IMPROVE THE PERFORMANCE OF MPEG VIDEO ENCRYPTION ALGORITHM USING MODIFIED RC4 ALGORITHM BASEDON CHAOTIC MAP
DOI:
https://doi.org/10.11113/jt.v75.3644Keywords:
RC4 algorithm, MPEG video encryption, chaotic mapAbstract
With rapid growth in communication techniques and multimedia application, security is becoming more important for multimedia data storage or transmission. Traditional encryption algorithm such as Advance Encryption Standard (AES) and Data Encryption Standard (DES) are not suitable for video data because it caused large computational overhead and reduce the MPEG compression efficiency. The encryption algorithm that has less computation overhead is needed. The proposed algorithm combines encryption process with MPEG video compression. Some modifications of the RC4 algorithm were proposed in this paper to enhance the performance of video encryption algorithm in terms of encryption time, compression ratio and to provide accepted level of the security. The modification of the RC4 algorithm depends on the maximum value of the plain text, chaotic map and circular shift operation. This modification will reduce the number of iteration in the Key scheduling Algorithm (KSA) and make the Pseudo Random Generator Algorithm (PRGA) depend on initial condition of chaotic maps to provide the strong shuffling inside the PRGA. The random rotation technique based on chaotic map is proposed to increase security of MPEG video. This technique depends on the value generated from chaotic map to rotate the Y blocks in I frame. The experimental results indicate that the proposed method provided better encryption times and provides sufficient level of the security. Thus the proposed method is suitable to protect the MPEG video with minimizing the overhead.Â
References
Shin, S. U., Sim, K. S., and Rhee, K. H. 1999. A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. In: Proc. Information Security, Lecture Notes in Computer Science. 1729: 191-201. Berlin Springer-Verlag.
Lian, S. 2009. Multimedia Content Encryption: Techniques and Applications. Boca Raton, FL, USA: CRC Press. 89-107.
Shi, C., and Bhargava, B. 1998. An Efficient MPEG Video Encryption Algorithm. Proc. on Reliable Distributed Systems. Seventeenth IEEE Symposium. West Lafayette, IN. 20-23 October 1998. 381-386.
Tang, L. 1996. Methods for Encrypting and Decrypting MPEG Video Data Efficiently. Proc. on MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia. 219-229.
Zeng, W., and Lei, S. 2003. Efficient Frequency Domain Selective Scrambling of Digital Video. Multimedia, IEEE Transactions. 5(1): 118-129.
Sikora, Thomas. 1997. MPEG Digital Video-coding Standards. Signal Processing Magazine, IEEE. 14(5): 82-100.
Le Gall, D.1991. MPEG: A Video Compression Standard for Multimedia Applications. Communications of the ACM. 34(4): 46-58.
Weerasinghe, T. D. B. 2012. Analysis of a Modified RC4 Algorithm. International Journal of Computer Applications. 51(22): 12-16.
Mousa, A., and Hamad, A. 2006. Evaluation of the RC4 Algorithm for Data Encryption. International Journal of Computer Science and Applications. 3(2): 44-56.
Pareek, N. K., Patidar, V., and Sud, K. K. 2006. Image Encryption Using Chaotic Logistic Map. Image and Vision Computing. 24(9): 926-934.
Kocarev, L., and Jakimoski, G. 2001, Logistic Map as a Block Encryption Algorithm. Physics Letters A. 289(4): 199-206.
Alvarez, G., and Li, S. 2006. Some Basic Cryptographic Requirements for Chaos-based Cryptosystems. International Journal of Bifurcation and Chaos. 16(8): 2129-2151.
Mao, Y., & Chen, G. 2005. Chaos-based Image Encryption. In Handbook of Geometric Computing, Springer Berlin Heidelberg. 231-265.
Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P. 2004. Image Quality Assessment: From Error Visibility to Structural Similarity. Image Processing, IEEE Transactions. 13(4): 600-612.
Chen, G., Mao, Y., & Chui, C. K. 2004. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitons & Fractals. 21(3): 749-761.
Munir, R. 2012. Security Analysis of Selective Image Encryption Algorithm Based on Chaos and CBC-Like Mode. Telecommunication Systems, Services, and Applications (TSSA), IEEE International Conference. Bali. 30-31 October 2012. 142-146.
Downloads
Published
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.