2020
DOI: 10.1007/s00530-020-00648-7
|View full text |Cite
|
Sign up to set email alerts
|

Robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…Alongside to implementing the selective approach, recently, several researchers have deployed chaotic system cryptography into the encryption systems [21], [32]. The nonlinear chaotic cryptography follows a deterministic approach aiming to reduce the computational complexity and increase sensitivity.…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Alongside to implementing the selective approach, recently, several researchers have deployed chaotic system cryptography into the encryption systems [21], [32]. The nonlinear chaotic cryptography follows a deterministic approach aiming to reduce the computational complexity and increase sensitivity.…”
Section: Related Studiesmentioning
confidence: 99%
“…The suggested scheme enabled the data to be extracted despite the video being in the encryption or decryption status. Another system that is implemented based on the chaotic system was proposed by [32]. The authors designed a keystream generation method as a nonlinear component of the cross-coupling chaotic system, which prevented the chosen-plaintext attack by relating that component to the plaintext.…”
Section: Related Studiesmentioning
confidence: 99%
“…Bit rate of the encrypted file increased at an average of 1.98%, which is considerably low. Trailing ones and zeros with DCT coefficients, IPMs and MVs were used to encrypt the video stream by Hui Xu et al [4]. Modified LCM was once again used in the spatiotemporal domain but with different set of syntax elements for different frames.…”
Section: Previous Workmentioning
confidence: 99%
“…In the proposed work, H.264 compression technique is chosen for the encryption which is carried out during the compression technique itself. Chaos theory is used as the platform for encryption in which cross coupled logistic maps [4] are used for the conversion of data. The technique can be used in the various fields like medical data processing [5], online library systems, video conferencing, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, it performed a series operation of analysis, extraction, encryption, and encoding on the H.264 bitstream, so it can be classified as the BOE method. References [3,18,23] proposed a similar encryption method for H.264 bitstream, which retained the 'header' information of the H.264 bitstream and encrypted the rest of the data. When the type of 'header' is revised as unspecific, the encrypted bitstream will be bypassed without decoding to maintain format compatibility.…”
Section: Introductionmentioning
confidence: 99%