2021
DOI: 10.1109/access.2021.3062403
|View full text |Cite
|
Sign up to set email alerts
|

Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

Abstract: The rapid growth of multimedia communication systems has expanded the High-Efficiency Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent, elevated need to protect and secure the HEVC content during streaming and communication over insecure channels to ensure the privacy of HEVC data against intruders and attackers. This paper introduces an optical HEVC cipher algorithm based on bit-plane 3D-JST (Three-Dimensional Jigsaw Transform) and multistage 2D-FrFT (Two-Dimensional Frac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 47 publications
(13 citation statements)
references
References 47 publications
0
13
0
Order By: Relevance
“…The Laplacian operator can be represented by L ( x ( m , n )), where x ( m , n ) is the input stego or cover video frame, and ( m , n ) refers to the spatial location of the video frame pixels. This operator can be mathematically represented as in Equation ( 2 ) [ 56 ]. …”
Section: Results and Comparisonsmentioning
confidence: 99%
“…The Laplacian operator can be represented by L ( x ( m , n )), where x ( m , n ) is the input stego or cover video frame, and ( m , n ) refers to the spatial location of the video frame pixels. This operator can be mathematically represented as in Equation ( 2 ) [ 56 ]. …”
Section: Results and Comparisonsmentioning
confidence: 99%
“…• Laplacian Mean Square Error (LMSE) LMSE evaluation metric [36] is based on estimating the measurement of video frame edges. It is better to achieve a small LMSE value to obtain a good quality for the resulted stego video frame.…”
Section: • Maximum Difference (Md)mentioning
confidence: 99%
“…Different approaches have been adopted for forgery detection, such as passive and active approaches [8][9][10]. Active forgery detection techniques work on the principles of embedding external information in the image, such as a watermark [11][12][13] or a digital signature [14][15][16]. Verification is performed through the detection of the watermark or signature.…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm in [15] divides the image into a fixed number of blocks equal to 32 blocks for a row and 32 blocks for a column. For any image, the length of blocks is changed, but the number is fixed.…”
Section: Related Workmentioning
confidence: 99%