SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 2, Issue 6 (June 2013), PP. 54-58
www.irjes.com
www.irjes.com 54 | Page
Partial Video Encryption Using Random Permutation Based on
Modification on Dct Based Transformation
S.Rajagopal1
, M.Shenbagavalli2
1
Assistant professor, National Engineering college
2
PG Student, National Engineering college
ABSTRACT: Generally videos are of larger volume. Video encryption is also known as video scrambling. It is
one of the powerful techniques for preventing unwanted interception. In this paper a robust Perceptual Video
Encryption technique is applied by selecting one out of multiple unitary transforms according to the encryption
key generated from random permutation method at the transformation stage.By rotating the phase angle in the
DCT based transformation stage of the input residual video frame, anew class of unitary transforms can be
generated. Different rotation angle can be choosen which provides number of Unitary Transforms. By
alternately applying these transforms based on pre-designed secret key, partial encryption is achived. For the
transmission of encrypted video, the encrypted video frames are quantized and encoded. To overcome the
drawbacks of Huffman coding, adaptive arithmetic encoder is used at the coding stage. Thus the encrypted bit
stream is obtained. Thus the decryption is done to obtain the original video.Also the performance factors under
various parameters are analyzed. This methodology will be useful for video-based services over networks.
I. INTRODUCTION
The wide use of digital images and videos in various applications brings serious attention to security
and privacy issues today. Data encryption is a suitable method to protect data. Till now, various encryption
algorithms have been proposed and widely used (DES, RSA, IDEA, AES etc.), most of which are used for text
and binary data. It is difficult to use them directly in video encryption as video data are often of large volumes
and require real time operations. In practical applications, for a video encryption algorithm, security, time
efficiency, format compliance and compression friendliness are really important. Among them, security is the
basic requirement, which means that the cost of breaking the encryption algorithm is no smaller than the ones
buying the video’s authorization.
II. ANALYSIS OF VIDEO ENCRYPTION
Siu-Kei Au Yeung et al (IEEE SIGNAL PROCESSING LETTERS, VOL. 16, NO. 10, OCTOBER
2009) proposed that novel video encryption technique is used to achieve partialencryption where an annoying
video can still be reconstructed even without the security key. In the existing methods the encryption usually
takes place at the entropy-coding stage or the bit-stream level. The proposed scheme embeds the encryption at
the transform stage during the encoding process. Number of new unitary transforms that are demonstrated to be
equally efficient as the well-known DCT and thus used as alternates to DCT during the encoding process. Partial
encryption is achieved through alternately applying these transforms to individual blocks according to a pre-
designed secret key. The partial video encryption scheme is divided into two parts: 1) random (secret) key
generation and 2) alternating transforms according to the secrete key. Almost all video encryption algorithms
rely on a random key generator to produce a sequence of pseudo-random codes. To this end, RC4 turns to be the
most commonly-used random key generator. The key-stream is then generated using the pseudo-random
generation algorithm (PRGA).Analysis on the security level of this partial encryption scheme is carried out
against various common attacks such as Known-plain text and chosen-plain text attacks, Ciphertext-only attack.
Thus a class of unitary transforms that are generated by some plane-based rotations and explained that these new
transforms perform as equally well as or even slightly better than DCT. The partial video encryption can be
achieved at a low cost is the major advantage. But these results do not offer a high security.
WANG Li-feng et al (The Journal of China Universities of Posts and Telecommunications 2008)
proposed that security video communication is a challenging task, especially for wireless video applications. A
perceptual video encryption scheme is stated here based on exploiting the special feature of entropy coding in
H.264. The encryption scheme is composed of coded block pattern permutation. Experimental results show that
the proposed perceptual scheme can achieve high security at a relatively low compression ratio and bandwidth
cost, as well as rather low complexity and time cost, so it is suitable for security multimedia services for mobile
device and wireless application.
Partial Video Encryption Using Random Permutation Based On Modification…
www.irjes.com 55 | Page
Jolly shah and Dr. Vikas Saxena (IJCSI International Journal of Computer Science Issues, Vol. 8, Issue
2, March 2011) proposed that multimedia data security is becoming important with the continuous increase of
digital communications on internet. The encryption algorithms developed to secure text data are not suitable for
multimedia application because of the large data size and real time constraint. In this paper, classification and
description of various video encryption algorithms are presented. Analysis and Comparison of these algorithms
with respect to various parameters like visual degradation, encryption ratio, speed, compression friendliness,
format compliance and cryptographic security is presented.
M. Abomhara et al (International Journal of Computer Theory and Engineering, Vol. 2, No. 1
February, 2010) proposed that with the rapid development of various multimedia technologies, more and more
multimedia data are generated and transmitted in the medical, commercial, and military fields, which may
include some sensitive information which should not be accessed by or can only be partially exposed to the
general users. Therefore, security and privacy has become an important. Over the last few years several
encryption algorithms have applied to secure video transmission. This paper shows the existence of security
problems and other weaknesses in most of the proposed multimedia encryption schemes and also description
and comparison between encryption methods and representative video algorithms were presented. With respect
not only to their encryption speed but also their security level and stream size.
K. John Singh and R.Manimegalai (Journal of Computer Science 2012) proposed that Joint
compression and encryption is employed to enable faster and secured transmission of video data. Compression
and encryption algorithms can be classified into two main Categories, Independent encryption technique and
joint compression and encryption technique. Independent encryption techniques can further be classified as
heavy weight and light weight encryption algorithms. There are many algorithms available in the joint
compression and encryption technique. Thus found that joint compression and encryption algorithms reduced
40% of the memory storage size and they increased execution speed up to 21%. Joint compression and
encryption algorithms perform better in terms of speed and security when compared to independent encryption
algorithms. This is because they employ compression before encryption.
III. PROPOSED METHOD
Objective
Compression and encryption are combined together to transmit the video at faster rate and with high
security. Generally compression is done before encryption. The main objective is to encrypt the video signal
before compression that provides better security rate. Inorder to save the vital datas,the encryption process is
done prior to compression.
Problem statement
On sending any video data over the network it consumes more time. This is due to the huge size of the
video file when compared to text file. Therefore, video data should be compressed before sending to the
destination. Another important factor during data transfer is security, for that the videos must be encrypted
before transmission. Video encryption involves different algorithms. Joint compression and encryption is
employed to enable faster and secured transmission of video data.
Load Video and Frame Conversion
Video contains more frames, separate image is called a frame, all frames are the same size, mmread
function will be used for loading and showing the input video sequence. The loaded video sequence should be
converted into frames (i.e still images) using mmreader function.
Unitary Transform
The unitary transform is known as the modified form of DCT. Two dimensional unitary transforms
play animportant role in image processing. The term image transform refers to a class of unitary matrices used
for representation of images.In analogy with I-D unitary matricsare represented by an orthogonal series of basis
functions , similarly an image can be represent in terms of a discrete set of basis arrays called “basis images”.
These are generated by unitary matrices. Alternatively an ( N N ) image can be represented as
2
1( N )
vector. An image transform provides a set of coordinates or basis vectors for the vector space.
It is derived from the four-point DCT’s flow-graph structure by selecting a different set of rotation
angles (θ1 + δ1, θ2 + δ2) with (θ1, θ2) = (π/4, 3π/8).
If the inverse of a square matrix A=[a1 a2 .....an] (ai for the ith column vector of ) is equal to its
conjugate transpose, i.e., , it is a unitary matrix and can define a unitary transform of a vector:
X=[x1,.....xn]T
Partial Video Encryption Using Random Permutation Based On Modification…
www.irjes.com 56 | Page
Figure 1 Flow graph of the four-point DCT
Encryption Key Generation by Random Permutation
A random permutation is a permutation containing a fixed number n of a random selection from a
given set of elements. There are two main algorithms for constructing random permutations. The first constructs
a vector of random real numbers and uses them as keys to records containing the integers 1 to n. The second
starts with an arbitrary permutation and then exchanges the ith element with a randomly selected one from the
first i elements for i = 1, ..., n.Random Permutation is a method that can generate one permutation of size n out
of n! Permutations. This Random permutation is generated from certain key by considering all the elements of
this given key in the generation process. The permutation is stored in one-dimensional array of size equal to the
permutation size (N).
Taking Inverse DCT and Display Encrypted Video
The inverse discrete cosine transform reconstructs a sequence from its discrete cosine transform (DCT)
coefficients. The inverse DCT can be computed by multiplication with the inverse of the DCT matrix. The
"twiddle factors” are the complex conjugates of the DCT factors and the reordering is applied at the end rather
than the beginning.
Quantization and Encoding for the Generation of Encrypted Bit Stream
Quantization is the process of reducing the number of possible values of a quantity, thereby reducing
the number of bits needed to represent it. In video compression, quantization is a process that attempts to
determine what information can be discarded safely without a significant loss in visual fidelity. The quantization
process is inherently lossy because of the many-to-one mapping process. It reduces the accuracy of the
transformer’s output in accordance with some pre-established fidelity criterion. Reduces the psychovisual
redundancies of the input image. This operation is not reversible and must be omitted if lossless compression is
desired. The quantization stage is at the core of any lossy image encoding algorithm. Quantization at the encoder
side, means partitioning of the input data range into a smaller set of values. There are two main types of
quantizers: scalar quantizers and vector quantizers. A scalar quantizer partitions the domain of input values into
a smaller number of intervals. If the output intervals are equally spaced, which is the simplest way to do it, the
process is called uniform scalar quantization; otherwise, for reasons usually related to minimization of total
distortion, it is called non uniform scalar quantization.
Encoder creates a fixed or variable-length code to represent the quantizer’s output and maps the output
in accordance with the code. In most cases, a variable-length code is used. An entropy encoder compresses the
compressed values obtained by the quantizer to provide more efficient compression. Most important types of
entropy encoders used in lossy imagecompression techniques are arithmetic encoder, huffman encoder and run-
length encoder.
Arithmetic Encoder
Arithmatic encoder generates the binary arithmetic code corresponding to the sequence of symbols
specified in the vector sequence. The input image is encoded and result is a column vector represented in binary
format.
Decryption and Reconstruction of original frames
The encrypted frames are then decrypted using the key generated by means of random permutation and
by applying the inverse transformation function. Thus the original frames are reconstructed
Partial Video Encryption Using Random Permutation Based On Modification…
www.irjes.com 57 | Page
IV. RESULTS AND DISCUSSION
This section gives the result of the encrypted video using the key generated by random permutation.
Also the performance parameters such as MSE & PSNR for each original frame with their encrypted frames are
plotted.
Figure 2 Original video
Figure 3 Separation of frames from the video
Here all the frames are seperated from the input video file and stores them in the buffer. The buffer is
known as m.cdata in the MatLab. This buffer stores the pixel values of each and every frame separately, which
can be used for further process.
Fig 4: Encrypted video
Fig 5: Decrypted video
Partial Video Encryption Using Random Permutation Based On Modification…
www.irjes.com 58 | Page
Fig 6: MSE analysis of the video according to the proposed system
Fig 7: PSNRanalysis of the video according to the proposed system
V. CONCLUSION
Thus the two criteria’s such as transmission speed and higher security level are important for the
successful transmission of the video. In most of the cases only encryption is done whish ensures the security but
the transmission speed is much less. Thus in this paper, joint encryption and compression are applied for the
video for high speed secure transmission also their performance is measured by means of parameters such as
MSE & PSNR. Hence the result obtained found to be promising.
REFERENCES
[1]. Siu-Kei Au Yeung, Shuyuan Zhu, and Bing Zeng,” Design of New Unitary Transforms for
Perceptual Video Encryption”, IEEE transactions on circuits and systemsfor vide technology, vol.
21, no. 9, september 2011
[2]. S. K. Au Yeung, S. Zhu, and B. Zeng, “Partial video encryption based on alternating
transforms,” IEEE Signal Process. Lett., vol. 16, no. 10, pp. 893–896, Oct. 2009.
[3]. F. Wang, W. Wang, J. Ma, C. Xiao, and K. Wang, “Perceptual video encryption scheme for mobile
application based on H.264,” J. China Univ. Posts Telecommun., vol. 15, no. 1, pp. 73–78, Sep. 2008
[4]. J. Zhou, Z. Liang, Y. Chen, and O. Au, “Security analysis of multimedia encryption schemes based on
multiple Huffman table,” IEEE Signal Process. Lett., vol. 14, no. 3, pp. 201–204, Mar. 2007.
[5]. D. Xie and C. Kuo, “Multimedia encryption with joint randomized entropy coding and rotation in
portioned bitstream,” EURASIP J. Inform. Security, vol. 2007, no. 35262, pp. 1–18, 2007.
[6]. S. Li, G. Chen, A. Cheung, B. Bhargava, and K. Lo, “On the design of perceptual MPEG-video
encryption algorithms,” IEEE Trans. Circuit Syst. Video Technol., vol. 17, no. 2, pp. 214–223, Feb.
2007.
[7]. Y. Mao and M. Wu, “A joint signal processing and cryptographic approach to multimedia encryption,”
IEEE Trans. Image Process., vol. 15, no. 7, pp. 2061–2075, Jul. 2006.
[8]. C. Wu and C. Kuo, “Design of integrated multimedia compression and encryption systems,” IEEE
Trans. Multimedia, vol. 7, no. 5, pp. 828– 839, Oct. 2005.
[9]. C. Wang, H. Yu, and M. Zheng, “A DCT-based MPEG-2 transparent scrambling algorithm,” IEEE
Trans. Consumer Electron., vol. 49, no. 4, pp. 1208–1213, Nov. 2003.
[10]. L. Qiao and K. Nahrstedt, “Comparison of MPEG encryption algorithm,” Int. J. Comput. Graphic, vol.
22, no. 4, pp. 437–448, 1998

Weitere ähnliche Inhalte

Was ist angesagt?

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesTELKOMNIKA JOURNAL
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionjournalBEEI
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
 

Was ist angesagt? (18)

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
D010312230
D010312230D010312230
D010312230
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
163 166
163 166163 166
163 166
 
It3116411644
It3116411644It3116411644
It3116411644
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 

Andere mochten auch

C211824
C211824C211824
C211824irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
H144247
H144247H144247
H144247irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
G234353
G234353G234353
G234353irjes
 
H244654
H244654H244654
H244654irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
E233137
E233137E233137
E233137irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
C231723
C231723C231723
C231723irjes
 
D223034
D223034D223034
D223034irjes
 
B130512
B130512B130512
B130512irjes
 
B140815
B140815B140815
B140815irjes
 
D242228
D242228D242228
D242228irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
G245054
G245054G245054
G245054irjes
 
C121738
C121738C121738
C121738irjes
 
La famille
La familleLa famille
La familleANA-JOSS
 

Andere mochten auch (20)

C211824
C211824C211824
C211824
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
H144247
H144247H144247
H144247
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
G234353
G234353G234353
G234353
 
H244654
H244654H244654
H244654
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
E233137
E233137E233137
E233137
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
C231723
C231723C231723
C231723
 
D223034
D223034D223034
D223034
 
B130512
B130512B130512
B130512
 
B140815
B140815B140815
B140815
 
D242228
D242228D242228
D242228
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
G245054
G245054G245054
G245054
 
C121738
C121738C121738
C121738
 
La famille
La familleLa famille
La famille
 

Ähnlich wie International Refereed Journal of Engineering and Science (IRJES)

Novel lightweight video encryption method based on ChaCha20 stream cipher an...
Novel lightweight video encryption method based on ChaCha20  stream cipher an...Novel lightweight video encryption method based on ChaCha20  stream cipher an...
Novel lightweight video encryption method based on ChaCha20 stream cipher an...IJECEIAES
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
 
A Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption AlgorithmsA Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption AlgorithmsIJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)IAESIJEECS
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosINFOGAIN PUBLICATION
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit satIAESIJEECS
 
Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches ijsc
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 malaOyeniyi Samuel
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital VideoIRJET Journal
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...IRJET Journal
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612NITC
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
 

Ähnlich wie International Refereed Journal of Engineering and Science (IRJES) (20)

V01 i010410
V01 i010410V01 i010410
V01 i010410
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
Novel lightweight video encryption method based on ChaCha20  stream cipher an...Novel lightweight video encryption method based on ChaCha20  stream cipher an...
Novel lightweight video encryption method based on ChaCha20 stream cipher an...
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
S4501105108
S4501105108S4501105108
S4501105108
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
A Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption AlgorithmsA Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption Algorithms
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System Videos
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit sat
 
Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 

Mehr von irjes

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Carirjes
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimizationirjes
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughnessirjes
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsirjes
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model irjes
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Citiesirjes
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...irjes
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...irjes
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...irjes
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intentirjes
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...irjes
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Ageirjes
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armorirjes
 

Mehr von irjes (20)

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

International Refereed Journal of Engineering and Science (IRJES)

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 6 (June 2013), PP. 54-58 www.irjes.com www.irjes.com 54 | Page Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation S.Rajagopal1 , M.Shenbagavalli2 1 Assistant professor, National Engineering college 2 PG Student, National Engineering college ABSTRACT: Generally videos are of larger volume. Video encryption is also known as video scrambling. It is one of the powerful techniques for preventing unwanted interception. In this paper a robust Perceptual Video Encryption technique is applied by selecting one out of multiple unitary transforms according to the encryption key generated from random permutation method at the transformation stage.By rotating the phase angle in the DCT based transformation stage of the input residual video frame, anew class of unitary transforms can be generated. Different rotation angle can be choosen which provides number of Unitary Transforms. By alternately applying these transforms based on pre-designed secret key, partial encryption is achived. For the transmission of encrypted video, the encrypted video frames are quantized and encoded. To overcome the drawbacks of Huffman coding, adaptive arithmetic encoder is used at the coding stage. Thus the encrypted bit stream is obtained. Thus the decryption is done to obtain the original video.Also the performance factors under various parameters are analyzed. This methodology will be useful for video-based services over networks. I. INTRODUCTION The wide use of digital images and videos in various applications brings serious attention to security and privacy issues today. Data encryption is a suitable method to protect data. Till now, various encryption algorithms have been proposed and widely used (DES, RSA, IDEA, AES etc.), most of which are used for text and binary data. It is difficult to use them directly in video encryption as video data are often of large volumes and require real time operations. In practical applications, for a video encryption algorithm, security, time efficiency, format compliance and compression friendliness are really important. Among them, security is the basic requirement, which means that the cost of breaking the encryption algorithm is no smaller than the ones buying the video’s authorization. II. ANALYSIS OF VIDEO ENCRYPTION Siu-Kei Au Yeung et al (IEEE SIGNAL PROCESSING LETTERS, VOL. 16, NO. 10, OCTOBER 2009) proposed that novel video encryption technique is used to achieve partialencryption where an annoying video can still be reconstructed even without the security key. In the existing methods the encryption usually takes place at the entropy-coding stage or the bit-stream level. The proposed scheme embeds the encryption at the transform stage during the encoding process. Number of new unitary transforms that are demonstrated to be equally efficient as the well-known DCT and thus used as alternates to DCT during the encoding process. Partial encryption is achieved through alternately applying these transforms to individual blocks according to a pre- designed secret key. The partial video encryption scheme is divided into two parts: 1) random (secret) key generation and 2) alternating transforms according to the secrete key. Almost all video encryption algorithms rely on a random key generator to produce a sequence of pseudo-random codes. To this end, RC4 turns to be the most commonly-used random key generator. The key-stream is then generated using the pseudo-random generation algorithm (PRGA).Analysis on the security level of this partial encryption scheme is carried out against various common attacks such as Known-plain text and chosen-plain text attacks, Ciphertext-only attack. Thus a class of unitary transforms that are generated by some plane-based rotations and explained that these new transforms perform as equally well as or even slightly better than DCT. The partial video encryption can be achieved at a low cost is the major advantage. But these results do not offer a high security. WANG Li-feng et al (The Journal of China Universities of Posts and Telecommunications 2008) proposed that security video communication is a challenging task, especially for wireless video applications. A perceptual video encryption scheme is stated here based on exploiting the special feature of entropy coding in H.264. The encryption scheme is composed of coded block pattern permutation. Experimental results show that the proposed perceptual scheme can achieve high security at a relatively low compression ratio and bandwidth cost, as well as rather low complexity and time cost, so it is suitable for security multimedia services for mobile device and wireless application.
  • 2. Partial Video Encryption Using Random Permutation Based On Modification… www.irjes.com 55 | Page Jolly shah and Dr. Vikas Saxena (IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011) proposed that multimedia data security is becoming important with the continuous increase of digital communications on internet. The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. In this paper, classification and description of various video encryption algorithms are presented. Analysis and Comparison of these algorithms with respect to various parameters like visual degradation, encryption ratio, speed, compression friendliness, format compliance and cryptographic security is presented. M. Abomhara et al (International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010) proposed that with the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure video transmission. This paper shows the existence of security problems and other weaknesses in most of the proposed multimedia encryption schemes and also description and comparison between encryption methods and representative video algorithms were presented. With respect not only to their encryption speed but also their security level and stream size. K. John Singh and R.Manimegalai (Journal of Computer Science 2012) proposed that Joint compression and encryption is employed to enable faster and secured transmission of video data. Compression and encryption algorithms can be classified into two main Categories, Independent encryption technique and joint compression and encryption technique. Independent encryption techniques can further be classified as heavy weight and light weight encryption algorithms. There are many algorithms available in the joint compression and encryption technique. Thus found that joint compression and encryption algorithms reduced 40% of the memory storage size and they increased execution speed up to 21%. Joint compression and encryption algorithms perform better in terms of speed and security when compared to independent encryption algorithms. This is because they employ compression before encryption. III. PROPOSED METHOD Objective Compression and encryption are combined together to transmit the video at faster rate and with high security. Generally compression is done before encryption. The main objective is to encrypt the video signal before compression that provides better security rate. Inorder to save the vital datas,the encryption process is done prior to compression. Problem statement On sending any video data over the network it consumes more time. This is due to the huge size of the video file when compared to text file. Therefore, video data should be compressed before sending to the destination. Another important factor during data transfer is security, for that the videos must be encrypted before transmission. Video encryption involves different algorithms. Joint compression and encryption is employed to enable faster and secured transmission of video data. Load Video and Frame Conversion Video contains more frames, separate image is called a frame, all frames are the same size, mmread function will be used for loading and showing the input video sequence. The loaded video sequence should be converted into frames (i.e still images) using mmreader function. Unitary Transform The unitary transform is known as the modified form of DCT. Two dimensional unitary transforms play animportant role in image processing. The term image transform refers to a class of unitary matrices used for representation of images.In analogy with I-D unitary matricsare represented by an orthogonal series of basis functions , similarly an image can be represent in terms of a discrete set of basis arrays called “basis images”. These are generated by unitary matrices. Alternatively an ( N N ) image can be represented as 2 1( N ) vector. An image transform provides a set of coordinates or basis vectors for the vector space. It is derived from the four-point DCT’s flow-graph structure by selecting a different set of rotation angles (θ1 + δ1, θ2 + δ2) with (θ1, θ2) = (π/4, 3π/8). If the inverse of a square matrix A=[a1 a2 .....an] (ai for the ith column vector of ) is equal to its conjugate transpose, i.e., , it is a unitary matrix and can define a unitary transform of a vector: X=[x1,.....xn]T
  • 3. Partial Video Encryption Using Random Permutation Based On Modification… www.irjes.com 56 | Page Figure 1 Flow graph of the four-point DCT Encryption Key Generation by Random Permutation A random permutation is a permutation containing a fixed number n of a random selection from a given set of elements. There are two main algorithms for constructing random permutations. The first constructs a vector of random real numbers and uses them as keys to records containing the integers 1 to n. The second starts with an arbitrary permutation and then exchanges the ith element with a randomly selected one from the first i elements for i = 1, ..., n.Random Permutation is a method that can generate one permutation of size n out of n! Permutations. This Random permutation is generated from certain key by considering all the elements of this given key in the generation process. The permutation is stored in one-dimensional array of size equal to the permutation size (N). Taking Inverse DCT and Display Encrypted Video The inverse discrete cosine transform reconstructs a sequence from its discrete cosine transform (DCT) coefficients. The inverse DCT can be computed by multiplication with the inverse of the DCT matrix. The "twiddle factors” are the complex conjugates of the DCT factors and the reordering is applied at the end rather than the beginning. Quantization and Encoding for the Generation of Encrypted Bit Stream Quantization is the process of reducing the number of possible values of a quantity, thereby reducing the number of bits needed to represent it. In video compression, quantization is a process that attempts to determine what information can be discarded safely without a significant loss in visual fidelity. The quantization process is inherently lossy because of the many-to-one mapping process. It reduces the accuracy of the transformer’s output in accordance with some pre-established fidelity criterion. Reduces the psychovisual redundancies of the input image. This operation is not reversible and must be omitted if lossless compression is desired. The quantization stage is at the core of any lossy image encoding algorithm. Quantization at the encoder side, means partitioning of the input data range into a smaller set of values. There are two main types of quantizers: scalar quantizers and vector quantizers. A scalar quantizer partitions the domain of input values into a smaller number of intervals. If the output intervals are equally spaced, which is the simplest way to do it, the process is called uniform scalar quantization; otherwise, for reasons usually related to minimization of total distortion, it is called non uniform scalar quantization. Encoder creates a fixed or variable-length code to represent the quantizer’s output and maps the output in accordance with the code. In most cases, a variable-length code is used. An entropy encoder compresses the compressed values obtained by the quantizer to provide more efficient compression. Most important types of entropy encoders used in lossy imagecompression techniques are arithmetic encoder, huffman encoder and run- length encoder. Arithmetic Encoder Arithmatic encoder generates the binary arithmetic code corresponding to the sequence of symbols specified in the vector sequence. The input image is encoded and result is a column vector represented in binary format. Decryption and Reconstruction of original frames The encrypted frames are then decrypted using the key generated by means of random permutation and by applying the inverse transformation function. Thus the original frames are reconstructed
  • 4. Partial Video Encryption Using Random Permutation Based On Modification… www.irjes.com 57 | Page IV. RESULTS AND DISCUSSION This section gives the result of the encrypted video using the key generated by random permutation. Also the performance parameters such as MSE & PSNR for each original frame with their encrypted frames are plotted. Figure 2 Original video Figure 3 Separation of frames from the video Here all the frames are seperated from the input video file and stores them in the buffer. The buffer is known as m.cdata in the MatLab. This buffer stores the pixel values of each and every frame separately, which can be used for further process. Fig 4: Encrypted video Fig 5: Decrypted video
  • 5. Partial Video Encryption Using Random Permutation Based On Modification… www.irjes.com 58 | Page Fig 6: MSE analysis of the video according to the proposed system Fig 7: PSNRanalysis of the video according to the proposed system V. CONCLUSION Thus the two criteria’s such as transmission speed and higher security level are important for the successful transmission of the video. In most of the cases only encryption is done whish ensures the security but the transmission speed is much less. Thus in this paper, joint encryption and compression are applied for the video for high speed secure transmission also their performance is measured by means of parameters such as MSE & PSNR. Hence the result obtained found to be promising. REFERENCES [1]. Siu-Kei Au Yeung, Shuyuan Zhu, and Bing Zeng,” Design of New Unitary Transforms for Perceptual Video Encryption”, IEEE transactions on circuits and systemsfor vide technology, vol. 21, no. 9, september 2011 [2]. S. K. Au Yeung, S. Zhu, and B. Zeng, “Partial video encryption based on alternating transforms,” IEEE Signal Process. Lett., vol. 16, no. 10, pp. 893–896, Oct. 2009. [3]. F. Wang, W. Wang, J. Ma, C. Xiao, and K. Wang, “Perceptual video encryption scheme for mobile application based on H.264,” J. China Univ. Posts Telecommun., vol. 15, no. 1, pp. 73–78, Sep. 2008 [4]. J. Zhou, Z. Liang, Y. Chen, and O. Au, “Security analysis of multimedia encryption schemes based on multiple Huffman table,” IEEE Signal Process. Lett., vol. 14, no. 3, pp. 201–204, Mar. 2007. [5]. D. Xie and C. Kuo, “Multimedia encryption with joint randomized entropy coding and rotation in portioned bitstream,” EURASIP J. Inform. Security, vol. 2007, no. 35262, pp. 1–18, 2007. [6]. S. Li, G. Chen, A. Cheung, B. Bhargava, and K. Lo, “On the design of perceptual MPEG-video encryption algorithms,” IEEE Trans. Circuit Syst. Video Technol., vol. 17, no. 2, pp. 214–223, Feb. 2007. [7]. Y. Mao and M. Wu, “A joint signal processing and cryptographic approach to multimedia encryption,” IEEE Trans. Image Process., vol. 15, no. 7, pp. 2061–2075, Jul. 2006. [8]. C. Wu and C. Kuo, “Design of integrated multimedia compression and encryption systems,” IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828– 839, Oct. 2005. [9]. C. Wang, H. Yu, and M. Zheng, “A DCT-based MPEG-2 transparent scrambling algorithm,” IEEE Trans. Consumer Electron., vol. 49, no. 4, pp. 1208–1213, Nov. 2003. [10]. L. Qiao and K. Nahrstedt, “Comparison of MPEG encryption algorithm,” Int. J. Comput. Graphic, vol. 22, no. 4, pp. 437–448, 1998