Abstract
Multimedia information usage is increasing with new technologies such as the Internet of things (IoT), cloud computing, and big data processing. Video is one of the most widely used types of multimedia. Videos are played and transmitted over different networks in many IoT applications. Consequently, securing videos during transmission over various networks is necessary to prevent unauthorized access to the video's content. The existing securing schemes have limitations in terms of high resource consumption and high processing time, which are not liable to IoT devices with limited resources in terms of processor size, memory, time, and power consumption. This paper proposed a new encryption scheme for securing the colored videos. The video frames are extracted, and then, the frame components (red, green, and blue) are separated and padded by zero. Then, every frame component (channel) is split into blocks of different sizes. Then, the scrambled blocks of a component are obtained by applying a zigzag scan, rotating the blocks, and randomly changing the blocks' arrangements. Finally, a secret key produced from a chaotic logistic map is used to encrypt the scrambled frame component. Security analysis and time complexity are used to evaluate the efficiency of the proposed scheme in encrypting the colored videos. The results reveal that the proposed scheme has high-level security and encryption efficiency. Finally, a comparison between the proposed scheme and existing schemes is performed. The results confirmed that the proposed scheme has additional encryption efficiency.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
With the fast evolution of network technology and multimedia applications, video applications such as video-on-demand (VOD), video meetings, pay-tv, and video surveillance have been widely used. Because the video transmission depends on different networks, the video content may be captured because of the anatomy of the public channels. Securing colored videos during transmission and storage has become a challenging topic in recent years. The general video security objectives are availability, integrity, and confidentiality [1]. In general, three methods, i.e., video encryption (cryptography) [2,3,4], video steganography [5,6,7,8], and video watermarking [9, 10] could be used to achieve security. Cryptography is the most efficient technique to provide security to the colored videos by converting the raw video into an unintelligible video form using a secret key. The plain video can be restored only with the knowledge of the secret key. Video encryption techniques use two building blocks proposed by Shannon diffusion and confusion [11].
In general, image and video encryption algorithms are divided into full encryption and compression-combined encryption (selective encryption) [12]. Each of them has advantages and limitations. In full encryption [13,14,15,16,17,18,19], the whole image or video content is encrypted with a novel method directly, as shown in Fig. 1b. The full encryption algorithms are applied to uncompressed or compressed videos using any compression method [20]. The full encryption algorithms provide high-security encryption but take a long processing time. They are used in significant applications such as military and medical applications. In selective encryption [21,22,23], the video data are partially distorted by the encryption process, and the encrypted video is still partially intelligible after the encryption, as shown in Fig. 1c. They are used in applications that require low processing time. The proposed scheme wants to combine the advantages of the two mentioned methods to achieve good encryption and low processing time.
Because of the high correlation of the video frame neighboring pixels and the strong relationship between the video frames, traditional algorithms such as AES and DES could not guarantee high performance and low time processing for video encryption. The AES and DES are also unsuitable for encrypting colored video in real time [24]. Therefore, several algorithms for multimedia encryption were proposed [25,26,27,28,29,30,31,32,33,34]. These algorithms introduced by several academicians and researchers use different techniques such as DNA encoding and chaotic maps to encrypt images and videos securely and robustly. The most recent multimedia encryption methods are summarized in this section.
In [13], Li et al. presented a video encryption scheme that uses different chaotic algorithms and depends on the amount of information in each channel of a video frame. The video file is divided into a video stream and an audio stream. The video file stream is converted into YCbCr color space. The Arnold map and DNA encoding algorithm encrypt the Y channel, and the Lorenz hyperchaotic map is used to encrypt the other channels, where this scheme requires high-time processing. Yasser et al. proposed a multimedia encryption scheme based on hybrid-chaotic [19]. The proposed cryptosystem includes different media types such as videos, images, speech, and text. Alarifi et al. [16] developed a new hybrid cryptosystem for compressed video files based on chaotic maps, DNA sequences, and a modified Mandelbrot set. The scheme uses the Arnold map to generate three keys, and then, the encoding of the keys is performed with DNA sequences. The Hamming distance between the keys and a compressed YCbCr video frame is applied, encoding the result, and confusion and diffusion principles are applied. Valli and Ganesan[35] implemented a video encryption system that uses a substitution box to achieve diffusion and uses two different schemes. The first scheme is the higher-dimensional 12D chaos structure, and the other uses the Ikeda delay differential equation. The proposed drawbacks are the complexity of the key and the time that the encryption process takes. Kumar et al. [36] suggested a secure scheme based on chaos for video encryption. The algorithm provides a three-level of security: random selection of the frame, permutation order of the frame, and diffusion of the frame. In [37], Song et al. proposed a secure scheme to encrypt quantum videos. The proposed consists of three steps. First, permutation of the inter-frame position based on keys generated from an improved logistic map. Second, geometric transformation and improved logistic map change intra-frame pixels position. Finally, the quantum controlled-XOR operations and improved logistic map were used to encrypt the high 4-intra-frame-qubit-planes. In [38], Ye et al. used frequency domain encryption. First, the original image is transformed with the discrete wavelet transform and then compressed. Then, the carrier image is processed by lifting the wavelet transform and discrete cosine transform together with a Schur decomposition. Visually meaningful image encryption is achieved by embedding operation at the end. The encryption in the frequency domain improves encryption efficiency, but the implementation of frequency domain transformation leads to data loss. In [39], each channel of the color image was encrypted by the multi-parameter fractional discrete Tchebyshev moments. In [40], Gong et al. studied four-dimensional chaotic systems for image encryption applications. A new opto-digital color picture encryption scheme based on a compound chaotic map, the reality-preserving fractional Hartley transformation, and the piecewise linear chaotic map for image pixel replacement, optical processing, and permutation is suggested [41]. The proposed technique has a high sensitivity to keys and greater protection.
An overview of different schemes for securing colored video is introduced. Still, they have some drawbacks and vulnerabilities: (1) the running time of the related algorithms is high and does not meet the real-time applications. (2) Some related algorithms are complex and unsuitable for IoT devices. (3) Some related algorithms evaluate their proposed work based on test images and do not investigate the test videos. (4) Some related algorithms do not investigate the effect of different noises in the security performance analysis. Motivated by previous points, this paper introduces a new scheme for securing the colored video with high-quality encryption to improve such shortcomings. The proposed scheme consists of a video preprocessing step plus four main steps: colored video components extraction and padding, frame components splitting, frame components scrambling, key generation, and diffusion step. The input-colored video is preprocessed to extract individual frames. The three video components (channels), red, green, and blue, are separated from each frame and padded by zeros. The four main steps are applied to each frame channel independently. First, the plain video frame channel is split into blocks, and the blocks are further split into sub-blocks by applying a new frame channel dividing scheme. Second, a scrambled frame channel is obtained by applying a zigzag scan in the blocks and the sub-blocks; then, a counterclockwise rotation by a 90° is applied to all blocks, and then, the blocks are shuffled randomly. Third, a key is generated based on the logistic map. Finally, the encrypted frame channel is obtained by applying the XOR function between the generated key and the scrambled frame channel.
The paper's contributions are summarized as follows:
-
1.
A novel splitting method is introduced for each frame channel.
-
2.
Random shuffling is performed between blocks to get a scrambled frame channel.
-
3.
Diffuse the scrambled component using the logistic map, where the initial value of the logistic map is based on the first input frame component, making the proposed method robust against differential attacks.
-
4.
The results show that the proposed scheme takes low processing time to encrypt the colored videos compared to the literature.
The rest of this paper is coordinated as follows. The proposed scheme is demonstrated in Sect. 2 in detail. Section 3 presents the simulation results and security analysis. Eventually, the work is concluded in Sect. 4.
2 The proposed video encryption method
This section describes the proposed method in detail. The raw colored video is preprocessed and encrypted in an unintelligible format. The decryption process is applied to get the original colored video. Figure 2 shows an illustrative diagram of the total steps.
2.1 Preprocessing the video
-
A.
Video components extraction the proposed method is applied to each frame channel independently, so the input colored video is preprocessed to extract individual frames. Then, the frame channels are separated from each frame.
-
B.
Frame components padding the encryption and decryption process needs the input video frame's size to be multiple of the block size. So, after the frame components are separated, it is needed to pad them by zeros according to the size of these components.
2.2 Encryption process
Here, the proposed scheme for encrypting colored video consists of four phases. These phases are performed on each channel independently. In the first phase, channel splitting is performed. In the second phase, channel scrambling (permutation) is applied. Key streams are generated from the logistic map in the third phase. The channel diffusion process is performed in the last phase.
2.2.1 Channel splitting
A raw frame channel is partitioned into blocks of equal size. The block size dimensions that the users can select from and are suitable for the scheme are 16, 32, and 64. Then, a random vector with a length equal to the number of blocks is generated. The blocks are further partitioned into sub-blocks or kept without partition based on the generated vector.
2.2.2 Channel scrambling
The arrangements of the frame channel's pixels are changed in this phase as follows:
-
(a)
The zigzag scan is used to permute the positions of the pixels in each block (undivided and subdivided blocks) of the divided channel.
-
(b)
Each block (undivided block and subdivided block) is rotated by 90°.
-
(c)
For every block in the divided channel, a random number is generated to create a vector \( r\).
-
(d)
Depending on the vector \( r\), a random permutation between blocks is performed to obtain the permuted frame channel.
2.2.3 Key generation
A new key vector \(K\) from the logistic map is generated for every frame channel. The mathematical equation of the logistic map is:
where 0 < \(b\) ≤ 4, and a starting value 0 < \(Y_{0}\) < 1. When \(b\) ∈ [3.57, 4], the map is chaotic. The starting value \(Y_{0}\) depends on the input colored video. The key generation steps for every frame channel are:
-
(a)
The starting value of the logistic map is computed.
-
For the first key vector (for the first channel of the first frame), \(Y_{0}\) is calculated by:
$$ Y_{0} = \frac{{\mathop \sum \nolimits_{i = 1}^{M} \mathop \sum \nolimits_{j = 1}^{N} C\left( {i,j} \right)}}{M \times N \times 255 \times 3} + 10^{ - 20} $$(2)where \(C \) is the input frame channel, and M and N are the input size.
-
For other key vectors (for the other channels in the same frame or other frames), \(Y_{0} \) value equals the last value of the previous key vector \( K\left( {MN} \right)\) (in the previously processed channel).
-
-
(b)
Get a sequence \(S_{{{\text{temp}}}} \) by iterating Eq. (1) \( N_{0} + MN \) times, then generate a new sequence \(S\) with size \( MN\) by discarding the first \(N_{0}\) values of \( S_{temp}\).
-
(c)
Generate the key vector \(K\) by equation (3):
$$ K\left( i \right) = mod\left( {floor\left( {S\left( i \right) \times 10^{14} } \right), 256} \right), \quad i = 1\;{\text{ to}} MN $$(3)
2.2.4 Channel diffusion
In this phase, a bit-wise exclusive OR function is applied between every value in the generated key vector and the corresponding value in the permuted frame channel vector. After the channel pixels values are changed, an encrypted frame channel is generated. Algorithm 1 presents the steps of the encryption process. Also, Fig. 3 shows the flowchart of the scheme phases.
2.3 Decryption process
The decryption process can be constructed by inverting the encryption phases with the original keys to get the plain channels of each frame. The decryption steps are:
-
(1)
The bit-wise exclusive OR function is performed between every value in the key vector and the corresponding value in the encrypted frame channel vector.
-
(2)
Reordering the channel blocks placements to their original placements based on the random vector.
-
(3)
Apply a rotation by -90° and inverse zigzag pattern to all blocks to rearrange the original placements of the pixels.
3 Simulation results and security analysis
This section examines the colored video encryption scheme for privacy and robustness. The colored videos used for testing are Train.avi (192 × 352 × 3), Rhinos.avi (240 × 320 × 3), Viptrain.avi (240 × 360 × 3) and Flamingo.avi (192 × 352 × 3) taken from Valli and Ganesan [35], and Foreman.avi (352 x 288 x 3) downloaded from YUV Sequences [42]. Figure 4 shows the test video samples. The proposed scheme is executed using MATLAB (R2015a) on a laptop that has the subsequent specifications: Intel(R) Core(TM) i7-8750H CPU @ 2.20GHz 2.21 GHz, 16 GB memory, and Windows 11 OS. The algorithm's initial parameters are: In the channel splitting step, the dimension of the blocks is 16 (where n = 4), \(b = 3.9\) for the logistic map, and \(N_{0}\) = 1000 for the skipped elements.
3.1 Visual analysis
Different evaluation metrics have been used with the proposed scheme. The first metric used to evaluate the scheme is the visual inspection. The encryption/decryption results of the videos are displayed in Fig. 4. The results indicate that the scheme hides all details within the test videos, and the receiver side restores the original videos successfully.
3.2 Histogram analysis
A histogram is an essential tool in evaluating the efficiency of the encryption scheme. It represents the number of occurrences of each pixel value in a frame channel. The flat histogram indicates that the frame channel can resist different types of statistical attacks [43]. Figures 5, 6, 7, 8 and 9 show the histograms for various videos' 10th original, encrypted, and decrypted frames. It is observed that the encrypted frames histograms have a uniform distribution form and are not similar to their corresponding original frames histograms.
Consequently, the proposed scheme hides any pattern in the frames of the test videos. Additionally, the decrypted frames histograms and their corresponding original frames are the same. So, the scheme can recover the original frame from the encrypted one successfully.
3.3 Correlation analysis
Principally in each video frame, there is a high correlation between neighboring pixels as the intensity values are nearly the same. These relationships must be reduced to protect the video frame against different attacks. The adjacent pixels pair's correlation can be calculated using the following equations.
where \(A\) and \(B\) represent the two adjacent pixel values, and \(s\) is the total number of selected pairs. Figures 10, 11 and 12 show the horizontal (H), vertical (V), and diagonal (D) correlation distributions of 6000 random pairs of neighboring pixels selected for the 10th original and encrypted frame of the Flamingo test video. The correlation values of 6000 random pairs of adjacent pixels for the 10th original and encrypted frame of various videos, along with H, V, and D directions, are presented in Table 1. From the results, the values of the original frames are close to one. On the contrary, the values of the encrypted frames are very low and very close to zero. So, there is no correlation between pixels in the frames encrypted by the proposed scheme. Therefore, the proposed scheme can resist statistical attacks.
3.4 Entropy analysis
The information entropy is used to measure the randomness of the video frames. The Shannon entropy defines the degree of randomness of a video frame. The mathematical definition of entropy is calculated by
where the \(m_{i}\) represents the ith gray value in a video frame, and \(p\left( {m_{i} } \right)\) is the probability of \(m_{i}\) in a video frame. To ensure the randomness of the encrypted video frame with the suggested scheme, the entropy value of the encrypted frame should be near 8. The entropy values for the 10th frame of various videos are presented in Table 2. From the table, all values are close to 8, which indicates that the videos protected by the proposed scheme are robust against entropy attacks.
3.5 Differential attack
An adversary can conjecture information about the video frame by changing an original video frame and then encrypting the original video frame and the modified original video frame using the same encryption method. The adversary compares the two encrypted frames with the plain frame and searches for the relationships between them. Therefore, the encryption scheme should generate a different encrypted frame with every little change in the original. The metrics used to evaluate algorithm performance for this aim are NPCR (Number of Pixels Change Rate) and UACI (Unified Average Changing Intensity). The mathematical calculations for the metrics are:
where \(C_{1}\) and \(C_{2}\) are the encrypted video frame (plain and modified video frames). The modified frame is made by changing one pixel in the plain video frame. M and N are the video frame size. The ideal values for NPCR and UACI are 99.6094 and 33.4635%, respectively. The NPCR and UACI values for the proposed scheme applied on the 10th frame of various videos are presented in Table 3. From the table, NPCR and UACI are very close to the ideal values. Therefore, the videos encrypted by the proposed scheme have great resistance against differential attacks.
3.6 Encryption quality analysis
3.6.1 Histogram deviation (\({\varvec{D}}_{{\varvec{H}}}\))
A metric is used to evaluate the quality of encryption for the proposed scheme by measuring the deviation in pixels values between the original video frame and the encrypted one. The maximum deviation can be estimated by:
where \(K_{i}\) is the difference at gray value \( i\). The large value of maximum deviation states a high deviation in the encrypted video frame from the original one. Table 4 presents the \(D_{H}\) values for the 10th original frame and encrypted frame for various videos using the proposed scheme. From the table, it is observed that the \(D_{H}\) values between the original and encrypted videos are large, proving that the quality of the videos encrypted by the proposed scheme is good enough.
3.6.2 Irregular deviation (\({\varvec{D}}_{{\varvec{I}}}\))
A metric used to measure the maximum irregular deviation quantity in an encrypted video frame caused by an encryption algorithm. The irregular deviation can be estimated by:
where \(H_{i}\) refers to the histogram of the difference between the original and encrypted video frame at index \( i\), and \(A,\) is the mean value of the histogram for the encrypted video frame. The lower value of \(D_{I} \) indicates that the pixel distribution is uniform, and the quality of the encrypted video is high. Table 4 presents the \(D_{I}\) values for the 10th original and encrypted frames for the various videos using the proposed scheme. The results in the table show that the \(D_{I}\) values are low, proving the high quality of the encrypted videos and hence the strength of the proposed scheme.
3.7 PSNR, SSIM, and FSIM analysis
The peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), and feature similarity (FSIM) metrics are used to estimate the quality performance of the encryption and decryption processes. This experiment evaluates the PSNR, SSIM, and FSIM between the original and encrypted video frames. The encryption process is efficient if the result values are low. Also, the PSNR, SSIM, and FSIM are evaluated between the original and decrypted video frames. The decryption process is efficient if the result values are high.
-
(1)
The PSNR measures the ratio between the highest possible power of a signal and the power of distorted noise. The PSNR for a grayscale video frame is measured by:
$$ {\text{PSNR}} = 10 \times \log_{10} \left( {\frac{255 \times 255}{{{\text{MSE}}}}} \right) \left( {{\text{dB}}} \right) $$$$ {\text{MSE}} = \frac{1}{MN} \times \mathop \sum \limits_{i = 1}^{m} \mathop \sum \limits_{j = 1}^{n} \left| {F_{1} \left( {i,j} \right) - F_{2} \left( {i,j} \right)} \right|^{2} $$where \(F_{1}\) is the original video frame component, while \(F_{2}\) is the encrypted one. Small values of PSNR between the original video frame component and the corresponding encrypted one indicate a good encryption process. Table 5 shows the results of PSNR values between the 10th original and encrypted frames for various videos. The proposed scheme has low PSNR values from the table, indicating that the encryption process is efficient. Also, Table 6 shows the results of PSNR values between the 10th original and decrypted frames for various videos. The proposed scheme has high PSNR values from the table, indicating that the decryption process is efficient.
-
(2)
The SSIM index measures the similarity between two video frames and ranges from − 1 to 1 decimal value. The SSIM value can be calculated using:
$$ {\text{SSIM}}\left( {x,y} \right) = \frac{{\left( {2\mu_{x} \mu_{y} + c_{1} } \right)\left( {2\sigma_{xy} + c_{2} } \right)}}{{\left( {\mu_{x}^{2} + \mu_{y}^{2} + c_{1} } \right)\left( {\sigma_{x}^{2} + \sigma_{y}^{2} + c_{2} } \right)}} $$where \( \mu_{x}\) and \( \mu_{y}\), respectively, represent the average value of original frame \(x\) and encrypted frame \( y\), \(\sigma_{x}^{2} \) and \(\sigma_{y}^{2}\), respectively, represent the corresponding variance value, \(\sigma_{xy}\) is the covariance of \( x and y\), and \(c1\) and \(c2\) are constants. Table 5 presents the SSIM values between the 10th original and encrypted frames for various videos. Table 6 presents the SSIM values between the 10th original and decrypted frames for various videos. Getting lower SSIM values between the original and encrypted frames is recommended to prove the encryption process's efficiency. It is recommended to get higher SSIM values between the original and decrypted frames to prove the efficiency of the decryption process. From Tables 5 and 6, the SSIM values between the original and encrypted frames are low, and the SSIM values between the original and decrypted frames are high, proving the quality of the encryption and decryption processes.
-
(3)
FSIM evaluates the local symmetry between the original and encrypted video frames. The FSIM value can be calculated using:
$$ {\text{FSIM}} = \frac{{\mathop \sum \nolimits_{{x \in {\Omega }}} S_{L} \left( x \right) \cdot PC_{m} \left( x \right)}}{{\mathop \sum \nolimits_{{x \in {\Omega }}} PC_{m} \left( x \right)}} $$where \(S_{L} \left( x \right) \) represents the total anticipated similarity between two video frames, \({\Omega }\) is the spatial video frame, and \(PC_{m} \left( x \right) \) is the congruency phase value. Table 5 presents the FSIM values between the 10th original and encrypted frames for various videos. Table 6 presents the FSIM values between the 10th original and decrypted frames for various videos. It is recommended to get lower FSIM values between the original and encrypted frames to prove the efficiency of the encryption process. It is recommended to get higher FSIM values between the original and decrypted frames to prove the efficiency of the decryption process. From Tables 5 and 6, the FSIM values between the original and encrypted frames are low, and the FSIM values between the original and decrypted frames are high, proving the quality of the encryption and decryption processes.
3.8 Chosen-plaintext and known-plaintext attacks analysis
In this section, the resistance of the proposed scheme against chosen-plaintext and known-plaintext attacks is tested. Two different videos are used in this experiment. The first video is white, and the second is a black video. The videos are encrypted using the proposed scheme. The original and encrypted videos are shown in Fig. 13. The encrypted videos have no valuable information. So the proposed scheme has higher robustness against chosen‑plaintext and known‑plaintext attacks. Also, Table 7 shows the entropy value of the original and encrypted videos. From the table, the entropy value of the encrypted videos is very close to the optimal value, reflecting the strength of the proposed scheme.
3.9 Edges detection analysis
The encryption scheme must guarantee to protect the edge information of the encrypted video. The edge differential ratio (EDR) metric is used in this experiment to estimate the edge distortion and is defined by:
Where the pixel values in the edges within the binary form of the original video and encrypted video are \(P\left( {i,j} \right)\) and \(\overline{ P} \left( {i,j} \right)\), respectively. The EDR value should be close to one to ensure that the original and encrypted video is dissimilar. The EDR values between the 10th original and encrypted frames for various videos are presented in Table 8. From the table, the values are close to one, and the proposed scheme guarantees the original video and encrypted video are different. The Laplacian of Gaussian edge detection for the 10th original encrypted and decrypted frames for various videos is displayed in Fig. 14. The displayed results show a big difference between the original and encrypted frames on the edges. So the proposed scheme can hide the main details in the videos. Also, the edges in original frames are similar to those in decrypted frames, proving the proposed scheme's efficiency in decryption.
3.10 Keyspace analysis
The colored video encryption scheme should have a large keyspace to be robust and secure. The scheme can escape from the brute-force attacks if the keyspace \( \ge 2^{100}\). The proposed scheme uses different initial values to generate the secret key: the starting value \( Y_{0}\), and the control parameter \( b\) of the logistic map, and the number of skipped elements \( N_{0}\). We consider the \( Y_{0} and b \) precision is 1016, and \( N_{0}\) precision is 103; therefore, \(10^{35}\) is the total space of the key. So, the proposed scheme can withstand such attacks because the keyspace is larger than 2100.
3.11 Key sensitivity analysis
Any slight modification to the secret key of the encryption scheme should generate considerable changes in the result. The adversary uses a similar secret key to break the encryption scheme in the decryption process. The test video frame is encrypted with a key 1 generated from the chaotic map, with starting value \( Y_{0} = z\) as shown in Fig. 15B to test the key sensitivity. Later the encrypted frame is decrypted twice: once with a slight change in the starting value \( Y_{0} = z + 10^{ - 10}\) as shown in Fig. 15C and again with key 1 as shown in Fig. 15D. It is concluded that only the same secret key used in the encryption process can restore the original frame in the decryption process, and any slight change in the secret key will fail to break the encryption scheme.
3.12 Channel noises attack analysis
After the video is encrypted, it can be transmitted through different communication channels. During the transmission, the encrypted video may be affected by some noise. So, different types of noises are used to prove the efficiency of the proposed scheme's decryption process.
3.12.1 Salt & peppers noise
In this experiment, the salt and pepper noise with variance value 0.005 is added to various encrypted video frames, and then, the decryption process is performed. The effect of this type on a video frame results in black and white dots on the video frame. Figure 16 shows that the decrypted videos are still intelligible, despite the effect of the noise on the video frames, proving the proposed scheme's power.
3.12.2 Gaussian noise
This type of noise occurs due to the limitation of the sensor during the acquisition of the video frames under low-light conditions. In this experiment, the Gaussian noise with a variance value of 0.005 is added to various encrypted video frames, and the decryption process is performed. Figure 17 shows that the decrypted videos are still intelligible, despite the effect of the noise on the video frames.
3.13 Occlusion attack analysis
This section clarifies the decryption capability of the proposed scheme during the transmission of an encrypted video in case part of it has been dropped or lost. The experiment proves that the proposed scheme can resist the occlusion attack. Figure 18 shows the occlusion attacks on the various encrypted video frames and the decrypted frames.
3.14 Execution time
The security scheme should encrypt/decrypt a colored video with low processing time. Various videos have been used to test the proposed scheme processing time. The experiment is carried out multiple times, and the average results are presented in Table 9. It is proven that the proposed scheme encrypts/decrypts the videos with high speed to fit the IoT devices' requirements.
3.15 Time complexity analysis
Each phase's complexity in the proposed scheme is computed, and then, the overall complexity for the proposed scheme is calculated. When the number of rows and columns is \( M and N\) for the input video frame, \(g = 2^{n} \) is the block dimension where \(n = 4\). Therefore, the complexity for the channel splitting phase and scrambling phase is \( O\left( {\left( {M \times N} \right)/g^{2} } \right)\) and for the key generation and the channel diffusion phases is \( O\left( {M \times N} \right)\). Then, \(O\left( {M \times N} \right) \) is the overall complexity for one frame channel. Since, each frame has three channels, and each input video has several frames \( K\). The \(O\left( {M \times N \times K} \right) \) refers to the overall complexity of the proposed scheme.
3.16 Comparison with existing methods
A comparison between the proposed scheme and other recent encryption schemes is conducted to test the efficiency of the proposed scheme. The metrics used in this experiment are time complexity, execution time, execution time improvement ratio, correlation coefficient, NPCR, UACI, and entropy values.
The existing schemes have been implemented and executed in the same environment. Table 10 shows the time complexity and the average running time of 20 frames for various videos for the proposed scheme compared to the methods in [13, 16]. Table 11 presents the proposed scheme's execution time improvement ratio (ETIR) [44]. Also, Fig. 19 shows a visualized execution time. From the results, it is proven that the proposed scheme is faster than the methods in [13, 16], reflecting the proposed scheme's power.
Table 12 presents the average values of the correlation coefficient between adjacent pixels in the horizontal, vertical, and diagonal directions for the proposed scheme compared to the methods in [19, 35, 36, 45, 46] applied on Flamingo, Rhinos, Train, and Viptrain videos. The table shows that the proposed scheme has correlation coefficient values closer to zero than the mentioned works. Also, Table 13 presents the average values of adjacent pixels in the horizontal, vertical, and diagonal directions for the proposed scheme compared to the methods in [47,48,49,50] applied to Foreman video. The table shows that the proposed scheme has correlation coefficient values close to zero with the mentioned works.
Table 14 presents the average values of NPCR and UACI for the proposed scheme compared to the methods in [19, 35, 36, 45, 46] applied to Flamingo, Rhinos, Train, and Viptrain videos. Also, Table 15 presents the average values of NPCR and UACI for the proposed scheme compared to the methods in [47,48,49,50] applied to the Foreman video. The results show that the proposed scheme has NPCR and UACI values closer to the NPCR and UACI optimal values than the other related works.
Table 16 presents the average values of Entropy for the proposed scheme compared to the methods in [19, 35, 36, 45, 46] applied to Flamingo, Rhinos, Train, and Viptrain videos. Also, Table 17 presents the average values of entropy for the proposed scheme compared to the methods in [47,48,49,50] applied in the Foreman video. The results show that the proposed scheme has entropy values close to the optimal value compared to the other related works.
4 Conclusion
This paper proposes a new scheme for securing the colored videos based on a frame channel scrambling and multi-key generation from a chaotic map. The proposed scheme is conducted independently on each of the three channels of the video frame to increase security. The performance of the proposed scheme is evaluated using visual analysis, histogram, correlation, entropy, differential attack, encryption quality analysis, PSNR, SSIM, and FSIM analysis, chosen‑plaintext and known‑plaintext attacks analysis, edges detection, keyspace, key sensitivity, channel noise attack analysis, occlusion attack analysis, computational processing time, and time complexity. The results proved that the proposed scheme is efficient in encrypting colored videos at high speed, does not require high computation resources, and is suitable for IoT devices. The proposed scheme is compared to the preceding related works, and the experiments prove that the proposed scheme has a high quality in securing the colored videos.
References
Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013). https://doi.org/10.1016/J.COSE.2013.04.004
Liu, F., Koenig, H.: A survey of video encryption algorithms. Comput. Security. 29(1), 3–15 (2010). https://doi.org/10.1016/J.COSE.2009.06.004
El-Shafai, W., Mesrega, A.K., Ahmed, H.E., Abdelwahab, N., AbdEl-Samie, F.E.: An efficient multimedia compression-encryption scheme using Latin squares for securing internet of things networks. J. Inf. Secur. Appl. 64, 103039 (2022). https://doi.org/10.1016/J.JISA.2021.103039
Huang, X., Arnold, D., Fang, T., Saniie, J.: A chaotic-based encryption/decryption system for secure video transmission. IEEE Int. Confer. Electro Inf. Technol. 2021, 369–373 (2021). https://doi.org/10.1109/EIT51626.2021.9491868
Liu, Y., Liu, S., Wang, Y., Zhao, H., Liu, S.: Video steganography: a review. Neurocomputing 335, 238–250 (2019). https://doi.org/10.1016/J.NEUCOM.2018.09.091
Balaji, R., Naveen, G.: Secure data transmission using video Steganography. IEEE Int. Confer. Electro Inf. Technol. (2011). https://doi.org/10.1109/EIT.2011.5978601
Mustafa, R.J., Elleithy, K.M.: A highly secure video steganography using Hamming code (7, 4). IEEE Long Isl. Syst. Appl. Technol. Confer. LISAT 2014, 2014 (2014). https://doi.org/10.1109/LISAT.2014.6845191
Dixit, M., Bhide, N., Khankhoje, S., Ukarande, R.: Video steganography. In: 2015 Int. Conf. Pervasive Comput. Adv. Commun. Technol. Appl. Soc. ICPC 2015 (2015). https://doi.org/10.1109/PERVASIVE.2015.7087159
Gupta, G., Gupta, V.K., Chandra, M.: An efficient video watermarking based security model. Microsyst. Technol. 24(6), 2539–2548 (2018). https://doi.org/10.1007/S00542-017-3689-X/FIGURES/8
Asikuzzaman, M., Pickering, M.R.: An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. 28(9), 2131–2153 (2018). https://doi.org/10.1109/TCSVT.2017.2712162
JarJar, A.: Two Feistel rounds in image cryptography acting at the nucleotide level exploiting DNA and RNA property. SN Appl. Sci. 1(11), 1–17 (2019). https://doi.org/10.1007/S42452-019-1305-7/TABLES/9
Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press (2008)
Li, X., Yu, H., Zhang, H., Jin, X., Sun, H., Liu, J.: Video encryption based on hyperchaotic system. Multimed. Tools Appl. 79(33–34), 23995–24011 (2020). https://doi.org/10.1007/S11042-020-09200-1
Hosny, K.M., Kamal, S.T., Darwish, M.M.: Novel encryption for color images using fractional-order hyperchaotic system. J. Ambient Intell. Hum. Comput. 2022, 1–16 (2022). https://doi.org/10.1007/S12652-021-03675-Y
Hosny, K.M., Kamal, S.T., Darwish, M.M., Papakostas, G.A.: New image encryption algorithm using hyperchaotic system and fibonacci Q-matrix. Electron 10(9), 1066 (2021). https://doi.org/10.3390/ELECTRONICS10091066
Alarifi, A., Sankar, S., Altameem, T., Jithin, K.C., Amoon, M., El-Shafai, W.: A novel hybrid cryptosystem for secure streaming of high-efficiency H.265 compressed videos in IoT multimedia applications. IEEE Access 8, 128548–128573 (2020). https://doi.org/10.1109/ACCESS.2020.3008644
Hosny, K.M., Kamal, S.T., Darwish, M.M.: A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis. Comput. 2022, 1–18 (2022). https://doi.org/10.1007/S00371-021-02382-1
Kaur, G., Agarwal, R., Patidar, V.: Color image encryption scheme based on fractional Hartley transform and chaotic substitution–permutation. Vis. Comput. (2021). https://doi.org/10.1007/S00371-021-02066-W/TABLES/8
Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22(11), 1253 (2020). https://doi.org/10.3390/E22111253
Munagala, V., Kodati, S.P.: Enhanced hole entropy-based encoding via whale optimization for highly efficient video coding. Vis. Comput. 37(8), 2173–2194 (2021). https://doi.org/10.1007/S00371-020-01978-3/FIGURES/9
Faragallah, O.S., Sallam, A.I., El-Sayed, H.S.: Visual Protection Using RC5 Selective Encryption in Telemedicine. Intell. Autom. Soft Comput. 31(1), 177–190 (2022). https://doi.org/10.32604/IASC.2022.019348
Dolati, N., Beheshti, A., Azadegan, H.: A selective encryption for H.264/AVC videos based on scrambling. Multimed. Tools Appl. 80(2), 2319–2338 (2021). https://doi.org/10.1007/S11042-020-09654-3/TABLES/6
Faragallah, O.S., et al.: Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J. Ambient Intell. Humanize. Comput. (2021). https://doi.org/10.1007/S12652-020-02832-Z/TABLES/17
Cai, H., Sun, J., Gao, Z., Zhang, H.: A novel multi-wing chaotic system with FPGA implementation and application in image encryption. J. Real-Time Image Process. 2022, 1–16 (2022). https://doi.org/10.1007/S11554-022-01220-4
Wu, X., Wang, K., Wang, X., Kan, H., Kurths, J.: Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 148, 272–287 (2018). https://doi.org/10.1016/J.SIGPRO.2018.02.028
Chai, X., Gan, Z., Yang, K., Chen, Y., Liu, X.: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata, and DNA sequence operations. Signal Process. Image Commun. 52, 6–19 (2017). https://doi.org/10.1016/J.IMAGE.2016.12.007
Wang, X.Y., Zhang, H.L., Bao, X.M.: Color image encryption scheme using CML and DNA sequence operations. Biosystems 144, 18–26 (2016). https://doi.org/10.1016/J.BIOSYSTEMS.2016.03.011
Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225–237 (2017). https://doi.org/10.1016/J.OPTLASENG.2016.10.019
Faraoun, K.M.: Fast encryption of RGB color digital images using a tweakable cellular automaton based schema. Opt. Laser Technol. 64, 145–155 (2014). https://doi.org/10.1016/J.OPTLASTEC.2014.05.012
Wang, X., Zhang, H.L.: A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt. Commun. 342, 51–60 (2015). https://doi.org/10.1016/J.OPTCOM.2014.12.043
Auyporn, W., Vongpradhip, S.: A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst. (2014) https://doi.org/10.12720/IJSPS.3.1.8-13
Murali, P., Niranjana, G., Paul, A.J., Muthu, J.S.: Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis. Comput. (2022). https://doi.org/10.1007/S00371-021-02384-Z/TABLES/13
Yang, Z., Cao, Y., Ji, Y., Liu, Z., Chen, H.: Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains. Opt. Lasers Eng. 152, 106969 (2022). https://doi.org/10.1016/J.OPTLASENG.2022.106969
Fang, P., Liu, H., Wu, C., Liu, M.: A survey of image encryption algorithms based on chaotic system. Vis. Comput. 2022, 1–29 (2022). https://doi.org/10.1007/S00371-022-02459-5
Valli, D., Ganesan, K.: “Chaos based video encryption using maps and Ikeda time delay system,” Eur. Phys. J. Plus (2017). https://doi.org/10.1140/EPJP/I2017-11819-7
Ranjith Kumar, R., Ganeshkumar, D., Suresh, A., Manigandan, K.: A new one round video encryption scheme based on 1D chaotic maps. In: 2019 5th Int. Conf. Adv. Comput. Commun. Syst. ICACCS 2019, pp. 439–444 (2019). https://doi.org/10.1109/ICACCS.2019.8728443
Song, X.H., Wang, H.Q., Venegas-Andraca, S.E., Abd El-Latif, A.A.: Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Phys. A Stat. Mech. Appl. 537, 122660 (2020). https://doi.org/10.1016/J.PHYSA.2019.122660
Ye, G., Pan, C., Dong, Y., Jiao, K., Huang, X.: A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition. Trans. Emerg. Telecommun. Technol. (2021). https://doi.org/10.1002/ETT.4071
Duan, C.F., Zhou, J., Gong, L.H., Wu, J.Y., Zhou, N.R.: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 150, 106881 (2022). https://doi.org/10.1016/J.OPTLASENG.2021.106881
Gong, L.H., Luo, H.X., Wu, R.Q., Zhou, N.R.: New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG. Phys. A Stat. Mech. Appl. 591, 126793 (2022). https://doi.org/10.1016/J.PHYSA.2021.126793
Kaur, G., Agarwal, R., Patidar, V.: Color image encryption scheme based on fractional Hartley transform and chaotic substitution–permutation. Vis. Comput. 38(3), 1027–1050 (2022). https://doi.org/10.1007/S00371-021-02066-W/TABLES/8
YUV Sequences: http://trace.eas.asu.edu/yuv/. Accessed 07 Jan 2022
Kamal, S.T., Hosny, K.M., Elgindy, T.M., Darwish, M.M., Fouda, M.M.: A new image encryption algorithm for grey and color medical images. IEEE Access 9, 37855–37865 (2021). https://doi.org/10.1109/ACCESS.2021.3063237
Hosny, K.M.: Fast computation of accurate Zernike moments. J. Real-Time Image Process. 3(1–2), 97–107 (2008). https://doi.org/10.1007/S11554-007-0058-5
Sethi, J., Bhaumik, J., Chowdhury, A.S.: Chaos-Based Uncompressed Frame Level Video Encryption. Springer (2022). Accessed 15 Jun 2022 [Online]. https://doi.org/10.1007/978-981-16-6890-6_15
Elkamchouchi, H., Salama, W.M., Abouelseoud, Y.: New video encryption schemes based on chaotic maps. Wiley Online Libr. 14(2), 397–406 (2019). https://doi.org/10.1049/iet-ipr.2018.5250
Kotel, S., Zeghid, M., Baganne, A., Saidani, T., Daradkeh, Y.I., Rached, T.: Fpga-based real-time implementation of aes algorithm for video encryption. Recent Adv. Telecommun Informatics Edu Technol 27–36 (2014)
Cheng, S., Wang, L., Ao, N., Han, Q.: A Selective Video Encryption Scheme Based on Coding Characteristics. Symmetry 12(3), 332 (2020). https://doi.org/10.3390/SYM12030332
Elkamchouchi, H., Salama, W.M., Abouelseoud, Y.: New video encryption schemes based on chaotic maps. IET Image Process. 14(2), 397–406 (2020). https://doi.org/10.1049/IET-IPR.2018.5250
Hafsa, A., Fradi, M., Sghaier, A., Malek, J., Machhout, M.: Real-time video security system using chaos- improved advanced encryption standard (IAES). Multimed. Tools Appl. (2021). https://doi.org/10.1007/S11042-021-11668-4/TABLES/14
Funding
Open access funding provided by The Science, Technology & Innovation Funding Authority (STDF) in cooperation with The Egyptian Knowledge Bank (EKB). No fund is available for this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Hosny, K.M., Zaki, M.A., Lashin, N.A. et al. Fast colored video encryption using block scrambling and multi-key generation. Vis Comput 39, 6041–6072 (2023). https://doi.org/10.1007/s00371-022-02711-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00371-022-02711-y