Abstract

Problem statement: The widespread use of image, audio and video data makes media content protection increasingly necessary and important. We propose a naive approach which treats the multimedia signal to be protected as a text and use proposed encryption design to encrypt the whole data stream. Upon reception, the entire cipher text data stream would be decrypted and playback can be performed at the client end with an initial time delay. Approach: We introduce a block cipher algorithm, which encrypts and decrypts a block size of 512 bits regardless of the file format. In this, a permutation algorithm using a chaotic system is employed to provide the shuffler function. A shuffler operator is defined using the shuffler function. A random key generator generates key sequences and the scheme employs key-dependant transformations based on distance in the shuffling operator. The process of encryption/decryption is governed by the shuffler function, shuffler operator and the pseudorandom key. Results: The basic operation used is logical XOR and so the algorithm has a very high encryption/decryption speed. The execution time shows the proposed scheme is faster than the existing cryptographic schemes. Conclusion: The proposal of the algorithm is to manage the tradeoffs between the speed and security and hence appropriate for real-time image and video communication applications.

Highlights

  • The widespread usage of Internet is providing additional channels for a pirate to and quickly distribute the copyrighted digital content

  • Behnia et al (2009), a symmetric key block cipher algorithm based on tripled chaotic maps was introduced

  • The design tools of our scheme are based on primitive operations, shuffler function and chaotic map with non-linear transformation functions

Read more

Summary

INTRODUCTION

The widespread usage of Internet is providing additional channels for a pirate to and quickly distribute the copyrighted digital content. Qiao and Nahrstedt sequences which are independent and approximately (1997); Shi and Bhargava (1998) and Shi et al (1999), uniform It generates a new pseudo-random sequence the VEA was proposed which uses a traditional after a series of transformations, which covers the symmetric key cryptography to encrypt the sign bit of plaintext by executing Exclusive-OR and Shift DCT coefficients and motion vectors. Behnia et al (2009), a symmetric key block cipher algorithm based on tripled chaotic maps was introduced. The design tools of our scheme are based on primitive operations, shuffler function and chaotic map with non-linear transformation functions. It utilizes the discrete chaotic cryptosystem which provides the shuffler function which has values uniformly distributed in the value space. Equation 1 is called a Simple Logistic Function (SLF) which is a single parameter second order

RESULTS
DISCUSSION
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.