Skip to main content
Log in

Securing multimedia videos using space-filling curves

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Securing online multimedia content has become a significant concern in this digital era. Nowadays, several organizations provide premium video content for skill development, academics and entertainment. The usage of Space-Filling Curves (SFC) for video and image encryption was initiated in the late 20th century. Although it is a promising approach for enforcing multimedia security, a cryptanalysis on SFCs was performed, which rendered the technique useless. In this paper, we have presented two strategies for countering the chosen plaintext-based attack. In the first method, the notion of diffusion is introduced in video frames by swapping two colour channels. Alternatively, in the second method, the frame sequences are scrambled twice to overcome the constraint of their restricted movements. Finally, the output pixel intensity values are modified to model a uniform distribution. Our empirical results demonstrate the superiority of the presented work over state-of-the-art approaches involving multimedia security. We have also evaluated the security of our approaches through standard measures like entropy, histogram analysis, and differential analysis. Hence, the presented work provides a holistic framework for securely distributing multimedia content over both online and offline platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Bertilsson M, Brickell EF, Ingemarsson I (1989) Cryptanalysis of video encryption based on space-filling curves. In: Workshop on the theory and application of of cryptographic techniques. Springer, pp 403–411

  2. Bhatnagar G, Wu Q (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digit Signal Process 22(4):648–663 . https://doi.org/10.1016/j.dsp.2012.02.005. http://www.sciencedirect.com/science/article/pii/S1051200412000395

    Article  MathSciNet  Google Scholar 

  3. Bhatnagar G, Wu QMJ, Raman B (2012) Image and video encryption based on dual space-filling curves. Comput J 55(6):667–685

    Article  Google Scholar 

  4. Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122–133

    Article  Google Scholar 

  5. Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A new chaotic algorithm for video encryption. IEEE Trans Consum Electron 48(4):838–844

    Article  Google Scholar 

  6. Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based medical internet of things (miots): a survey. International journal of software science and computational intelligence 14(1):1–16. https://doi.org/10.4018/IJSSCI.285593

    Article  Google Scholar 

  7. Gerhardt C, Aichroth P, Mann S (2017) Selective face encryption in h.264 encoded videos. In: 2017 IEEE visual communications and image processing (VCIP), pp 1–4

  8. Goyal D, Hemrajani N (2014) Novel selective video encryption for h.264 video. International journal of information security science 3:11

    Google Scholar 

  9. Gupta BB, Agrawal DP, Yamaguchi S (2019) Deep learning models for human centered computing in fog and mobile edge networks. J Ambient Intell Humaniz Comput 10(8):2907–2911 . https://doi.org/10.1007/s12652-018-0919-8

    Article  Google Scholar 

  10. Hasegawa HH, Saphir WC (1992) Unitarity and irreversibility in chaotic systems. Phys Rev A 46(12):7401

    Article  MathSciNet  Google Scholar 

  11. Hénon M (1976) A two-dimensional mapping with a strange attractor. In: The theory of chaotic attractors. Springer, pp 94–102

  12. Hilbert D (1935) ÜBer die stetige abbildung einer linie auf ein flächenstück. In: Dritter band analysis· Grundlagen der Mathematik· Physik Verschiedenes. Springer, pp 1–2

  13. Kumar Patro KA, Acharya B (2019) An efficient colour image encryption scheme based on 1-d chaotic maps. Journal of Information Security and Applications 46:23–41. https://doi.org/10.1016/j.jisa.2019.02.006. https://www.sciencedirect.com/science/article/pii/S2214212618304034

    Article  Google Scholar 

  14. Li J, Wang C, Chen X, Tang Z, Hui G, Chang CC (2018) A selective encryption scheme of cabac based on video context in high efficiency video coding. Multimed Tools Appl 77 (10):12,837–12,851. https://doi.org/10.1007/s11042-017-4916-2

    Article  Google Scholar 

  15. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  16. M S R, Kunte R (2019) Selective Video Encryption Based on Entropy Measure. pp 603–612. https://doi.org/10.1007/978-981-10-8797-4-61

  17. Maniccam SS, Bourbakis NG (2004) Image and video encryption using scan patterns. Pattern Recogn 37(4):725–737

    Article  Google Scholar 

  18. Massoudi A, Lefebvre F, Joye M (2007) Cryptanalysis of a video scrambling based on space filling curves. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 1683–1686

  19. Matias Y, Shamir A (1987) A video scrambling technique based on space filling curves. In: Conference on the theory and application of cryptographic techniques. Springer, pp 398–417

  20. Mohan A, Anand A, Singh A, Dwivedi R, Kumar B (2021) Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput Electr Eng 95:107,385. https://doi.org/10.1016/j.compeleceng.2021.107385. https://www.sciencedirect.com/science/article/pii/S0045790621003530

    Article  Google Scholar 

  21. Mukherjee I, Ganguly R (2018) Multiple video clips preservation using folded back audio-visual cryptography scheme. Multimed Tools Appl 77(5):5281–5301. https://doi.org/10.1007/s11042-017-4431-5

    Article  Google Scholar 

  22. Murali P, Sankaradass V (2019) An efficient space filling curve based image encryption. Multimedia Tools and Applications 78(2):2135–2156. https://doi.org/10.1007/s11042-018-6234-8

    Article  Google Scholar 

  23. Peano G (1890) Sur une courbe, qui remplit toute une aire plane. Math Ann 36(1):157–160

    Article  MathSciNet  Google Scholar 

  24. Peng F, Xq Gong, Long M, Xm Sun (2017) A selective encryption scheme for protecting h.264/avc video in multimedia social network. Multimed Tools Appl 76(3):3235–3253

    Article  Google Scholar 

  25. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137–2150

    Article  Google Scholar 

  26. Sagan H (1994) Hilbert’s Space-Filling Curve. Springer, New York, pp 9–30 ,

    Book  Google Scholar 

  27. Saleh MA, Tahir NM, Hashim H (2016) Moving objects encryption of high efficiency video coding (hevc) using aes algorithm. J Telecommun Electron Comput Eng (JTEC) 8(3):31–36

    Google Scholar 

  28. Shahid Z, Puech W (2014) Visual protection of hevc video by selective encryption of cabac binstrings. IEEE Transactions on Multimedia 16 (1):24–36. 10.1109/TMM.2013.2281029

    Article  Google Scholar 

  29. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  Google Scholar 

  30. Suresh V, Madhavan VC (2012) Image encryption with space-filling curves. Def Sci J 62(1):46–50

    Article  Google Scholar 

  31. Tabash FK, Izharuddin M, Tabash MI (2019) Encryption techniques for h.264/avc videos: A literature review. J Inf Secur Appl 45:20–34. https://doi.org/10.1016/j.jisa.2019.01.001https://doi.org/10.1016/j.jisa.2019.01.https://doi.org/10.1016/j.jisa.2019.01.001001. https://www.sciencedirect.com/science/article/pii/S2214212618301649

    Google Scholar 

  32. Thum C (1984) Measurement of the entropy of an image with application to image focusing. Optica Acta: International journal of optics 31(2):203–211

    Article  MathSciNet  Google Scholar 

  33. Wang X, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76(4):1943–1950. https://doi.org/10.1007/s11071-014-1259-7

    Article  MATH  Google Scholar 

  34. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Sig Process 92(4):1101–1108. https://doi.org/10.1016/j.sigpro.2011.10.023. http://www.sciencedirect.com/science/article/pii/S0165168411003859

    Article  MathSciNet  Google Scholar 

  35. Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141–1149

    Article  MathSciNet  Google Scholar 

  36. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  37. Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt Lasers Eng 121:203–214

    Article  Google Scholar 

  38. Yan WQ, Kankanhalli MS (2016) Face search in encrypted domain. In: Bräunl T, McCane B, Rivera M, Yu X (eds) Image and video technology. Springer International Publishing, Cham, pp 775–790

  39. Yoo JC, Han T (2009) Fast normalized cross-correlation. Circuits Syst Signal Process 28:819–843. https://doi.org/10.1007/s00034-009-9130-7

    Article  MATH  Google Scholar 

  40. Zhang X, Wang L, Zhou Z, Niu Y (2019) A chaos-based image encryption technique utilizing hilbert curves and h-fractals. IEEE Access 7:74,734–74,746. https://doi.org/10.1109/ACCESS.2019.2921309

    Article  Google Scholar 

  41. Zhou Z, Su Y, Zhang Y, Xia Z, Du S, Gupta BB, Qi L (2021) Coverless information hiding based on probability graph learning for secure communication in iot environment. IEEE Internet Things J 1–1

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debanjan Sadhya.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sadhya, D., Rathore, S.S., Rajput, A.S. et al. Securing multimedia videos using space-filling curves. Multimed Tools Appl 81, 38685–38704 (2022). https://doi.org/10.1007/s11042-022-13066-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13066-w

Keywords

Navigation