0% found this document useful (0 votes)
57 views6 pages

A Video Encryption and Decryption Using Different Techniques

This document discusses video encryption and decryption techniques. It provides background on the importance of cryptography and encryption. The document then describes different encryption and decryption methods that can be used for video, including using different types of clippers to process encryption and decryption. It also discusses using DCT techniques for encryption and decryption of video and achieving 92% accuracy in terms of PSNR.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views6 pages

A Video Encryption and Decryption Using Different Techniques

This document discusses video encryption and decryption techniques. It provides background on the importance of cryptography and encryption. The document then describes different encryption and decryption methods that can be used for video, including using different types of clippers to process encryption and decryption. It also discusses using DCT techniques for encryption and decryption of video and achieving 92% accuracy in terms of PSNR.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

International Journal of Computer Applications (0975 – 8887)

Volume 165 – No 1, May 2017

A Video Encryption and Decryption using


Different Techniques

Khushwinder Kaur Swati Bansal


M. Tech Scholar Assistant Professor
GZSCEET, Bathinda GZSCEET, Bathinda

ABSTRACT as MPEG. since the cryptography first recognised usage in


Inside the current years with the development of internet historical Egypt it has exceeded thru unique degrees and
technologies, video technology were widely used in become affected by any important occasion that affected the
television, conversation and multimedia, so protection is way human beings treated data. within the global conflict II
required on video statistics. although a good deal video for example cryptography performed an vital role and become
encryption method has been develop however no longer a key element that gave the allied forces the top hand, and
provide so much performance in terms of encryption and enables them to win the battle faster, after they had been
decryption technique. a method for embedding records in capable of dissolve the Enigma cipher system which the
scrambled AVI video is described. The embedding method is Germans used to encrypt their navy secret communications.
applied to the video collection collectively with the video In cutting-edge days cryptography is no longer restrained to
scrambling set of rules. in this paintings extraordinary forms relaxed sensitive army facts but identified as one of the
of clippers are used to process the encryption and decryption. predominant additives of the safety coverage of any
In an increasing number of image and video processing corporation and considered industry wellknown for supplying
issues, cryptographic techniques are used to implement statistics protection, agree with, controlling get admission to
content material get admission to manage, identity to resources, and electronic economic transactions. The
verification and authentication, and privacy safety. every authentic records that to be transmitted or saved is referred to
other category of algorithms is based totally on scramble as plaintext, the one that can be readable and understandable
(permutation) best methods, wherein the DCT coefficients are both by someone or by way of a laptop. while the disguised
permuted to offer confusion. Their isn't any authentication statistics so-known as ciphertext, that is unreadable, neither
and protection in this and circulation chipper is used which human nor gadget can properly process it till it is decrypted.
eat extra time to technique the video and frame technology A machine or product that gives encryption and decryption is
isn't used which provide protection and authentication to the called cryptosystem. Cryptosystem uses an encryption
person. i have also reviewed DCT technique for encryption algorithms which determines how easy or complex the
and decryption this is implemented in my studies paintings encryption method can be, the vital software program issue,
and specific parameters are calculated. We are getting the and the key (commonly an extended string of bits), which
accuracy 92% in the shape of PSNR in case of DCT. Becase goes with the algorithm to encrypt and decrypt the facts.
it's far offering the compression additionally. inside the 19th century, a well-known concept approximately
the safety precept of any encryption machine has been
Keywords proposed by Kerchhoff. This theory has end up the maximum
Multimedia security, contents access control, video vital principle in designing a cryptosystem for researchers and
scrambling etc . engineers. Kirchhoff found that the encryption algorithms are
supposed to be recognized to the fighters. therefore, the safety
1. INTRODUCTION of an encryption system have to rely upon the secrecy of the
Due to rapid development of various multimedia encryption/decryption key as opposed to the encryption set of
technologies, more and more multimedia information are rules itself. For despite the fact that in the very starting the
generated and transmitted in the clinical, industrial, and navy opponent doesn’t recognise the algorithm, the encryption
fields, which may additionally consist of a few touchy records device will not be capable of defend the ciphertext as soon as
which must not be accessed by using or can handiest be the set of rules is damaged. the safety level of an encryption
partially uncovered to the general users. consequently, set of rules is measured by the dimensions of its key area. the
protection and privateness has grow to be an crucial. the larger length of the key space is, the extra time the attacker
primary aim of cryptography is keeping data secure form needs to do the exhaustive search of the key area, and for this
unauthorized attackers. consequently statistics is encrypted reason the better the safety stage is. In encryption, the secret
via process of Encryption. facts cryptography in particular is is piece of records (cost of include a large collection of
the scrambling of the content of facts, including textual random bits) which specifies the unique transformation of
content, image, audio, video and so on to make the facts plaintext to ciphertext, or vice versa in the course of
unreadable, invisible or unintelligible in the course of decryption. Encryption key based on the keyspace, that is the
transmission or storage known as Encryption. The opposite of range of the values that may be used to collect a key. the
statistics encryption is facts Decryption, which recuperate the larger key area the more feasible keys can be built ( these
unique information. The opposite of statistics encryption is days we generally use key sizes of 128,192,or 256 bit , so the
statistics decryption With digital video transmission, important thing size of 256 might provide a 2256 key space).
encryption technologies are wished which could protect
digital video from attacks all through transmission. due to the
large length of digital movies, they may be normally
transmitted in compressed codecs such

5
International Journal of Computer Applications (0975 – 8887)
Volume 165 – No 1, May 2017

2. ENCRYPTION AND DECRYPTION increase in records switch rate over the internet. Separable
Reversible records embedding is a delicate method. whilst the
METHOD embedded picture/video is manipulated, the decoder will
The system of converting plaintext to ciphertext is known as discover it isn't true and accordingly there can be no unique
enciphering or encryption, restoring plaintext from ciphertext content material healing . A commonplace approach of
is decoding or decryption. each the encryption and decryption excessive potential separable reversible records embedding is
algorithms take a key (k) and plaintext/ciphertext as input. in to pick out an embedding vicinity in an image/video, and
the case of pix, plaintext is a hard and fast of pixel values embed both the payload and the unique values in this place .
arranged in an orderly manner. Encrypting photos/movies As the amount of information needed to be embedded is
constitutes reordering these pixel values in order that they bigger than that of the hiding area, and the space saved from
bring no visual statistics approximately the original photo. An compression might be used for embedding the payload. DE
photograph/video also can be encrypted within the technique has been used to discover more garage space by
compressed area. The DCT coefficients are encrypted in this using exploring the redundancy inside the picture content. J.
sort of manner that the content is made illegible for the Tian employ the DE method to reversibly embed a payload
unauthorized. most effective a licensed person can get again into digital pictures [1]. both the payload potential restriction
the original content material using the decryption set of rules. and the visible pleasant of embedded pix of the DE technique
In cryptography, a block cipher is a symmetric key cipher are a few of the great with a low computational complexity.
which operates on fixed length groups of bits, termed blocks, N. Memon have offered an interactive purchaser–supplier
with an unvarying transformation. whilst encrypting, a block protocol for invisible watermarking wherein the vendor does
cipher might take an n-bit block of plaintext as enter and not get to recognize the exact watermarked reproduction that
output a corresponding n-bit block of ciphertext. the exact the customer gets [6]. but, incase the seller finds an
transformation is managed the usage of a 2d input the secret unauthorized reproduction, become aware of the consumer
key. Decryption is similar, takes an n-bit block of ciphertext from whom this unauthorized copy has originated and
together with the name of the game key and outputs the moreover additionally prove this reality to 0.33-birthday
unique n-bit block of plaintext. Examples of block- ciphers celebration.
are RC5, AES, DES. A block cipher operates in exclusive
modes. The main modes are digital Code book (ECB) and
Cipher- Block Chaining (CBC). In ECB mode, the plaintext is
split into blocks and each block is encrypted one at a time. in
the CBC mode, each block of plaintext is XOR with the
previous ciphertext block before being encrypted. This way,
every ciphertext block is dependent on all plaintext blocks
processed up to that point. in this mode, adjustments within
the plaintext propagate all the time in the ciphertext and
encryption can't be parallelized. also, decryption can't be
parallelized.

3. PROCESS OF DATA HIDING IN


ENCRYPTED VIDEO
The amount of digital pictures/video has elevated hastily on
the net. photo/video protection turns into more and more
crucial for plenty packages, e.g., secure transmission of
photograph and video , army and clinical applications. as an Figure 1.: Sketch of separable reversible data hiding in
example, pace and comfortable transmission is vital in the encrypted video.
clinical world. in recent times, the transmission of
photo/movies is a each day ordinary and it's miles necessary 4. PROBLEM FORMULATION
to discover an green manner to transmit them over networks.
In more and more photo and video processing issues,
The protection of this multimedia records may be
cryptographic strategies are used to put into effect content
accomplished with encryption or records hiding algorithms.
material get admission to manipulate, identification
within the current developments of the sector, the
verification and authentication, and privacy safety. any other
technologies have advanced so much that maximum of the
class of algorithms is based on scramble (permutation) most
people select the use of the net as the number one medium to
effective strategies, wherein the DCT coefficients are
switch information from one cease to some other. there are
permuted to offer confusion. Their is not any authentication
numerous feasible ways to transfer records the usage of the
and protection on this and flow chiper is used which devour
internet: thru emails, chats, and so on. The information
extra time to process the video and body generation is not
transmission is made very simple, velocity and correct the
used which offer protection and authentication to the user.
usage of the net. but, one of the essential troubles with
The data protection problem arise all through the remodel of
transmitting facts over the internet is the security risk it poses
the facts whilst the data is moved from supply to destination.
i.e. the private or exclusive statistics may be stolen or hacked
The RGB color distortation problem. Processing time trouble
in lots of approaches. consequently it's miles very important
were for the duration of the statistics scrambling. We advise a
to take records safety into consideration, as it's far one of the
computationally green and at ease video encryption logarithm.
maximum essential elements that need interest at some point
With a few decided on parameters (interpreting time, PSNR
of the procedure of records transmission. information safety
fee ,MSE fee) This makes comfy video encryption feasible for
essentially manner safety of information and presenting
actual-time applications without any greater committed
excessive protection to prevent data amendment from
hardware.
unauthorized users or hackers. statistics protection has won
greater interest within the latest time frame because of the big

6
International Journal of Computer Applications (0975 – 8887)
Volume 165 – No 1, May 2017

5. RESEARCH METHODOLOGY
OVERVIEW
This consists of the facts of method and algorithm of the work
this is used to layout the information scrambling for the
virtual video. additionally it is the gear which can be used to
design the GUI for studies work.
This is for video encoding. it is based totally upon GUI
(graphical consumer interface) in MATLAB. It is an effort
to similarly grasp the basics of MATLAB and validate it
as a effective utility tool. There are basically specific
documents. every of them includes m-document. those are the
programmable files containing the information approximately
the video associated statistics.
PROPOSED ALGORITHM
Step 1: Start the program.
Figure 3: : Browsing the Input video
Step 2: Reads the video and stores it as a image files in a
folder
Step 3: Calculate the Frame separation and Convert Frame to
image file.
Step 4: Write image file.
Step 5: Apply the DCT and Huff transformation technique
encoding the video stream after the frame separation.
Step 6: Generate the Hexadecimal key for encryption.
Step 7: Apply decryption to decrypt the frames of the video.
Step 8: Apply the decoding process on video.
Step 9: Apply the encoded frame and decoded frame to check
for authentication and validation.
Step 10: PSNR and MSE values and decoded time.
Step 11: Stop.

6. RESULT & ANALYSIS


This Chapter shows the implementation results of the Figure 4:. Input Video Browsing
dissertation work. Their are different figures that shows how
the video is processed and how the system tools works in
MATLAB.In this we upload the digiat video.

Figure 5. Simple Encryption and Decryption video

Figure 2: Input GUI window

7
International Journal of Computer Applications (0975 – 8887)
Volume 165 – No 1, May 2017

Figure 9: Encoded Video with frames


Figure 6. Encoded Frame

Figure 10:Browse the Encrypted video for decryption

Figure 7. Video Frame Processing

Figure 11. Decrypted Frame with DCT

Figure 8: Input Second Video

8
International Journal of Computer Applications (0975 – 8887)
Volume 165 – No 1, May 2017

Table 3. Techniques Comparision

Author Technique Algorithm Result


Name/ Used
Year
Preeti DWT encryption it increases the
Gupta XOR security of
(2012) operation watermarks
Yogita selective Zig-Zag It is providing result
Negi encryption Permutatio on I frmae of the
(2013) n video.
Algorithm
Ci-Lin Encryption H.264/SVC They are getting
Li scheme 52% results only on
(2014) encryption
Figure 12:Taxture video processing A.Shiva Grouping thresholdin İt is providing the 2-
Krishna Of Pictures g method D videos
Table .1 Huffman Parameter table Reddy (GOP) information and
(2014) Encryption getting result 60%.
Name of PSNR SSIM LSS Sivaka discrete watermarki It is providing the
Video mi, R. cosine ng compressiona
Basketball 0.97240 0.9394 0.0048 (2014) transform algorithm encryption and
geting result 35%.
Basketball 0.72753 0.9294 0.0046
Drill Benoˆıt Selective Scrambling It is mainly
Boyadji Encryption algorithm providing the
Mall 0.8045 0.9014 0.0042
s (2015) security and getting
Kimono (B2) 0.8563 0.8214 0.0040 the accuracy 60 % in
the form of PNSR.
Vidyo1 (E) 0.9021 0.9141 0.0045
Propose Selective Encryption In the proposed
Table 2. DCT Parameter Table d Encryption and work i have used the
with Decryption Huffman Technique
Name of PSNR SSIM LSS Huffman and DCT with
Video and DCT different types of
Clippers. It is the
Basketball 0.79417 0.9289 0.0047 new work because
everybody is doing
Basketball 0.98022 0.7564 0.0041
work with DCT and
Drill
Huffman Sepratelly
Mall 0.94631 0.8540 0.0040 and Clipper
Seprately ,But i have
Kimono (B2) 0.85041 0.9102 0.0042 Using the
Vidyo1 (E) 0.96243 0.9214 0.0038 Combination of
Clippers and DCT
and Huffman. We
are getting the
Comparision of DCT and Huffman
accuracy 92% in the
Basketball Basketball Drill Mall form of PSNR in
case of DCT. Becase
Kimono (B2) Vidyo1 (E) it is providing the
compression also.
0.9141 0.96243 0.9214
0.9021
0.8214 0.85041
7. CONCLUSİON
0.8563 0.9102
This concludes the paintings on this dissertation in phrases of
0.9014 0.94631 the various parameters that have been taken into consideration
0.8045 0.854
at the same time as scrambling the digital video for
0.72753 0.9294 0.98022 0.7564 security.The implementation information show us the
0.9724 0.9394 0.9289
complexity worried in the actual time software and hardware
0.79417
implementation. the focus of this paintings is statistics
0.0045
0.004
0.0042
0.0046
0.0048 0.0038
0.0042
0.004
0.0041
0.0047 scrambling in digital video. The reality that the proposed
PSNR SSIM LSS PSNR SSIM LSS technique embeds the data without delay within the spatial
HUFFMAN DCT
area (pixel values) makes it proof against some very common
mistakes, which seem in different competitive facts hiding

9
International Journal of Computer Applications (0975 – 8887)
Volume 165 – No 1, May 2017

strategies running in the compressed area, such as artifacts [7] Mayank Arya Chandra, Ravindra Purwar, Navin
and waft. Artifacts are produced by using the information Rajpal,”A Novel Approach of Digital Video
hiding techniques, which use the transform coefficients for Encryption”, International Journal of Computer
you to embed the information. Remodel coefficient Applications Vol 49, July 2012.
modification consequences in video reconstruction errors with
undesirable visible effects, including discontinuities inside the [8] M. Abomhara,, Omar Zakaria, Othman O. Khalifa, “An
block edges. flow errors are propagating visible distortions Overview of Video Encryption Techniques”,
between successive video frames as a result of embedding International Journal of Computer Theory and
records inside the compressed area without re-performing Engineering, Vol. 2, February, 2010.
movement estimation. The image compression strategies and [9] Amit Pande, Prasant Mohapatra, Joseph Zambreno,”
de-blocking filter are also crucial inside the video Using Chaotic Maps for Encrypting Image and Video
compression strategies, but motion estimation and movement Content”, IEEE International Symposium on
compensation are the most computationally luxurious and Multimedia, 2011.
time consuming process in complete video compression
technique. The excessive definition video has very high [10] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R.
temporal redundancy inside the consecutive frames. This Tourki,” A Modified AES Based for Image Encryption”,
temporal redundancy may be eliminated with speedy motion World Academy of Science, Engineering and
seek algorithms, and movement reimbursement. This process Technology , 2007.
keeps only required records within the frames and forwards to [11] Yogita Negi ,”A Survey on Video Encryption
other video compression blocks. The entropy coder outputs Techniques”, International Journal of Emerging
low bit charge records as compared to the previously evolved Technology and Advanced Engineering Vol 3, Issue 4,
requirements with identical video first-rate. In conclusion, the April 2013.
main advantages of the proposed technique are its low
complexity and the opportunity of the usage of the [12] Jolly shah and Dr. Vikas Saxena,” Video Encryption: A
compressed move for hiding exceptional information Survey”, International Journal of Recent Trends in
normally, with out first interpreting after which re-encoding Engineering, IJCSI International Journal of Computer
the video sequence. This makes the method appropriate for Science Issues, Vol. 8, March 2011
real-time programs. Simulation results have proven that
[13] Preeti GuptA, “ Cryptography based digital image
perceptual fine is preserved without sacrificing coding
watermarking algorithm to increase security of
efficiency.
watermark data”, International Journal of Scientific &
8. FUTURE WORK Engineering Research, Vol 3, September 2012.
Destiny paintings might involve a actual time implementation [14] Shiguo Lian, Dimitris Kanellopoulos, and Giancarlo
of the machine in order that the maximum quantity of videos Ruffo, “ Recent Advances in Multimedia Information
is more advantageous with the help of various filters. in the System Security,” International Journal of Computing
future work DWT is carried out with tough and soft threshold and Informatics, Vol. 33, No.1, 2009
for statistics scrambling in digital motion pictures
authentications and safety. [15] J. Zhou, Z. Liang, Y. Chen, and O. C. Au, “ Security
Analysis of Multimedia Encryption Schemes based on
9. REFERENCES Multiple Huffman Table,” IEEE Signal Processing
[1] Ci-Lin Li, Chih-Yang Lin, and Tzung-Her Chen ” Letters, vol. 14, No. 3, 2007
Efficient Compression-Jointed Quality Controllable [16] Sufyan T. Faraj Al-Janabi, Khalida Shaaban Rijab, Ali
Scrambling Method for H.264/SVC “, International Makki Sagheer,” Video Encryption Based on Special
Journal of Network Security, Vol.16, 2014 . Huffman Coding and Rabbit Stream Cipher”,
[2] C. Narsimha Raju, Ganugula Umadevi, Kannan Developments in E-systems Engineering 2011.
Srinathan and C. V. Jawahar “ Fast and Secure Real- [17] Gulistan, R., & Muhammad, J. M ,” Performance
Time Video Encryption”, IEEE 2008. Comparison of Advanced Video Coding H.264 Standard
[3] A.Shiva Krishna Reddy ,K. Srimathi, R. Rajalakshmi, “ with Baseline H.263 and H.263+ Standards”, IEEE
The Indexing Algorithm for Scrambled Frames in Video International Symposium on Communications and
Encryption ” International Journal of Advanced Research Information Technology, 2004.
in Computer Science and Software Engineering Volume [18] Zeghid, M., Machhout, M., Khriji, L., Baganne, ,” A
4,February 2014. modified AES based algorithm for image encryption”,.
[4] G.Madhuri, B.VijayKumar, V. Sudheer Raja, M. International Journal of Computer Science and
Shasidhar “Data Embedding in Scrambled Digital Video Engineering, 2007.
for Security”, Int. J. on Recent Trends in Engineering [19] C. Shi and B. Bhargava, “ Light Weight MPEG video
and Technology, Vol. 6, Nov 2011. Encryption Algorithm”, in Proceeding of the
[5] Sivakami, R. Nagakrishnan, Ellammal “A Digital International Conference on Multimedia, 1998.
Watermarking System For Video Authentication using [20] Chetan K.R, Raghavendra K “ DWT Based Blind Digital
DCT ”, Integrated Journal of Engineering Research and Video Watermarking Scheme for Video Authentication”,
Technology (IJERT) Vol 01 Jan-Feb 2014. International Journal of Computer Applications Vol 4
[6] Wenjun Zeng1, Shawmin Lei, “ Efficient Frequency August 2010.
Domain Selective Scrambling of Digital Video”, IEEE
2002.

IJCATM : www.ijcaonline.org
10

You might also like