A Modern Encryption Approach to Improve Video Security as an Advanced Standard Adopted
Main Article Content
Abstract
While transmitting data across a network, it is important to keep in mind that some fields may contain sensitive information. One of the most pressing concerns, then, is the protection of private information. The confidentiality and integrity of an online video are the primary concerns of the suggested approach in this work. Video compression using Moving Picture Experts Group (MPEG), video encryption, and video decryption are the three components that make up the proposed study. The data is encrypted using one of the most used block cipher algorithms, the Advanced Encryption Standard (AES) technique. The real-time needs of frame decoding can be satisfied by a software implementation. Our research leads us to believe that this has the potential for use in safe, real-time video transmission. In this case, the compressed domain is where the video stream encryption takes place. As a result, the compression and decompression time cycles are maintained. Because of this, it is able to cut encryption time by 90% compared to the method that encrypts the entire video. However, the most bits that can be encrypted using this method are 128 bits. As a result, far fewer calculations are needed to get satisfactory encryption results. The software solution has to be fast enough for frame decoding to work in real time. Based on our findings, this might be utilized for secure, real-time video communication. We are applying the C++ programming language for coding.
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
licenseTermsPublication Dates
References
Shukur, A.; Badrulddin, A.; Nsaif, M. K. A proposed encryption technique of different texts using circular link lists. Periodicals of Engineering and Natural Sciences. 2021, 9, 1115-1123,
AlKhafaji, J; Salih, M; Shnain, S; Nabat, Z. Improved technique for hiding data in colored and monochrome images. Periodicals of Engineering and Natural Sciences. 2020, 8(2), 1000–1010.
Iptehaj, Alhakam; Nassir, H Salman. An Improved Probability Density Function (PDF) for Face Skin Detection, Iraqi Journal of Science, 2022, 63(10), 4460–4473 https://doi.org/10.24996/ijs. 63.10.31
Shukur, WA; Kubba, ZMJ. Arabic and English Text Encryption Using a Proposed Method Based on the Coordinates System. International Journal of Advances in Soft Computing & Its Applications. 2023, 15(2), https://doi.org/10.15849/IJASCA.230720.17
AlKhafaji ,J; Salih, M; Shnain, S.; Nabat, Z .Segmenting video frame images using genetic algorithms, Periodicals of Engineering and Natural Sciences 2020, 8(2), 1106–1114. http://dx.doi.org/10.21533/pen.v8i2.1351
J Kromka, O Kováč, J Šaliga, M Ultiwavelet Toolbox for MATLAB, International Conference Radioelektronika (RADIOELEKTRONIKA), https://doi.org/1109/RADIOELEKTRONIKA54537.21-22 April 2022 - ieeexplore.ieee.org
Shi and Bhargava, A Fast MPEG Video Encryption Algorithm, Proceedings of the 6th ACM International Conference Bristol, UK, pp. 81–88, September 1998.
Lian, Multimedia Content Encryption: Techniques and Applications, CRC, 2008.
Agi and L. Gong, An Empirical Study of MPEG Video Transmission, Proceedings of the Internet Society Symposium on Network and Distributed Systems Security, pp. 137–144. San Diego, CA, February 1996. https://doi.org/10.1109/NDSS.1996.492420
S. Harba,E.S. Harba, S. SH. Hussein, and M. K. Farttoos, Improving accuracy of CADx systems by hybrid PCA and backpropagation, IEEE Xplore, 2018. https://doi.org/10.1109/CATA.2018.8398681
SH. Hussein, S. SH. Altyar, and I.A. Abdulmunem, Improve the Fully Convolutional Network Accuracy by Levelset and the Deep Prior Method, Iraqi Journal of Science, 2023, Vol. 64, No. 5, pp. 2575–2588. https://doi.org/10.24996/ijs.2023.64.5.39
SH. Altyar, S. SH. Hussein, and M. J. Mohammed, Human recognition by utilizing voice recognition and visual recognition, Int. J. Nonlinear Anal. Appl. 13 (2022) No. 1, 343–351, 2021. https://doi.org/10.22075/IJNAA.2022.5501
Adam J. Slagell. Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm. Available from: http://eprint.iacr.org/2004/011.pdf.(Accessed on March 2, 2009)
Karthik Thiyagarajan. Low Computational Overhead Video Encryption for Wireless Multimedia Devices, Dalhousie University. 2014. http://hdl.handle.net/10222/54564
Ali, H.; Abdullah, W. N. A survey of similarity measures in web image search. International Journal of Emerging Trends in Technology in Computer Science, 2016, 4(4).
Katoch, S.; Chauhan, S. S.; Kumar, V. A review on genetic algorithm: past, present, and future. Multimedia tools and applications, 2021, 80, 8091-8126. https://doi.org/10.1007/s11042-020-10139-6
AlKhafaji, B.J.; Salih, M.A.; Shnain, S.A.; Rashid, O.A.; Rashid, A.A.; Hussein, M.T. Applying the Artificial Neural Networks with Multiwavelet Transform on Phoneme recognition. IOP Publishing. Journal of Physics: Conference Series 2021, 1804 (1), 012040. https://doi.org/10.1008/1742-6596/1804/1/012040
Rahma, AM; Rahma, MA; Rahma, MA. Automated analysis for basketball free throw. In IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). 2015, 447–453. https://doi.org/10.1109/IntelCIS.2015.7397259
Abdullatif, FA; Shukur, WA Blind Color Image Steganography in Spatial Domain. Ibn Al-Haitham Journal for Pure and Applied Science. 2011, 24(1), 338–346-346 cy44
Mozaffari, S. Parallel image encryption with bitplane decomposition and genetic algorithm. Multimedia Tools and Applications. 2018, 77(19), 25799-25819.
Gupta, M.; Gupta, K. K.; Shukla, P. K. Session key-based fast, secure, and lightweight image encryption algorithm. Multimedia Tools and Applications. 2021, 80(7), 10391–10416. https://doi.org/10.1007/s11042-020-10116-z
Mahdi, M. S.; Azeez, R. A.; Hassan, N. F. A proposed lightweight image encryption using ChaCha with hyperchaotic maps. Periodicals of Engineering and Natural Sciences (PEN). 2020, 8(4), 2138–2145. http://dx.doi.org/10.21533/pen.v8i4.1708
Wei, D.; Jiang, MA. Fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik. 2021, 238, 166748. https://doi.org/10.1016/j.ijleo.2021.166748
Kamali, S.H.; Shakerian, R.; Hedayati, M.; Rahmani, M. A new modified version of advanced encryption standard based algorithm for image encryption. In International Conference on Electronics and Information Engineering. 2010 1, V1-141. https://doi.org/10.1109/ICEIE.2010.5559902
Hoang, Trang; Nguyen Van Loi. An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm. IEEE International Conference on Computing and Communication Technology, Ho Chi Minh City. 2012, 1–4.
Malladar, R.; Sanjeev Kunte, R. Selective video encryption based on entropy measure. Integrated intelligent computing, communication and security. 2019, 603-612. https://doi.org/10.1007/978-981-10-8797-4_61
Elshamy, A.M.; Hussein, A.I.; Hamed, H.F.; Abdelghany, M.A.; Kelash, H.M. Color image encryption technique based on chaos. Procedia Computer Science. 2019, 163, 49-53. https://doi.org/10.1016/j.procs.2019.12.085
Patro, K. A. K.; Acharya, B. A secure block operation based bit-plane image encryption using chaotic maps. In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T) 2020, 411-416. IEEE. https://doi.org/10.1109/ICPC2T48082.2020.9071483
Shivan Othman, P.; Reber Ihsan, R.; Masoud Abdulhakeem, R. The Genetic Algorithm (GA) in Relation to Natural Evolution. Academic Journal of Nawroz University. 2022, 11(3), 243–250. https://doi.org/10.25007/ajnu.v11n3a1414
Hussein, S. SH.; Altyar, S. S.; Tawfeeq, L. A.; Harba, E. S. Reconstruction of Three-Dimensional Objects from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation, Baghdad Science Journal. 2020, 17(3), 899–908. DOI: http://dx.doi.org/10.21123/bsj.2020.17.3.0899
Bushra Kh AlSaidi; Baydaa Jaffer Al-Khafaji; Suad Abed Al Wahab. Content-Based Image Clustering Technique Using Statistical Features and Geneti, Algorithms Engineering, Technology, and Applied Science Research. 2019, 9(2).
A. M. Sagheer; M. S. Al-Ani; O. A. Mahdi, "Ensure Security of Compressed Data Transmission," 2013 Sixth International Conference on Developments in eSystems Engineering, Abu Dhabi, United Arab Emirates, 2013, 270-275, https://doi.org/10.1109/DeSE.2013.55.
Al-Khafaji, B.J.; Rahma, A.M.S. A Modern Encryption Approach to Improve Video Security as an Advanced Standard Adopted. Ibn AL-Haitham Journal For Pure and Applied Sciences, 2024,37(2), ,460-470. https://doi.org/10.30526/37.2.3907
May A. Salih; Shaymaa AbdulHussein Shnain; Baydaa Jaffer AlKhafaji. Using RC6 in embedding information in spatial parts of image construction, Turkish Journal of Computer and Mathematics Education, 2021, 12, 11.