CFP last date
01 January 2025
Reseach Article

Spatial Domain Video Encryptionand Authentication using Chaotic Maps and Secure Whirlpool Hash

Published on February 2016 by Karan Nair, Janhavi Kulkarni, Karan Asher, Vicky Chheda, Jonathan Joshi
CAE Proceedings on International Conference on Communication Technology
Foundation of Computer Science USA
ICCT2015 - Number 1
February 2016
Authors: Karan Nair, Janhavi Kulkarni, Karan Asher, Vicky Chheda, Jonathan Joshi
c91e7b11-f6e5-477c-ad01-5eec02c77862

Karan Nair, Janhavi Kulkarni, Karan Asher, Vicky Chheda, Jonathan Joshi . Spatial Domain Video Encryptionand Authentication using Chaotic Maps and Secure Whirlpool Hash. CAE Proceedings on International Conference on Communication Technology. ICCT2015, 1 (February 2016), 0-0.

@article{
author = { Karan Nair, Janhavi Kulkarni, Karan Asher, Vicky Chheda, Jonathan Joshi },
title = { Spatial Domain Video Encryptionand Authentication using Chaotic Maps and Secure Whirlpool Hash },
journal = { CAE Proceedings on International Conference on Communication Technology },
issue_date = { February 2016 },
volume = { ICCT2015 },
number = { 1 },
month = { February },
year = { 2016 },
issn = 2394-4714,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icct2015/number1/522-0169/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 CAE Proceedings on International Conference on Communication Technology
%A Karan Nair
%A Janhavi Kulkarni
%A Karan Asher
%A Vicky Chheda
%A Jonathan Joshi
%T Spatial Domain Video Encryptionand Authentication using Chaotic Maps and Secure Whirlpool Hash
%J CAE Proceedings on International Conference on Communication Technology
%@ 2394-4714
%V ICCT2015
%N 1
%P 0-0
%D 2016
%I Communications on Applied Electronics
Abstract

Digital video is one of the most popular multimedia data exchanged over the internet. Previous cryptography studies have focused on text data. The encryption algorithms developed for text data may not be suitable to multimedia applications because of large sizes of video. We present an algorithm in which a video file is encrypted by considering each frame as acolour image. Each video frame is broken down into RGB planes. Chaotic mapping algorithms are applied on all the planes of each frame, the temporal and horizontal domain of the video. For end-to-end authentication, semantically secure whirlpool hash has been used. Data integrity is verified using XOR hash which can detecttampering of data at any intermediate node. The algorithm was run on different videos, and satisfying results were obtained.

References
  1. Deshmukh, P. , Kolke, V. 2014. Modified AES based Algorithm for MPEG Video Encryption.
  2. C. NarsimhaRaju, Srinathan, K. , Jawahar, C. V. 2008. Real-Time Video Encryption Exploiting Distribution of the DCT coefficients. International Institute of Information Technology, Hyderabad.
  3. Shi, C. , Bhargava, B. 1998. An Efficient MPEG Video Encryption Algorithm. Purdue University.
  4. Igorevich, R. R. , Yong, H. , Dugki Min, Eunmi Choi. 2010. A Study on Multimedia Security Systems in Video Encryption.
  5. Jiri Fridrich. 1998. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos.
  6. Salleh, M. , Ibrahim, S. , Isnin, I. F. 2003. Image Encryption Algorithm Based on Chaotic Mapping.
  7. Zhang, X. , Fan, X. , Wang, J. , Zhao, Z. 2014. A Chaos Based Image Encryption Scheme Using Rectangular Transform and Dependent Substitution.
  8. William Stallings. 2006. The Whirlpool Secure Hash Function.
  9. Baretto, Paulo, S. L. M. , Rijmen, V. 2003. The Whirlpool Hashing Function.
  10. Peterson, G. 1997. Arnold's Cat Map
Index Terms

Computer Science
Information Sciences

Keywords

Authentication chaotic maps encryption hash integrity multimedia spatial domain video whirlpool XOR