Chaos Based Encryption Technique for Compressed H264/AVC Videos

Saving videos streaming from the unlawful users became an urgent claim. Cryptography and Steganography are the most important and indispensable processes to protect and embed the multimedia data during the transfer or storage process. Chaotic-based cryptography has been proposed to be an efficient e...

Full description

Bibliographic Details
Main Authors: M. A. El-Mowafy, S. M. Gharghory, M. A. Abo-Elsoud, M. Obayya, M. I. Fath Allah
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9955541/
Description
Summary:Saving videos streaming from the unlawful users became an urgent claim. Cryptography and Steganography are the most important and indispensable processes to protect and embed the multimedia data during the transfer or storage process. Chaotic-based cryptography has been proposed to be an efficient encryption technique for multimedia applications and has played a vital role in information security. While the chaotic maps have a long history of researching as a nonlinear dynamic system, visual encryption is useful for concealing messages in videos and safeguarding private content from unauthorized intrusion. In this paper, two new proposed algorithms for compressed videos by the advanced H.264/AVC video coding are presented. First algorithm approach has been implemented by robust video encryption algorithm based on the chaos maps with random key to be tested under different attacks. The second algorithm approach has been implemented by using the hybrid of both steganography and cryptography based on chaotic maps for video frames. The proposed algorithms are conducted on luminance component Y of a set of different YUV video sequences with different resolution using MATLAB software. The simulation results of the proposed algorithms are evaluated using various performance metrics comparing to that with the state-of-art techniques. The suggested approaches have shown to be more resistant to many sorts of attacks and is recommended for future using in real-time applications.
ISSN:2169-3536