2023
DOI: 10.1186/s13634-023-01003-4
|View full text |Cite
|
Sign up to set email alerts
|

Even symmetric chaotic and skewed maps as a technique in video encryption

Abstract: The massive growth and use of digital multimedia through computer networks, including video and images, have increased the demand for protecting this digital data. To secure digital video, video encryption is frequently utilized. In this paper, a brand-new video scrambling technique based on two chaotic linearly symmetric maps and one chaotic tent map that has been twisted is suggested. The permutation procedure moves every frame pixel's position using a P-box created by permuting a linearly symmetric chaotic … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…To achieve the goal of video security, the video is categorized into three aspects, which are confidentiality, integrity, and availability [21]. Existing video encryption schemes can achieve integrity and confidentiality, but not many can achieve better usability; this is because many traditional video encryption techniques encrypt the original video into pixel-homogenized snowflake speckles [22][23][24][25], sacrificing the encrypted video's usability, making the technique unsuitable for many video applications that provide features such as video previewing, video categorization, and so on. For example, when users want to download a video that they need from the cloud, they have to decrypt all videos that they have stored before they can find the target video, which wastes a great amount of their time.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To achieve the goal of video security, the video is categorized into three aspects, which are confidentiality, integrity, and availability [21]. Existing video encryption schemes can achieve integrity and confidentiality, but not many can achieve better usability; this is because many traditional video encryption techniques encrypt the original video into pixel-homogenized snowflake speckles [22][23][24][25], sacrificing the encrypted video's usability, making the technique unsuitable for many video applications that provide features such as video previewing, video categorization, and so on. For example, when users want to download a video that they need from the cloud, they have to decrypt all videos that they have stored before they can find the target video, which wastes a great amount of their time.…”
Section: Introductionmentioning
confidence: 99%
“…The scheme performs separation and zero-filling operations, zigzag scanning, and rotation operations on three channels of the video frames in sequence and then performs an encryption operation on the scrambled frames to achieve the encryption of the video with high security and efficiency. El-den et al proposed a video encryption scheme that combines symmetric chaotic and skewed maps [22], which use a chaotic system to generate P-boxes to disrupt the pixel positions, and then encrypts the video by using the skewed map ensemble diffusion technique, providing good security. Jiang et al proposed a video encryption scheme that combines parallel computing and real-time chaos [27].…”
Section: Introductionmentioning
confidence: 99%