Skip to main content
Log in

Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the last few years, the volume of internet traffic has increased enormously. A significant portion of the internet traffic is constituted by applications that stream multimedia data from one part of the world to another. The enormity of the video data requires the Content Delivery Network to distribute the content efficiently and securely among the consumers. The secure and authenticated distribution can be achieved by the end-to-end encryption of video. In this paper, one time random key algorithm and the algorithms and methods based on permutation techniques have been proposed to encrypt the video frames selectively and these encrypted frames are transmitted over the network along with the other video frames. The proposed encryption methods extract the colour channels like Red, Green and Blue from the video frames, and they are encrypted by applying row-column permutation cipher, One Time Pad cipher and row permutation cipher. Encryption of the video frames has been performed at two levels by combining the one-time random key algorithm and permutation techniques to provide security to the video. These encryption techniques have been applied on the twenty-five, thirty, and thirty-five, and so on, up to fifty per cent of the total frames available in the video. The experimental results, histogram analysis and parameters like average Peak Signal-to-noise Noise Ratio (PSNR) and Structural Similarity Index (SSIM) values measure the quality of the video obtained after the application of the proposed methods on the video to be transmitted over the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Algorithm 2
Fig. 1
Fig. 2
Fig. 3
Algorithm 3
Algorithm 4
Fig. 4
Fig. 5
Fig. 6
Algorithm 5
Algorithm 6
Fig. 7
Fig. 8
Algorithm 7
Algorithm 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42
Fig. 43
Fig. 44

Similar content being viewed by others

Data Availability

The input files and the video data are available through this link https://github.com/vijayamurari/selective-encryption.git

Notes

  1. https://github.com/vijayamurari/selective-encryption.git

References

  1. Kester Q-A, Koumadi KM (2012) Cryptographie technique for image encryption based on the RGB pixel displacement pp 74–77

  2. Kester Q-A (2013) Image encryption based on the RGB pixel transposition and shuffling. Int J Comput Netw Inform Secur 5:43–50

    Google Scholar 

  3. Kester Q-A et al (2014) A new cryptographic encryption algorithm for securing digital images. Int J Comput Appl 94:28–33

    Google Scholar 

  4. Swapnali L, Megha J, Ranjeet S, Belsare PP, Ashwini GB (2017) A cryptographic key generation on a 2D graphics using RGB pixel shuffling and transposition. Springer, pp 189–196

  5. Amnesh G, Reji M, Nidhi C (2011) Image encryption based on inter pixel displacement of RGB values inside custom slices. Int J Comput Appl 36:8–11

    Google Scholar 

  6. Goel A, Chandra NA (2012) Technique for image encryption with combination of pixel rearrangement scheme based on sorting group-wise of RGB values and explosive inter-pixel displacement. Int J Image Grap Signal Process 4:16–22

    Google Scholar 

  7. Goel A, Chandra N (2012) Image encryption based on random point image slicing and recursive application of RGB value displacement on slices. Int J Comput Appl 39:7–10

    Google Scholar 

  8. Putrie VM, Sari C, Setiadi D, Rachmawanto E (2018) Super encryption using transposition-hill cipher for digital color image pp 152–157

  9. Ranjan KHS, Fathimath SSP, Shetty S, Aithal G (2017) Image encryption based on pixel transposition and Lehmer Pseudo random number generation pp 1188–1193

  10. Mathews R, Goel A, Saxena P, Mishra VP (2011) Image encryption based on explosive inter-pixel displacement of the RGB attributes of a pixel

  11. Rizal A, Utomo DSB, Rihartanto R, Susanto A (2019) Encryption of RGB image using hybrid transposition 57–61 (Atlantis Press, 2019/07). https://doi.org/10.2991/iclick-18.2019.13

  12. Somaraj S, Hussain MA (2016) A novel image encryption technique using RGB pixel displacement for color images, pp 275–279

  13. Ramya SB, Madhu S (2017) A novel method for encryption of images based on displacement of RGB pixels. Int J Trend Res Dev (IJTRD)

  14. Djamalilleil A et al (2018) Modified transposition cipher algorithm for images encryption pp 1–4

  15. Sharma S, Kumar A, Hada Ns, Choudhary G, Kashif SM, Rajagopal S, Faruki P, Popat K (eds) (2022) Image encryption algorithm based on timeout, pixel transposition and modified fisher-yates shuffling. In: Rajagopal S, Faruki P, Popat K (eds) Advancements in smart computing and information security, Springer, pp 24–43

  16. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J V Commun Image Represent 28:21–27

  17. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tools Appl 76

  18. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Article  Google Scholar 

  19. Kester Q-A et al (2015) A cryptographic encryption technique of MPEG digital video images based on RGB layer pixel values. Springer International Publishing, Cham

  20. Kulkarni A, Kulkarni S, Haridas K, More A (2013) Proposed video encryption algorithm v/s other existing algorithms: a comparative study. arXiv:1303.3485

  21. Spanos G, Maples T (1995) Performance study of a selective encryption scheme for the security of networked, real-time video, 2–10

  22. Tang L (1997) Methods for encrypting and decrypting mpeg video data efficiently

  23. Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater JJ (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008

  24. EncryptionLintian Qiao, Klara Nahrstedt (1997) A new algorithm for MPEG video. https://api.semanticscholar.org/CorpusID:17410323

  25. Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm, MULTIMEDIA ’98, 81–88 (Association for Computing Machinery, New York, NY. USA. https://doi.org/10.1145/290747.290758

  26. Bhargava B, Shi C, Wang SY (2004) Mpeg video encryption algorithms. Multimed Tools Appl pp 57–79

  27. Lee M, Jang E (2020) Start code-based encryption and decryption framework for HEVC. IEEE Access 8:202910–202918

    Article  Google Scholar 

  28. Farajallah M, Gautier G, Hamidouche W, Déforges O, El Assad SE (2022) Selective encryption of the versatile video coding standard. IEEE Access 10:21821–21835. https://doi.org/10.1109/ACCESS.2022.3149599

    Article  Google Scholar 

  29. Cheng S, Wang L, Ao N, Han Q (2020) A selective video encryption scheme based on coding characteristics. Symmetry 12. https://www.mdpi.com/2073-8994/12/3/332

  30. Peng F, Zhang X, Lin Z-X, Long M (2020) A tunable selective encryption scheme for H.265/HEVC based on chroma IPM and coefficient scrambling. IEEE Trans Circ Syst Video Technol 30:2765–2780

    Article  Google Scholar 

  31. Huang M, Yang C, Li H, Shen J (2019) Sparse selective encryption for HEVC 4K video using spatial error spread. J Internet Technol 20:1589–1600

    Google Scholar 

  32. Neda D, Ali B, Azadegan H (2020) A selective encryption for H.264/AVC videos based on scrambling. Multimed Tools Appl 89:115994

  33. He J, Xu Y, Luo W, Tang S, Huang J (2020) A novel selective encryption scheme for H.264/AVC video with improved visual security. Signal Process Image Commun 89:115994

  34. Vijaya MT, Ravishankar KC, Raghu ME (2021) Selective encryption of the audio extracted from the video streamed over the content delivery network, pp 98–102

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijaya Murari T..

Ethics declarations

Conflict of Interests

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Murari T., V., K C, R. & M E, R. Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18613-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18613-1

Keywords

Navigation