Video Encryption Based on Chaotic Systems in the Compression Domain

Ali Abdulgader (1), Kasmiran Jumari (2), Mahamod Ismail (3), Tarik Idbeaa (4)
(1) Department of Electrical, Electronic & Systems Engineering, University Kebangsaan Malaysia
(2) Department of Electrical, Electronic & Systems Engineering, University Kebangsaan Malaysia
(3) Department of Electrical, Electronic & Systems Engineering, University Kebangsaan Malaysia
(4) Department of Electrical, Electronic & Systems Engineering, University Kebangsaan Malaysia
Fulltext View | Download
How to cite (IJASEIT) :
Abdulgader, Ali, et al. “Video Encryption Based on Chaotic Systems in the Compression Domain”. International Journal on Advanced Science, Engineering and Information Technology, vol. 2, no. 1, Feb. 2012, pp. 85-89, doi:10.18517/ijaseit.2.1.160.
With the development of the internet and multimedia technology digital video encryption has attracted a great deal of research interest in the recent few years in applications. In this paper, we propose a method to encrypt video data. The proposed algorithm is based on the MPEG video coding standard. It selectively encrypts some DCT coefficients in the I frame, B frame and P frame in MPEG video compression by using chaotic systems. The key in this paper is chaotic sequence based on logistic mapping. It can produce the pseudo-random sequences with good randomness. The experimental results based on chaotic maps prove the effectiveness of the proposed method, showing advantages of large key space and high-level security. The proposed algorithm was measured through a series of tests and achieved good results. The results indicate that the algorithm can be implemented for video encryption efficiently and it provides considerable levels of security.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).