Skip to main content
Log in

A chaos-based novel approach to video encryption using dynamic S-box

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Video Encryption is the process of converting the video into an unrecognizable form to protect it from unauthorized access. This paper proposes a novel video encryption method based on a dynamic S-box generated using the Sine-Tent cosine chaos map. The proposed method mainly comprises four phases. In the first step, an input video is split into frames, and frame rotation is performed to shuffle the pixels within the frame. The second stage involves the generation of a novel dynamic S-Box by using the Sine-Tent Cosine map. The number of dynamic S-boxes to be generated in the method is equal to the number of frames in a video, as each frame is encrypted by a different S-box. As every time a new S-box is used for encryption, it makes it difficult for the adversary to access the information. Frame padding is used to protect the metadata of the frame, and to make the size of the video frame compatible with the S-box dimensions. In the third stage, generated dynamic S-Box is used to permute pixels within the video frame. At last, the pixels of the frame are diffused by applying add and mod operators on a chaotic sequence generated by a chaotic Sine-Tent Cosine map to obtain the final cipher frame as output. The differential analysis and statistical analysis are performed by using parameters such as Unified Average Changed Intensity (UACI), Number of Changing Pixel Rate (NPCR), and Correlation Coefficient (CC), Information Entropy, respectively. The work also tests the key sensitivity, Avalanche effect, and Peak Signal to Noise Ratio (PSNR), of the proposed scheme. The obtained results prove that the proposed scheme is secure from many attacks such as differential attacks, statistical attacks, known plain-text, and Brute Force attacks, and provides a higher level of security as compared to other existing video encryption methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

I, Deepti, on the behalf of all the authors declare that:

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Alarood AA, Alsolami E, Al-Khasawneh MA, Ababneh N, Elmedany W (2021) “IES: hyper-chaotic plain image encryption scheme using improved shuffled confusion-diffusion,” Ain Shams Eng J, no. xxxx, https://doi.org/10.1016/j.asej.2021.09.010.

  2. Alawida M, Samsudin A, Sen J, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58. https://doi.org/10.1016/j.sigpro.2019.02.016

    Article  Google Scholar 

  3. Alawida M, Samsudin A, Teh JESEN, Alshoura WH (2019) “Digital Cosine Chaotic Map for Cryptographic Applications,” pp. 150609–150622

  4. Alghafis A, Munir N, Khan M (2021) An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component. Multimed Tools Appl 80(5):7967–7985. https://doi.org/10.1007/s11042-020-10142-x

    Article  Google Scholar 

  5. Al-hayani N (2013) “Simultaneous video compression and encryption for real-time secure transmission,” 8th Int Symp Image Signal Process Anal (ISPA 2013), no. Ispa, pp. 240–245

  6. Alshammari BM, Guesmi R, Guesmi T, Alsaif H, Alzamil A (2021) Implementing a symmetric lightweight cryptosystem in highly constrained iot devices by using a chaotic s-box. Symmetry (Basel) 13(1):1–20. https://doi.org/10.3390/sym13010129

    Article  Google Scholar 

  7. Ansari N, Shaikh R (2016) A Keyless Approach for RDH in Encrypted Images using Visual Cryptography. Phys Procedia 78(December 2015):125–131. https://doi.org/10.1016/j.procs.2016.02.021

    Article  Google Scholar 

  8. Belazi A, Kharbech S, Aslam N, Talha M, Xiang W (2022) Improved sine-tangent chaotic map with application in medical images encryption. J Inf Secur Appl 66(March):103131. https://doi.org/10.1016/j.jisa.2022.103131

    Article  Google Scholar 

  9. Bisht A, Dua M, Dua S (2018) “A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform,” J Ambient Intell Humaniz Comput, vol. 0, no. 0, p. 0, https://doi.org/10.1007/s12652-018-1072-0

  10. Boyadjis B, Bergeron C, Pesquet-Popescu B, Dufaux F (2017) Extended selective encryption of H.264/AVC (CABAC)-and HEVC-encoded video streams. IEEE Trans Circ Syst Vid Technol 27(4):892–906. https://doi.org/10.1109/TCSVT.2015.2511879

    Article  Google Scholar 

  11. Cassal-Quiroga BB, Campos-Cantón E (2020) “Generation of dynamical S-boxes for block ciphers via extended logistic map,” Math Probl Eng, vol. 2020, https://doi.org/10.1155/2020/2702653.

  12. Chandrasekaran J, Thiruvengadam SJ (2015) “Ensemble of Chaotic and Naive Approaches for performance enhancement in video encryption,” Sci World J, vol. 2015, https://doi.org/10.1155/2015/458272.

  13. Chen Z, Ip WH, Chan CY, Yung KL (2010) Two-level chaos-based video cryptosystem on H.263 codec. Nonlin Dyn 62(3):647–664. https://doi.org/10.1007/s11071-010-9751-1

    Article  Google Scholar 

  14. Dua M, Suthar A, Garg A, Garg V (2021) An ILM-cosine transform-based improved approach to image encryption. Complex Intell Syst 7(1):327–343. https://doi.org/10.1007/s40747-020-00201-z

    Article  Google Scholar 

  15. Dua M, Makhija D, Yamini P, Manasa L, Mishra P (2022) “3D chaotic map - cosine transformation based approach to video encryption and decryption,” Open Comput Sci, pp. 37–56

  16. Eid M, Ibrahim A (2021) “A Fast Real-Time Video Encryption / Decryption Technique Based on Hybrid Chaotic Maps,” no. February

  17. García S, Fernández A, Luengo J, Herrera F (2010) Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: experimental analysis of power. Inf Sci (Ny) 180(10):2044–2064. https://doi.org/10.1016/j.ins.2009.12.010

    Article  Google Scholar 

  18. Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based medical internet of things (miots): a survey. Int J Softw Sci Comput Intell 14(1):1–16

    Article  Google Scholar 

  19. Haridas D, Kiran DS, Patel S, Raghavendra K, Venkatraman S, Venkatraman R (2021) Real-time compressed video encryption: based on Quasigroup on system on Chip (SOC). SN Comput Sci 2(5):1–14. https://doi.org/10.1007/s42979-021-00793-4

    Article  Google Scholar 

  20. Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80–94. https://doi.org/10.1016/j.ins.2014.11.018

    Article  Google Scholar 

  21. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403–419. https://doi.org/10.1016/j.ins.2018.12.048

    Article  Google Scholar 

  22. Ibrahim DR, Je ST, Abdullah R (2021) An overview of visual cryptography techniques. Multimed Tools Appl 80:31927–31952. https://doi.org/10.1007/s11042-021-11229-9

    Article  Google Scholar 

  23. Jun WJ, Fun TS (2021) A new image encryption algorithm based on single S-box and dynamic encryption step. IEEE Access 9:120596–120612. https://doi.org/10.1109/ACCESS.2021.3108789

    Article  Google Scholar 

  24. Karmakar J, Pathak A, Nandi D, Mandal MK (2021) Sparse representation based compressive video encryption using hyper-chaos and DNA coding. Digit Signal Process 117:103143. https://doi.org/10.1016/j.dsp.2021.103143

    Article  Google Scholar 

  25. Kordov K, Dimitrov G (2021) A new symmetric digital video encryption model. Cybern Inf Technol 21(1):50–61. https://doi.org/10.2478/cait-2021-0004

    Article  Google Scholar 

  26. Kumar A, Dua M (2021) Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multimed Tools Appl 80(18):27785–27805. https://doi.org/10.1007/s11042-021-10970-5

    Article  Google Scholar 

  27. Kumar CM, Vidhya R, Brindha M (2022) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52(3):2556–2585. https://doi.org/10.1007/s10489-021-02508-x

  28. Li H, Wang Y, Zuo Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115(February 2018):197–207. https://doi.org/10.1016/j.optlaseng.2018.12.002

    Article  Google Scholar 

  29. Liu J, Xu Y (2022) T-Friedman test: a new statistical test for multiple comparison with an adjustable conservativeness measure. Int J Comput Intell Syst 15(1):1–19. https://doi.org/10.1007/s44196-022-00083-8

    Article  MathSciNet  Google Scholar 

  30. Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidim Syst Sign Process 30(4):1637–1657. https://doi.org/10.1007/s11045-018-0622-0

    Article  Google Scholar 

  31. Malladar RS, Kunte SR (2021) Selective video encryption using the cross coupling of one-dimensional logistic maps. Int J Comput Netw Inf Secur 13(5):40–54. https://doi.org/10.5815/ijcnis.2021.05.04

    Article  Google Scholar 

  32. Mamta BB, Gupta KC, Li VCM, Leung KE, Psannis, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Autom Sin 8(12):1877–1890. https://doi.org/10.1109/JAS.2021.1004003

    Article  Google Scholar 

  33. Mukherjee I, Ganguly R (2018) Multiple video clips preservation using folded back audio-visual cryptography scheme. Multimed Tools Appl 77:5281–5301. https://doi.org/10.1007/s11042-017-4431-5

    Article  Google Scholar 

  34. Neupane A, Alsadoon A, Prasad PWC, Ali RS, Haddad S (2020) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl 79(39–40):29043–29067. https://doi.org/10.1007/s11042-020-09478-1

    Article  Google Scholar 

  35. Nguyen GN, Le Viet NH, Elhoseny M, Shankar K, Gupta BB, El-Latif AAA (2021) Secure blockchain enabled cyber–physical systems in healthcare using deep belief network with ResNet model. J Parallel Distrib Comput 153:150–160. https://doi.org/10.1016/j.jpdc.2021.03.011

    Article  Google Scholar 

  36. Pankaj S, Dua M (2021) A novel ToCC map and two-level scrambling-based medical image encryption technique. Netw Model Anal Heal Inf Bioinf 10(1):1–19. https://doi.org/10.1007/s13721-021-00324-4

    Article  Google Scholar 

  37. Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):7445–7471. https://doi.org/10.1007/s11042-016-3319-0

    Article  Google Scholar 

  38. Raghunandan KR, Ganesh A, Surendra S, Bhavya K (2020) Key generation using generalized Pell’s equation in public key cryptography based on the prime fake modulus principle to image encryption and its security analysis. Cybernetics and Information Technologies 20(3):86–101. https://doi.org/10.2478/cait-2020-0030

    Article  Google Scholar 

  39. Ramalingam M, Mat Isa NA, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Procedia Comput Sci 171(2019):1147–1156. https://doi.org/10.1016/j.procs.2020.04.123

    Article  Google Scholar 

  40. Ranjan Kumar HS, Fathimath Safeeriya SP, Aithal G, Shetty S (2017) A survey on key(s) and keyless iMage encryption techniques. Cybern Inf Technol 17(4):134–164. https://doi.org/10.1515/cait-2017-0046

    Article  MathSciNet  Google Scholar 

  41. Ratna AAP et al (2021) Chaos-based image encryption using Arnold’s cat map confusion and Henon map diffusion. Adv Sci Technol Eng Syst 6(1):316–326. https://doi.org/10.25046/aj060136

    Article  MathSciNet  Google Scholar 

  42. Sallam AI, El-Rabaie ESM, Faragallah OS (2018) Efficient HEVC selective stream encryption using chaotic logistic map. Multimedia Systems 24(4):419–437. https://doi.org/10.1007/s00530-017-0568-3

    Article  Google Scholar 

  43. Sarmad M, Malik M, Ali MA, Nasir S, Shah M, Rehman M (2020) Generation of highly nonlinear and dynamic AES Substitution-boxes ( S-boxes ) using Chaos-based rotational matrices. IEEE Access 8:35682–35695. https://doi.org/10.1109/ACCESS.2020.2973679

    Article  Google Scholar 

  44. Shifa A et al (2020) MuLViS: multi-level encryption based security system for surveillance videos. IEEE Access 8:177131–177155. https://doi.org/10.1109/ACCESS.2020.3024926

    Article  Google Scholar 

  45. Shokouh A, Hamid S (2018) “A new method for image encryption by 3D chaotic map,” Pattern Anal Applic, no. 0123456789, https://doi.org/10.1007/s10044-018-0765-5.

  46. Substitution-boxes EB (n.d.) “A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes,” pp. 1–17, https://doi.org/10.3390/e20070525.

  47. Tewari A, Gupta BB (2020) Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int J Semant Web Inf Syst 16(3):20–34. https://doi.org/10.4018/IJSWIS.2020070102

    Article  Google Scholar 

  48. Ul Haq T, Shah T (2020) Algebra-chaos amalgam and DNA transform based multiple digital image encryption. J Inf Secur Appl 54(August):102592. https://doi.org/10.1016/j.jisa.2020.102592

    Article  Google Scholar 

  49. Valli D, Ganesan K (2017) Chaos based video encryption using maps and Ikeda time delay system. Eur Phys J Plus 132(12). https://doi.org/10.1140/epjp/i2017-11819-7

  50. Yan W, Ding Q (2021) “A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps. , pp. 1–11. Nonlinear-Transform of 1D Chaotic Maps,” pp. 1–11

  51. Yang C, Wei X, Wang C (2021) S-box design based on 2d multiple collapse chaotic map and their application in image encryption. Entropy 23(10). https://doi.org/10.3390/e23101312

  52. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608. https://doi.org/10.1007/s11042-017-4637-6

    Article  Google Scholar 

  53. Zahid AH et al (2021) A novel construction of dynamic S-box with high nonlinearity using heuristic evolution. IEEE Access 9:67797–67812. https://doi.org/10.1109/ACCESS.2021.3077194

    Article  Google Scholar 

  54. Zhang L, Zhang Z, Zhao T (2021) A novel spatio-temporal access control model for online social networks and visual verification. Int J Cloud Appl Comput 11(2):17–31

    Google Scholar 

  55. Zheng Q, Wang X, Khurram Khan M, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722. https://doi.org/10.1109/ACCESS.2017.2775038

    Article  Google Scholar 

  56. Zhu H, Tong X, Wang Z, Ma J (2020) A novel method of dynamic S-box design based on combined chaotic map and fitness function. Multimed Tools Appl 79(17–18):12329–12347. https://doi.org/10.1007/s11042-019-08478-0

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepti Dhingra.

Ethics declarations

I, Deepti, on the behalf of all the authors declare that:

This study did not receive any finding from any resource.

All the authors and the submitted manuscript do not have any conflict of interest.

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhingra, D., Dua, M. A chaos-based novel approach to video encryption using dynamic S-box. Multimed Tools Appl 83, 1693–1723 (2024). https://doi.org/10.1007/s11042-023-15593-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15593-6

Keywords

Navigation