Skip to main content

Diffusion + Confusion: Chaos-assisted Twofold Cryptosystem for Secure Video Transmission

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Abstract

Video broadcasting has attained high importance due to the popularization of networks. Video communication has lot of advantages but not limited to e-learning, surveillance, etc. Video encryption is necessary for securing video information from unauthorized users. To achieve this, an enhanced video encryption scheme has been proposed in this work which adopts two techniques such as confusion and diffusion. Sundarapandian–Pehlivan chaotic system (Akgul et al. Optik (Stuttg). 127:5491–5499 (2016), [9]) has been adopted as a keystream generator to accomplish the encryption process. This 3D chaotic system has been realized by RungeKutta fourth-order method through which the differential system has been modelled as a discrete system. LabVIEW 2013 environment has been used to develop the proposed cryptosystem in which the camera module has been interfaced to capture the real-time video. This scheme achieves maximum entropy of 7.94627514 and near-zero correlation for a test video which has 141 encrypted frames. Further, NIST SP 800-22 batteries of test has been carried out to ensure the statistical efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Z. Li, X. Wang, Y. Lin, C. Cheng, RDEA: a novel video encryption algorithm, in Advanced Multimedia and Ubiquitous Engineering, ed. by J.H. Park, H.-C. Chao, H. Arabnia, N.Y. Yen. Lecture Notes in Electrical Engineering, vol 352 (Springer, Berlin, Heidelberg, 2015), pp. 183–189. https://doi.org/10.1007/978-3-662-47487-7_28

  2. U. Andreas, A. Pommer, Image and Video Encryption (Springer, Boston, MA, 2005)

    Google Scholar 

  3. F. Liu, H. Koenig, A survey of video encryption algorithms. Comput. Secur. 29, 3–15 (2010). https://doi.org/10.1016/j.cose.2009.06.004

  4. W. Hamidouche, M. Farajallah, N. Sidaty, S. El Assad, O. Deforges, Real-time selective video encryption based on the chaos system in scalable HEVC extension. Signal Process. Image Commun. 58, 73–86 (2017). https://doi.org/10.1016/j.image.2017.06.007

  5. H. Xu, X. Tong, X. Meng, An efficient chaos pseudo-random number generator applied to video encryption. Optik (Stuttg). 127, 9305–9319 (2016). doi:https://doi.org/10.1016/j.ijleo.2016.07.024

  6. L.M. Varlakshmi, G.F. Sudha, G. Jaikishan, An efficient scalable video encryption scheme for real time applications. Procedia Eng. 30, 852–860 (2012). https://doi.org/10.1016/j.proeng.2012.01.937

  7. S. Lian, Z. Liu, Z. Ren, Z. Wang, Selective video encryption based on advanced video coding, in Advances in Multimedia Information Processing—(PCM 2005) ed. by Y.-S. Ho, H.-J. Kim (Springer, Berlin Heidelberg, 2005), pp. 281–290

    Google Scholar 

  8. K. Chaudhary, G. Pandi (Jain), Privacy preserving using video encryption technique—the hybrid approach, in Computing and Network Sustainability, ed. by H.R. Vishwakarma, S. Akashe (Springer, Singapore, 2017), pp. 29–37

    Google Scholar 

  9. A. Akgul, I. Moroz, I. Pehlivan, S. Vaidyanathan, A new four-scroll chaotic attractor and its engineering applications. Optik (Stuttg). 127, 5491–5499 (2016). https://doi.org/10.1016/j.ijleo.2016.02.066

  10. X. Zhang et al., Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput. Intell. Neurosci. (2017)

    Google Scholar 

  11. L. Liu, Q. Zhang, X. Wei, A RGB image encryption algorithm based on DNA encoding and chaos map. Comput. Electr. Eng. 38(5), 1240–1248 (2012)

    Article  Google Scholar 

  12. A. Belazi, A.A. Abd El-Latif, S. Belghith, A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128, 155–170 (2016). https://doi.org/10.1016/j.sigpro.2016.03.021

  13. S. Rajagopalan, R. Sivaraman, H.N. Upadhyay, J.B.B. Rayappan, R. Amirtharajan: ONChip peripherals are ON for chaos—an image fused encryption. Microprocess. Microsyst. 61, 257–278 (2018)

    Google Scholar 

  14. M.A. Murillo-Escobar, C. Cruz-Hernández, F. Abundiz-Pérez, R.M. López-Gutiérrez, O.R. Acosta Del Campo, A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 109, 119–131 (2015). https://doi.org/10.1016/j.sigpro.2014.10.033

  15. S. Rajagopalan, S. Rethinam, S. Janakiraman, H.N. Upadhyay, R. Amirtharajan, Cellular automata + LFSR + synthetic image: a trio approach to image encryption, in 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore (2017), pp. 1–6

    Google Scholar 

  16. L.E. Bassham et al., A statistical test suite for random and pseudo-random number generators for cryptographic applications. Natl. Inst. Stand. Technol., Gaithersburg, MD, USA, Tech. Rep., No. April (2010)

    Google Scholar 

Download references

Acknowledgements

The authors wish to thank SASTRA Deemed University for providing infrastructure through the Research & Modernization Fund (Ref. No.: R&M/0026/SEEE–010/2012–13) to carry out the research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sundararaman Rajagopalan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sumanjali, M., Sivaraman, R., Sridevi, A., Rengarajan, A., Rajagopalan, S., Upadhyay, H.N. (2021). Diffusion + Confusion: Chaos-assisted Twofold Cryptosystem for Secure Video Transmission. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_14

Download citation

Publish with us

Policies and ethics