2014
DOI: 10.3390/e16105575
|View full text |Cite
|
Sign up to set email alerts
|

Partial Encryption of Entropy-Coded Video Compression Using Coupled Chaotic Maps

Abstract: Due to pervasive communication infrastructures, a plethora of enabling technologies is being developed over mobile and wired networks. Among these, video streaming services over IP are the most challenging in terms of quality, real-time requirements and security. In this paper, we propose a novel scheme to efficiently secure variable length coded (VLC) multimedia bit streams, such as H.264. It is based on code word error diffusion and variable size segment shuffling. The codeword diffusion and the shuffling me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…Inevitably, most of them have proven to be insecure because the trajectories in low dimension chaotic systems are periodic for finite precisions in digital computers [15,17,18,21,28,33]. To overcome this flaw, the Coupled Map Lattices (CML) system, which is a spatiotemporal chaos [16,37], has been widely employed in cryptography [17][18][19][20][21][22][23]32]. The CML system contains multiple positive Lyapunov exponents, which indicates that its trajectories have longer periodicity in digitalization of finite precision computations.…”
Section: Introductionmentioning
confidence: 99%
“…Inevitably, most of them have proven to be insecure because the trajectories in low dimension chaotic systems are periodic for finite precisions in digital computers [15,17,18,21,28,33]. To overcome this flaw, the Coupled Map Lattices (CML) system, which is a spatiotemporal chaos [16,37], has been widely employed in cryptography [17][18][19][20][21][22][23]32]. The CML system contains multiple positive Lyapunov exponents, which indicates that its trajectories have longer periodicity in digitalization of finite precision computations.…”
Section: Introductionmentioning
confidence: 99%
“…The input range for generating every random number depends on the bit length of the keys and nature of data and operation to be performed on data. We use a Chaotic based random number generator proposed by [24] to shuffle the secret message location within the cover image. We use a 256 key to increase the security level.…”
Section: Phase 1: Random Number Generatormentioning
confidence: 99%
“…MPEG4-Audio on the other side offers scalable embedded coding, in which the lower rate base layer represents the intelligible part of the speech to be encrypted [16]. The amount of encrypted data in speech coding is significantly reduced to about 3%-45% of the total bitstream, however, not all JCSE schemes fall in the category of strong encryption [17]. The vast majority of JCSE schemes in the literature are aimed at securing image and video data.…”
Section: Introductionmentioning
confidence: 99%
“…The frequency of induced biterrors (or random bit flipping) depends on the Mean Error Propagation length (MEPL) [29], which represents the number of affected codewords (error propagation) until selfsynchronization occurs. Our new scheme, derived from our previous proposed scheme in [17], proposes major changes that considerably simplify the encryption process, improve performance, increase security, and more importantly provide computational stability (see Wobbling effect below). We are aimed at providing high performance and secure codecindependent SE for low-to-mid power smartphones based on three major contributions: a) New integer-based Pseudo-Random Number Generator (PRNG) for secure random bit errors in the bitstream; b) a clueless phantom Dynamic Bit-Reference Point (DRP) for the bit flipping; and c) Random selection of byte-trajectories for the both DRP and bit flipping processes (this step doubles the security of our previous scheme [17]).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation