Abstract
Video Encryption is the process of converting the video into an unrecognizable form to protect it from unauthorized access. This paper proposes a novel video encryption method based on a dynamic S-box generated using the Sine-Tent cosine chaos map. The proposed method mainly comprises four phases. In the first step, an input video is split into frames, and frame rotation is performed to shuffle the pixels within the frame. The second stage involves the generation of a novel dynamic S-Box by using the Sine-Tent Cosine map. The number of dynamic S-boxes to be generated in the method is equal to the number of frames in a video, as each frame is encrypted by a different S-box. As every time a new S-box is used for encryption, it makes it difficult for the adversary to access the information. Frame padding is used to protect the metadata of the frame, and to make the size of the video frame compatible with the S-box dimensions. In the third stage, generated dynamic S-Box is used to permute pixels within the video frame. At last, the pixels of the frame are diffused by applying add and mod operators on a chaotic sequence generated by a chaotic Sine-Tent Cosine map to obtain the final cipher frame as output. The differential analysis and statistical analysis are performed by using parameters such as Unified Average Changed Intensity (UACI), Number of Changing Pixel Rate (NPCR), and Correlation Coefficient (CC), Information Entropy, respectively. The work also tests the key sensitivity, Avalanche effect, and Peak Signal to Noise Ratio (PSNR), of the proposed scheme. The obtained results prove that the proposed scheme is secure from many attacks such as differential attacks, statistical attacks, known plain-text, and Brute Force attacks, and provides a higher level of security as compared to other existing video encryption methods.
Similar content being viewed by others
Data availability
I, Deepti, on the behalf of all the authors declare that:
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Alarood AA, Alsolami E, Al-Khasawneh MA, Ababneh N, Elmedany W (2021) “IES: hyper-chaotic plain image encryption scheme using improved shuffled confusion-diffusion,” Ain Shams Eng J, no. xxxx, https://doi.org/10.1016/j.asej.2021.09.010.
Alawida M, Samsudin A, Sen J, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58. https://doi.org/10.1016/j.sigpro.2019.02.016
Alawida M, Samsudin A, Teh JESEN, Alshoura WH (2019) “Digital Cosine Chaotic Map for Cryptographic Applications,” pp. 150609–150622
Alghafis A, Munir N, Khan M (2021) An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component. Multimed Tools Appl 80(5):7967–7985. https://doi.org/10.1007/s11042-020-10142-x
Al-hayani N (2013) “Simultaneous video compression and encryption for real-time secure transmission,” 8th Int Symp Image Signal Process Anal (ISPA 2013), no. Ispa, pp. 240–245
Alshammari BM, Guesmi R, Guesmi T, Alsaif H, Alzamil A (2021) Implementing a symmetric lightweight cryptosystem in highly constrained iot devices by using a chaotic s-box. Symmetry (Basel) 13(1):1–20. https://doi.org/10.3390/sym13010129
Ansari N, Shaikh R (2016) A Keyless Approach for RDH in Encrypted Images using Visual Cryptography. Phys Procedia 78(December 2015):125–131. https://doi.org/10.1016/j.procs.2016.02.021
Belazi A, Kharbech S, Aslam N, Talha M, Xiang W (2022) Improved sine-tangent chaotic map with application in medical images encryption. J Inf Secur Appl 66(March):103131. https://doi.org/10.1016/j.jisa.2022.103131
Bisht A, Dua M, Dua S (2018) “A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform,” J Ambient Intell Humaniz Comput, vol. 0, no. 0, p. 0, https://doi.org/10.1007/s12652-018-1072-0
Boyadjis B, Bergeron C, Pesquet-Popescu B, Dufaux F (2017) Extended selective encryption of H.264/AVC (CABAC)-and HEVC-encoded video streams. IEEE Trans Circ Syst Vid Technol 27(4):892–906. https://doi.org/10.1109/TCSVT.2015.2511879
Cassal-Quiroga BB, Campos-Cantón E (2020) “Generation of dynamical S-boxes for block ciphers via extended logistic map,” Math Probl Eng, vol. 2020, https://doi.org/10.1155/2020/2702653.
Chandrasekaran J, Thiruvengadam SJ (2015) “Ensemble of Chaotic and Naive Approaches for performance enhancement in video encryption,” Sci World J, vol. 2015, https://doi.org/10.1155/2015/458272.
Chen Z, Ip WH, Chan CY, Yung KL (2010) Two-level chaos-based video cryptosystem on H.263 codec. Nonlin Dyn 62(3):647–664. https://doi.org/10.1007/s11071-010-9751-1
Dua M, Suthar A, Garg A, Garg V (2021) An ILM-cosine transform-based improved approach to image encryption. Complex Intell Syst 7(1):327–343. https://doi.org/10.1007/s40747-020-00201-z
Dua M, Makhija D, Yamini P, Manasa L, Mishra P (2022) “3D chaotic map - cosine transformation based approach to video encryption and decryption,” Open Comput Sci, pp. 37–56
Eid M, Ibrahim A (2021) “A Fast Real-Time Video Encryption / Decryption Technique Based on Hybrid Chaotic Maps,” no. February
García S, Fernández A, Luengo J, Herrera F (2010) Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: experimental analysis of power. Inf Sci (Ny) 180(10):2044–2064. https://doi.org/10.1016/j.ins.2009.12.010
Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based medical internet of things (miots): a survey. Int J Softw Sci Comput Intell 14(1):1–16
Haridas D, Kiran DS, Patel S, Raghavendra K, Venkatraman S, Venkatraman R (2021) Real-time compressed video encryption: based on Quasigroup on system on Chip (SOC). SN Comput Sci 2(5):1–14. https://doi.org/10.1007/s42979-021-00793-4
Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80–94. https://doi.org/10.1016/j.ins.2014.11.018
Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403–419. https://doi.org/10.1016/j.ins.2018.12.048
Ibrahim DR, Je ST, Abdullah R (2021) An overview of visual cryptography techniques. Multimed Tools Appl 80:31927–31952. https://doi.org/10.1007/s11042-021-11229-9
Jun WJ, Fun TS (2021) A new image encryption algorithm based on single S-box and dynamic encryption step. IEEE Access 9:120596–120612. https://doi.org/10.1109/ACCESS.2021.3108789
Karmakar J, Pathak A, Nandi D, Mandal MK (2021) Sparse representation based compressive video encryption using hyper-chaos and DNA coding. Digit Signal Process 117:103143. https://doi.org/10.1016/j.dsp.2021.103143
Kordov K, Dimitrov G (2021) A new symmetric digital video encryption model. Cybern Inf Technol 21(1):50–61. https://doi.org/10.2478/cait-2021-0004
Kumar A, Dua M (2021) Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multimed Tools Appl 80(18):27785–27805. https://doi.org/10.1007/s11042-021-10970-5
Kumar CM, Vidhya R, Brindha M (2022) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52(3):2556–2585. https://doi.org/10.1007/s10489-021-02508-x
Li H, Wang Y, Zuo Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115(February 2018):197–207. https://doi.org/10.1016/j.optlaseng.2018.12.002
Liu J, Xu Y (2022) T-Friedman test: a new statistical test for multiple comparison with an adjustable conservativeness measure. Int J Comput Intell Syst 15(1):1–19. https://doi.org/10.1007/s44196-022-00083-8
Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidim Syst Sign Process 30(4):1637–1657. https://doi.org/10.1007/s11045-018-0622-0
Malladar RS, Kunte SR (2021) Selective video encryption using the cross coupling of one-dimensional logistic maps. Int J Comput Netw Inf Secur 13(5):40–54. https://doi.org/10.5815/ijcnis.2021.05.04
Mamta BB, Gupta KC, Li VCM, Leung KE, Psannis, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Autom Sin 8(12):1877–1890. https://doi.org/10.1109/JAS.2021.1004003
Mukherjee I, Ganguly R (2018) Multiple video clips preservation using folded back audio-visual cryptography scheme. Multimed Tools Appl 77:5281–5301. https://doi.org/10.1007/s11042-017-4431-5
Neupane A, Alsadoon A, Prasad PWC, Ali RS, Haddad S (2020) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl 79(39–40):29043–29067. https://doi.org/10.1007/s11042-020-09478-1
Nguyen GN, Le Viet NH, Elhoseny M, Shankar K, Gupta BB, El-Latif AAA (2021) Secure blockchain enabled cyber–physical systems in healthcare using deep belief network with ResNet model. J Parallel Distrib Comput 153:150–160. https://doi.org/10.1016/j.jpdc.2021.03.011
Pankaj S, Dua M (2021) A novel ToCC map and two-level scrambling-based medical image encryption technique. Netw Model Anal Heal Inf Bioinf 10(1):1–19. https://doi.org/10.1007/s13721-021-00324-4
Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):7445–7471. https://doi.org/10.1007/s11042-016-3319-0
Raghunandan KR, Ganesh A, Surendra S, Bhavya K (2020) Key generation using generalized Pell’s equation in public key cryptography based on the prime fake modulus principle to image encryption and its security analysis. Cybernetics and Information Technologies 20(3):86–101. https://doi.org/10.2478/cait-2020-0030
Ramalingam M, Mat Isa NA, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Procedia Comput Sci 171(2019):1147–1156. https://doi.org/10.1016/j.procs.2020.04.123
Ranjan Kumar HS, Fathimath Safeeriya SP, Aithal G, Shetty S (2017) A survey on key(s) and keyless iMage encryption techniques. Cybern Inf Technol 17(4):134–164. https://doi.org/10.1515/cait-2017-0046
Ratna AAP et al (2021) Chaos-based image encryption using Arnold’s cat map confusion and Henon map diffusion. Adv Sci Technol Eng Syst 6(1):316–326. https://doi.org/10.25046/aj060136
Sallam AI, El-Rabaie ESM, Faragallah OS (2018) Efficient HEVC selective stream encryption using chaotic logistic map. Multimedia Systems 24(4):419–437. https://doi.org/10.1007/s00530-017-0568-3
Sarmad M, Malik M, Ali MA, Nasir S, Shah M, Rehman M (2020) Generation of highly nonlinear and dynamic AES Substitution-boxes ( S-boxes ) using Chaos-based rotational matrices. IEEE Access 8:35682–35695. https://doi.org/10.1109/ACCESS.2020.2973679
Shifa A et al (2020) MuLViS: multi-level encryption based security system for surveillance videos. IEEE Access 8:177131–177155. https://doi.org/10.1109/ACCESS.2020.3024926
Shokouh A, Hamid S (2018) “A new method for image encryption by 3D chaotic map,” Pattern Anal Applic, no. 0123456789, https://doi.org/10.1007/s10044-018-0765-5.
Substitution-boxes EB (n.d.) “A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes,” pp. 1–17, https://doi.org/10.3390/e20070525.
Tewari A, Gupta BB (2020) Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int J Semant Web Inf Syst 16(3):20–34. https://doi.org/10.4018/IJSWIS.2020070102
Ul Haq T, Shah T (2020) Algebra-chaos amalgam and DNA transform based multiple digital image encryption. J Inf Secur Appl 54(August):102592. https://doi.org/10.1016/j.jisa.2020.102592
Valli D, Ganesan K (2017) Chaos based video encryption using maps and Ikeda time delay system. Eur Phys J Plus 132(12). https://doi.org/10.1140/epjp/i2017-11819-7
Yan W, Ding Q (2021) “A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps. , pp. 1–11. Nonlinear-Transform of 1D Chaotic Maps,” pp. 1–11
Yang C, Wei X, Wang C (2021) S-box design based on 2d multiple collapse chaotic map and their application in image encryption. Entropy 23(10). https://doi.org/10.3390/e23101312
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608. https://doi.org/10.1007/s11042-017-4637-6
Zahid AH et al (2021) A novel construction of dynamic S-box with high nonlinearity using heuristic evolution. IEEE Access 9:67797–67812. https://doi.org/10.1109/ACCESS.2021.3077194
Zhang L, Zhang Z, Zhao T (2021) A novel spatio-temporal access control model for online social networks and visual verification. Int J Cloud Appl Comput 11(2):17–31
Zheng Q, Wang X, Khurram Khan M, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722. https://doi.org/10.1109/ACCESS.2017.2775038
Zhu H, Tong X, Wang Z, Ma J (2020) A novel method of dynamic S-box design based on combined chaotic map and fitness function. Multimed Tools Appl 79(17–18):12329–12347. https://doi.org/10.1007/s11042-019-08478-0
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
I, Deepti, on the behalf of all the authors declare that:
This study did not receive any finding from any resource.
All the authors and the submitted manuscript do not have any conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dhingra, D., Dua, M. A chaos-based novel approach to video encryption using dynamic S-box. Multimed Tools Appl 83, 1693–1723 (2024). https://doi.org/10.1007/s11042-023-15593-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15593-6