Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Privacy Preservation of Videos using Neutrosophic Logic based Selective Encryption


Affiliations
1 Department of Computer Science and Engineering, Poojya Doddappa Appa College of Engineering, India
2 Department of Computer Science and Engineering, Visvesvaraya Technological University, India
     

   Subscribe/Renew Journal


Having great photos and video phone, but what happens when you decide to buy a new phone or your storage becomes too full to take any more, back it all on the cloud. It’s no secret that videos are a valuable way of communicating information. With attention spans dropping and the need to get larger amounts of information across in a shorter period of time, a well-placed video can take your presentation to the next level these presentations need to be up to date and available wherever you are, back it all on the cloud. Better collaboration and communication through the use of cloud as cloud allows users to access the latest versions of any multimedia data (text, video, images, audio, etc), so they can stay on top changes, which can help businesses to better manage their work flow, regardless of geographical location or spread. Multimedia data like videos stored on cloud are vulnerable to various types of threats like known plain text attach, threat to data, denial of service, etc. To overcome these problems videos need to be encrypted before it gets stored on cloud. Encrypting whole video is a time consuming task, to get rid of time complexity videos can be encrypted using selective encryption many researchers in the state of art have proposed techniques for selective image encryption. In this paper, a frame work is proposed for selective encryption of videos in two stages. The first stage is, Region of interest (ROI) identification performed based on Neutrosophic Logic, watershed image segmentation method. Second Stage is ROI encryption which is performed using the proposed Decision Based Encryption (DBE) Algorithm. The proposed frame work is fast, robust, highly scalable and accurate to meet the need of current internet bandwidth and speed.

Keywords

Selective Video Encryption, Privacy Preservation, Neutrosophic Logic, Cloud, Decision Based Encryption Algorithm, DBE.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Florentin Smarandache, “Neutrosophic Logic-A Generalization of the Intuitionistic Fuzzy Logic”, International Journal of Pure and Applied Mathematics, Vol. 24, No. 3, pp. 287-297, 2005.
  • Ming Zhang, Ling Zhang, H.D. Cheng, “A Neutrosophic Approach to Image Segmentation based on Watershed Method”, Signal Processing, Vol. 90, No. 5, pp. 1510-1517, 2010.
  • W. Hamidouche, M. Farajallah, N.O.-Sidaty, S.E. Assad and O. Deforges, “Real-Time Selective Video Encryption based on the Chaos System in Scalable HEVC Extension”, Signal Processing: Image Communication, Vol. 58, No. 1, pp. 73-86, 2017.
  • L. Qiao and K. Nahrstedt, “Comparison of MPEG Encryption Algorithms”, Computers and Graphics, Vol. 22, No. 4, pp. 437-448, 1998.
  • G.V. Wallendael, A. Boho, J.D. Cock, A. Munteanu and R.V.D. Walle, “Encryption for High Efficiency Video Coding with Video Adaptation Capabilities”, IEEE Transactions on Consumer Electronics, Vol. 59, No. 3, pp. 634-642, 2013.
  • Tao Xiang, Jia Hu and Jianglin Sun, “Outsourcing Chaotic Selective Image Encryption to the Cloud with Steganography”, Digital Signal Processing, Vol. 43, pp. 28-37, 2015.
  • Ahmed M. Ayoup, Amr H Hussein and Mahmoud Ali, “Efficient Selective Image Encryption”, Multimedia Tools and Applications, Vol. 75, No. 24, pp. 17171-17186, 2016.
  • G. Liu, T. Ikenaga, S. Goto and T. Baba, “A Selective Video Encryption Scheme for MPEG Compression Standard”, IEICE Transaction on Fundamentals, Vol. 89, No. 1, pp. 194- 202, 2006.
  • Zafar Shahid and William Puech, “Visual Protection of HEVC Video by Selective Encryption of CABAC Bin-Strings”, IEEE Transactions on Multimedia, Vol. 16, No. 4, pp. 24-36, 2014.
  • Wassim Hamidouche, Mickael Raulet and Olivier De-Forges, “Real time SHVC Decoder: Implementation and Complexity Analysis”, Proceedings of IEEE International Conference on Image Processing, pp. 233-239, 2014.
  • Jiri Fridrich, “Symmetric Ciphers based on Two-dimensional Chaotic Maps”, International World Scientific Journal on Bifurcation and Chaos, Vol. 8, No. 6, pp. 1259-1284, 1998.
  • Safwan E1 Assad and Hassan Noura, “Generator of Chaotic Sequences and Corresponding Generating System”, US Patent-US20130170641A1, University of Nantes, 2014.
  • Mousa Farajallah, Z Fawaz, Safwan E1 Assad and Olivier Dforges, “Efficient Image Encryption and Authentication Scheme based on Chaotic Sequences”, Proceedings of International Conference on Emerging Security Information Systems and Technologies, pp. 150-155, 2013.
  • Rukhin Andrew, Soto Juan, Nechvatal James, Smid Miles and Barker Elaine, “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”, Technical Report, Department of Commerce, National Institute of Standard and Technology, 2001.
  • Vivienne Sze and Madhukar Budagavi, “High Throughput CABAC Entropy Coding in HEVC”, IEEE Transactions on Circuits and System for Video Technology, Vol. 22, No. 2, pp. 1778-1791, 2012.
  • Nakkl Masuda, Goce Jakimoski, Kazuyuki Aihara and Ljupco Kocarev, “Chaotic Block Ciphers: from Theory to Practical Algorithms”, IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 53, No. 6, pp. 1341-1352, 2006.
  • Xingyuan Wang, Dapeng Luan and Xuemei Bao, “Cryptanalysis of an Image Encryption Algorithm using Chebyshev Generator”, Digital Signal Processing, Vol. 25, No. 2, pp. 244-247, 2014.
  • Shiguo Lian, Jinsheng Sun, Jinwei Wang and Zhiquan Wang, “A Chaotic Stream Cipher and the usage in Video Protection”, International Journal of Chaos Solitons and Fractals, Vol. 34, No. 3, pp. 851-859, 2007.
  • S.F. Sultana , and D.C. Shubhangi, “Video Encryption Algorithm and Key Management using Perfect Shuffle”, International Journal of Engineering Research and Applications, Vol. 7, No. 2, pp. 1-5, 2017.
  • K.T. Atanassov, “Intuitionistic fuzzy sets”, Fuzzy Sets and Systems, Vol. 20, No. 1, pp. 87-96, 1986.
  • L.A. Zadeh, “Fuzzy Sets”, Information and Control, Vol. 8, No. 3, pp. 353-383, 1965.
  • G. Priest, “Paraconsistent Logic”, Kuluwer Academic Publishers, 2002.
  • W. Bruno, “Dialethesim, logical consequence and hierarchy”, Analysis, Vol. 64, No. 4, pp. 318-326, 2004.
  • F. Smarandache, “A Unifying Field in Logics Neutrosophic Logic, Neutrosophy, Neutrosophic Set”, American Research Press, 2003.
  • Mario Preishuber, Thomas Hütter, Stefan Katzenbeisser and Andreas Uhl, “Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption”, IEEE Transactions on Information Forensics and Security, Vol. 13, No. 9, pp. 2137-2150, 2018.

Abstract Views: 193

PDF Views: 0




  • Privacy Preservation of Videos using Neutrosophic Logic based Selective Encryption

Abstract Views: 193  |  PDF Views: 0

Authors

Sayyada Fahmeeda Sultana
Department of Computer Science and Engineering, Poojya Doddappa Appa College of Engineering, India
D. C. Shubhangi
Department of Computer Science and Engineering, Visvesvaraya Technological University, India

Abstract


Having great photos and video phone, but what happens when you decide to buy a new phone or your storage becomes too full to take any more, back it all on the cloud. It’s no secret that videos are a valuable way of communicating information. With attention spans dropping and the need to get larger amounts of information across in a shorter period of time, a well-placed video can take your presentation to the next level these presentations need to be up to date and available wherever you are, back it all on the cloud. Better collaboration and communication through the use of cloud as cloud allows users to access the latest versions of any multimedia data (text, video, images, audio, etc), so they can stay on top changes, which can help businesses to better manage their work flow, regardless of geographical location or spread. Multimedia data like videos stored on cloud are vulnerable to various types of threats like known plain text attach, threat to data, denial of service, etc. To overcome these problems videos need to be encrypted before it gets stored on cloud. Encrypting whole video is a time consuming task, to get rid of time complexity videos can be encrypted using selective encryption many researchers in the state of art have proposed techniques for selective image encryption. In this paper, a frame work is proposed for selective encryption of videos in two stages. The first stage is, Region of interest (ROI) identification performed based on Neutrosophic Logic, watershed image segmentation method. Second Stage is ROI encryption which is performed using the proposed Decision Based Encryption (DBE) Algorithm. The proposed frame work is fast, robust, highly scalable and accurate to meet the need of current internet bandwidth and speed.

Keywords


Selective Video Encryption, Privacy Preservation, Neutrosophic Logic, Cloud, Decision Based Encryption Algorithm, DBE.

References