Abstract
Securing online multimedia content has become a significant concern in this digital era. Nowadays, several organizations provide premium video content for skill development, academics and entertainment. The usage of Space-Filling Curves (SFC) for video and image encryption was initiated in the late 20th century. Although it is a promising approach for enforcing multimedia security, a cryptanalysis on SFCs was performed, which rendered the technique useless. In this paper, we have presented two strategies for countering the chosen plaintext-based attack. In the first method, the notion of diffusion is introduced in video frames by swapping two colour channels. Alternatively, in the second method, the frame sequences are scrambled twice to overcome the constraint of their restricted movements. Finally, the output pixel intensity values are modified to model a uniform distribution. Our empirical results demonstrate the superiority of the presented work over state-of-the-art approaches involving multimedia security. We have also evaluated the security of our approaches through standard measures like entropy, histogram analysis, and differential analysis. Hence, the presented work provides a holistic framework for securely distributing multimedia content over both online and offline platforms.
Similar content being viewed by others
References
Bertilsson M, Brickell EF, Ingemarsson I (1989) Cryptanalysis of video encryption based on space-filling curves. In: Workshop on the theory and application of of cryptographic techniques. Springer, pp 403–411
Bhatnagar G, Wu Q (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digit Signal Process 22(4):648–663 . https://doi.org/10.1016/j.dsp.2012.02.005. http://www.sciencedirect.com/science/article/pii/S1051200412000395
Bhatnagar G, Wu QMJ, Raman B (2012) Image and video encryption based on dual space-filling curves. Comput J 55(6):667–685
Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122–133
Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A new chaotic algorithm for video encryption. IEEE Trans Consum Electron 48(4):838–844
Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based medical internet of things (miots): a survey. International journal of software science and computational intelligence 14(1):1–16. https://doi.org/10.4018/IJSSCI.285593
Gerhardt C, Aichroth P, Mann S (2017) Selective face encryption in h.264 encoded videos. In: 2017 IEEE visual communications and image processing (VCIP), pp 1–4
Goyal D, Hemrajani N (2014) Novel selective video encryption for h.264 video. International journal of information security science 3:11
Gupta BB, Agrawal DP, Yamaguchi S (2019) Deep learning models for human centered computing in fog and mobile edge networks. J Ambient Intell Humaniz Comput 10(8):2907–2911 . https://doi.org/10.1007/s12652-018-0919-8
Hasegawa HH, Saphir WC (1992) Unitarity and irreversibility in chaotic systems. Phys Rev A 46(12):7401
Hénon M (1976) A two-dimensional mapping with a strange attractor. In: The theory of chaotic attractors. Springer, pp 94–102
Hilbert D (1935) ÜBer die stetige abbildung einer linie auf ein flächenstück. In: Dritter band analysis· Grundlagen der Mathematik· Physik Verschiedenes. Springer, pp 1–2
Kumar Patro KA, Acharya B (2019) An efficient colour image encryption scheme based on 1-d chaotic maps. Journal of Information Security and Applications 46:23–41. https://doi.org/10.1016/j.jisa.2019.02.006. https://www.sciencedirect.com/science/article/pii/S2214212618304034
Li J, Wang C, Chen X, Tang Z, Hui G, Chang CC (2018) A selective encryption scheme of cabac based on video context in high efficiency video coding. Multimed Tools Appl 77 (10):12,837–12,851. https://doi.org/10.1007/s11042-017-4916-2
Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36
M S R, Kunte R (2019) Selective Video Encryption Based on Entropy Measure. pp 603–612. https://doi.org/10.1007/978-981-10-8797-4-61
Maniccam SS, Bourbakis NG (2004) Image and video encryption using scan patterns. Pattern Recogn 37(4):725–737
Massoudi A, Lefebvre F, Joye M (2007) Cryptanalysis of a video scrambling based on space filling curves. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 1683–1686
Matias Y, Shamir A (1987) A video scrambling technique based on space filling curves. In: Conference on the theory and application of cryptographic techniques. Springer, pp 398–417
Mohan A, Anand A, Singh A, Dwivedi R, Kumar B (2021) Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput Electr Eng 95:107,385. https://doi.org/10.1016/j.compeleceng.2021.107385. https://www.sciencedirect.com/science/article/pii/S0045790621003530
Mukherjee I, Ganguly R (2018) Multiple video clips preservation using folded back audio-visual cryptography scheme. Multimed Tools Appl 77(5):5281–5301. https://doi.org/10.1007/s11042-017-4431-5
Murali P, Sankaradass V (2019) An efficient space filling curve based image encryption. Multimedia Tools and Applications 78(2):2135–2156. https://doi.org/10.1007/s11042-018-6234-8
Peano G (1890) Sur une courbe, qui remplit toute une aire plane. Math Ann 36(1):157–160
Peng F, Xq Gong, Long M, Xm Sun (2017) A selective encryption scheme for protecting h.264/avc video in multimedia social network. Multimed Tools Appl 76(3):3235–3253
Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137–2150
Sagan H (1994) Hilbert’s Space-Filling Curve. Springer, New York, pp 9–30 ,
Saleh MA, Tahir NM, Hashim H (2016) Moving objects encryption of high efficiency video coding (hevc) using aes algorithm. J Telecommun Electron Comput Eng (JTEC) 8(3):31–36
Shahid Z, Puech W (2014) Visual protection of hevc video by selective encryption of cabac binstrings. IEEE Transactions on Multimedia 16 (1):24–36. 10.1109/TMM.2013.2281029
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Suresh V, Madhavan VC (2012) Image encryption with space-filling curves. Def Sci J 62(1):46–50
Tabash FK, Izharuddin M, Tabash MI (2019) Encryption techniques for h.264/avc videos: A literature review. J Inf Secur Appl 45:20–34. https://doi.org/10.1016/j.jisa.2019.01.001https://doi.org/10.1016/j.jisa.2019.01.https://doi.org/10.1016/j.jisa.2019.01.001001. https://www.sciencedirect.com/science/article/pii/S2214212618301649
Thum C (1984) Measurement of the entropy of an image with application to image focusing. Optica Acta: International journal of optics 31(2):203–211
Wang X, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76(4):1943–1950. https://doi.org/10.1007/s11071-014-1259-7
Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Sig Process 92(4):1101–1108. https://doi.org/10.1016/j.sigpro.2011.10.023. http://www.sciencedirect.com/science/article/pii/S0165168411003859
Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141–1149
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt Lasers Eng 121:203–214
Yan WQ, Kankanhalli MS (2016) Face search in encrypted domain. In: Bräunl T, McCane B, Rivera M, Yu X (eds) Image and video technology. Springer International Publishing, Cham, pp 775–790
Yoo JC, Han T (2009) Fast normalized cross-correlation. Circuits Syst Signal Process 28:819–843. https://doi.org/10.1007/s00034-009-9130-7
Zhang X, Wang L, Zhou Z, Niu Y (2019) A chaos-based image encryption technique utilizing hilbert curves and h-fractals. IEEE Access 7:74,734–74,746. https://doi.org/10.1109/ACCESS.2019.2921309
Zhou Z, Su Y, Zhang Y, Xia Z, Du S, Gupta BB, Qi L (2021) Coverless information hiding based on probability graph learning for secure communication in iot environment. IEEE Internet Things J 1–1
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sadhya, D., Rathore, S.S., Rajput, A.S. et al. Securing multimedia videos using space-filling curves. Multimed Tools Appl 81, 38685–38704 (2022). https://doi.org/10.1007/s11042-022-13066-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13066-w