Call for Paper

CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.

Read More

Spatial Domain Video Encryptionand Authentication using Chaotic Maps and Secure Whirlpool Hash

Karan Nair, Janhavi Kulkarni, Karan Asher, Vicky Chheda, Jonathan Joshi Published in Multimedia

CAE Proceedings on International Conference on Communication Technology
Year of Publication: 2016
© 2015 by CAE Journal

Karan Nair, Janhavi Kulkarni, Karan Asher, Vicky Chheda and Jonathan Joshi. Article: Spatial Domain Video Encryptionand Authentication using Chaotic Maps and Secure Whirlpool Hash. CAE Proceedings on International Conference on Communication Technology ICCT 2015(1):33-37, February 2016. Published by Foundation of Computer Science, New York, USA. BibTeX

@article{key:article,
	author = {Karan Nair and Janhavi Kulkarni and Karan Asher and Vicky Chheda and Jonathan Joshi},
	title = {Article: Spatial Domain Video Encryptionand Authentication using Chaotic Maps and Secure Whirlpool Hash},
	journal = {CAE Proceedings on International Conference on Communication Technology},
	year = {2016},
	volume = {ICCT 2015},
	number = {1},
	pages = {33-37},
	month = {February},
	note = {Published by Foundation of Computer Science, New York, USA}
}

Abstract

Digital video is one of the most popular multimedia data exchanged over the internet. Previous cryptography studies have focused on text data. The encryption algorithms developed for text data may not be suitable to multimedia applications because of large sizes of video. We present an algorithm in which a video file is encrypted by considering each frame as acolour image. Each video frame is broken down into RGB planes. Chaotic mapping algorithms are applied on all the planes of each frame, the temporal and horizontal domain of the video. For end-to-end authentication, semantically secure whirlpool hash has been used. Data integrity is verified using XOR hash which can detecttampering of data at any intermediate node. The algorithm was run on different videos, and satisfying results were obtained.

References

  1. Deshmukh, P. , Kolke, V. 2014. Modified AES based Algorithm for MPEG Video Encryption.
  2. C. NarsimhaRaju, Srinathan, K. , Jawahar, C. V. 2008. Real-Time Video Encryption Exploiting Distribution of the DCT coefficients. International Institute of Information Technology, Hyderabad.
  3. Shi, C. , Bhargava, B. 1998. An Efficient MPEG Video Encryption Algorithm. Purdue University.
  4. Igorevich, R. R. , Yong, H. , Dugki Min, Eunmi Choi. 2010. A Study on Multimedia Security Systems in Video Encryption.
  5. Jiri Fridrich. 1998. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos.
  6. Salleh, M. , Ibrahim, S. , Isnin, I. F. 2003. Image Encryption Algorithm Based on Chaotic Mapping.
  7. Zhang, X. , Fan, X. , Wang, J. , Zhao, Z. 2014. A Chaos Based Image Encryption Scheme Using Rectangular Transform and Dependent Substitution.
  8. William Stallings. 2006. The Whirlpool Secure Hash Function.
  9. Baretto, Paulo, S. L. M. , Rijmen, V. 2003. The Whirlpool Hashing Function.
  10. Peterson, G. 1997. Arnold's Cat Map

Keywords

Authentication, chaotic maps, encryption, hash, integrity, multimedia, spatial domain, video, whirlpool, XOR