2022
DOI: 10.1515/comp-2020-0225
|View full text |Cite
|
Sign up to set email alerts
|

3D chaotic map-cosine transformation based approach to video encryption and decryption

Abstract: Data security is vital for multimedia communication. A number of cryptographic algorithms have been developed for the secure transmission of text and image data. Very few contributions have been made in the area of video encryption because of the large input data size and time constraints. However, due to the massive increase in digital media transfer within networks, the security of video data has become one of the most important features of network reliability. Block encryption techniques and 1D-chaotic maps… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…In 2014, Wang and Xu [18] proposed an intertwining relation between different LM sequences [19], which indicates that the ILM has more dynamic behavior than the LM [19]. The equations for the ILM sequence are as follows:…”
Section: Intertwining Logistic Map (Ilm)mentioning
confidence: 99%
“…In 2014, Wang and Xu [18] proposed an intertwining relation between different LM sequences [19], which indicates that the ILM has more dynamic behavior than the LM [19]. The equations for the ILM sequence are as follows:…”
Section: Intertwining Logistic Map (Ilm)mentioning
confidence: 99%
“…The proposed algorithm had lower time overhead and did not cause a significant increase in bit rate. Dua [22]proposes a fast and secure method of video encryption using 3D an Intertwining Logistic Map (ILM) with cosine transformation to generate a complex chaotic sequence. The keys produced by combining SHA-2 with cosine-based ILM are more uniform, and nonlinear.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years the chaotic theory has been adopted for image and video encryption due to its excellent features such as complex and unpredictable behavior, initial condition dependency, randomness, and ergodicity. The main principal of chaotic security mechanism is permutation and diffusion [8][9][10][11]. Permutation changes the pixel positions in a frame or an image.…”
Section: Introductionmentioning
confidence: 99%