details

How to Cite
A Modern Encryption Approach to Improve Video Security as an Advanced Standard Adopted. (2024). Ibn AL-Haitham Journal For Pure and Applied Sciences, 37(2), 475-485. https://doi.org/10.30526/37.2.3907
Section
Computer

How to Cite

A Modern Encryption Approach to Improve Video Security as an Advanced Standard Adopted. (2024). Ibn AL-Haitham Journal For Pure and Applied Sciences, 37(2), 475-485. https://doi.org/10.30526/37.2.3907

Publication Dates

References

A. Shukur, A. Badrulddin, and M. K. Nsaif, A proposed encryption technique of different texts using circular link lists, Periodicals of Engineering and Natural Sciences, vol. 9, pp. 1115-1123, 2021.

J AlKhafaji, M Salih, S Shnain, and Z Nabat, Improved technique for hiding data in colored and monochrome images, Periodicals of Engineering and Natural Sciences, 2020, 8 (2), 1000–1010.

Iptehaj Alhakam, Nassir H Salman, An Improved Probability Density Function (PDF) for Face Skin Detection, Iraqi Journal of Science, 2022, 63, No. 10, pp. 4460–4473, DOI: 10.24996/ijs. 63.10.31

Arabic and English Text Encryption Using a Proposed Method Based on the Coordinates System. WA Shukur, ZMJ Kubba International Journal of Advances in Soft Computing & Its Applications 2023, 15 (2),

J AlKhafaji, M Salih, S Shnain, and Z Nabat, segmenting video frame images using genetic algorithms, Periodicals of Engineering and Natural Sciences 2020, 8 (2), 1106–1114

J Kromka, O Kováč, J Šaliga, M Ultiwavelet Toolbox for MATLAB, International Conference Radioelektronika (RADIOELEKTRONIKA), DOI: 1109/RADIOELEKTRONIKA54537.21-22 April 2022 - ieeexplore.ieee.org ‏

Shi and Bhargava, A Fast MPEG Video Encryption Algorithm, Proceedings of the 6th ACM International Conference Bristol, UK, pp. 81–88, September 1998.

Lian, Multimedia Content Encryption: Techniques and Applications, CRC, 2008.

Agi and L. Gong, An Empirical Study of MPEG Video Transmission, Proceedings of the Internet Society Symposium on Network and Distributed Systems Security, pp. 137–144. San Diego, CA, February 1996.

S. Harba,E.S. Harba, S. SH. Hussein, and M. K. Farttoos, Improving accuracy of CADx systems by hybrid PCA and backpropagation, IEEE Xplore, 2018.

SH. Hussein, S. SH. Altyar, and I.A. Abdulmunem, Improve the Fully Convolutional Network Accuracy by Levelset and the Deep Prior Method, Iraqi Journal of Science, 2023, Vol. 64, No. 5, pp. 2575–2588.

SH. Altyar, S. SH. Hussein, and M. J. Mohammed, Human recognition by utilizing voice recognition and visual recognition, Int. J. Nonlinear Anal. Appl. 13 (2022) No. 1, 343–351, 2021.

Adam J. Slagell. Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm. Available from: http://eprint.iacr.org/2004/011.pdf.(Accessed on March 2, 2009)

Karthik Thiyagarajan Low Computational Overhead Video Encryption for Wireless Multimedia Devices, Dalhousie University

H. Ali and W. N. Abdullah, A survey of similarity measures in web image search, International Journal of Emerging Trends in Technology in Computer Science, 2016, vol. 4, no. 4.

Sourabh Katoch, Sumit Singh Chauhan, Vijay Kumar, A review on genetic algorithms: past, present, and future, Springer Science+Business Media, LLC, part of Springer Nature, Multimedia Tools and Applications, 2021, 80:8091–8126

J AlKhafaji, MA Salih, SAH Shnain, OA Rashid, AA Rashid, MT Hussein, Applying the Artificial Neural Networks with Multiwavelet Transform on Phoneme Recognition, Journal of Physics: Conference Series 2021, 1804 (1), 012040.

RAHMA, A.M.S., RAHMA, M.A.S., and RAHMA, M.A.S. Automated analysis for basketball free throws in: Proceedings of the 7th International Conference on Intelligent Computing and Information Systems. Piscataway, New Jersey: Institute of Electrical and Electronics Engineers, Cairo, December 2015, pp. 447–453.

FA Abdullatif, WA Shukur Blind Color Image Steganography in Spatial Domain—Ibn Al-Haitham Journal for Pure and Applied Science 2011, 24(1), 338–346-346 cy44

Mozaffari, S. Parallel image encryption with bitplane decomposition and genetic algorithm. Multimedia Tools and Applications, (2018), 77(19), 25799-25819. ‏

Gupta, M., Gupta, K. K., & Shukla, P. K. Session key-based fast, secure, and lightweight image encryption algorithm. Multimedia Tools and Applications, (2021), 80(7), 10391–10416. ‏

Mahdi, M. S., Azeez, R. A., & Hassan, N. F. A proposed lightweight image encryption using ChaCha with hyperchaotic maps. Periodicals of Engineering and Natural Sciences (PEN), (2020), 8(4), 2138–2145. ‏

Wei, D., & Jiang, MA, fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik, 2021. 238, 166748. ‏

Kamali S.H., Shakerian R., Hedayati M., and Rahmani M., “A new modified version of the Advanced Encryption Standard-based algorithm for image encryption," (ICEIE) International Conference on Electronics and Information Engineering, volume 1, pages 1250–1255, August 2010.

Hoang Trang and Nguyen Van Loi, “An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm, IEEE International Conference on Computing and Communication Technology, pages 1–4, Ho Chi Minh City, 2012.

R. Malladar and R. S. Kunte, “Selective Video Encryption Based on Entropy Measure,” in Integrated Intelligent Computing, Communication and Security, Springer, 2019, pp. 603--612.

Elshamy, A. M., Hussein, A. I., Hamed, H. F., Abdelghany, M. A., Kelash, H. M. (2019). Color Image Encryption Technique Based on Chaos. Procedia Computer Science, 163, 49-53.‏

Patro, K. A. K., & Acharya, B. (2020, January). A secure block operation based bit-plane image encryption using chaotic maps. In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T) (pp. 411-416). IEEE.‏.

Shivan Othman, P., Reber Ihsan, R., & Masoud Abdulhakeem, R. The Genetic Algorithm (GA) in Relation to Natural Evolution. Academic Journal of Nawroz University, 2022, 11(3), 243–250.

S. SH. Hussein, S. SH. Altyar, L. A. Tawfeeq, and E. S. Harba, Reconstruction of Three-Dimensional Objects from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation, Baghdad Science Journal, 2020, 17(3):899–908, 2020.

Bushra Kh AlSaidi, Baydaa Jaffer Al-Khafaji, and Suad Abed Al Wahab, Content-Based Image Clustering Technique Using Statistical Features and Geneti, Algorithms Engineering, Technology, and Applied Science Research 2019, 9(2).

A. M. Sagheer, M. S. Al-Ani and O. A. Mahdi, "Ensure Security of Compressed Data Transmission," 2013 Sixth International Conference on Developments in eSystems Engineering, Abu Dhabi, United Arab Emirates, 2013, pp. 270-275, doi: 10.1109/DeSE.2013.55.

Prof. Abdul Monem S. Rahma Ph.D. Baydaa Jaffer Al-Khafaji, Optimizing Symmetric vs. Asymmetric Image Encryption Mathematically, International Journal of Advances in Engineering and Management (IJAEM), 2022, 4(9).

May A. Salih, Shaymaa AbdulHussein Shnain, and Baydaa Jaffer AlKhafaji, Using RC6 in embedding information in spatial parts of image construction, Turkish Journal of Computer and Mathematics Education, 2021, 12, 11.