亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Opto-Video Encryption Based on Logistic Adjusted Sine map in FrFT

        2022-08-24 07:02:14OsamaFaragallahAshrafAfifiIbrahimElashryEnsherahNaeemHebaElHosenyAhmedSallamandHalaElsayed
        Computers Materials&Continua 2022年8期

        Osama S.Faragallah,Ashraf Afifi,Ibrahim F.Elashry,Ensherah A.Naeem,Heba M.El-Hoseny,Ahmed I.Sallam and Hala S.El-sayed

        1Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif 21944,Saudi Arabia

        2Department of Electrical Engineering,Kafrelsheikh University,Kafrelsheikh 61519,Egypt

        3Electrical Department,Faculty of Industrial Education,Suez University,Suez 43527,Egypt

        4Department of Electronics and Electrical Communication Engineering,Al-Obour High Institute for Engineering and Technology 3036,Egypt

        5Department of Computer Science and Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf 32952,Egypt

        6Department of Electrical Engineering,Faculty of Engineering,Menoufia University,Shebin El-Kom 32511,Egypt

        Abstract: In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time.This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map (LASM)in the Fractional Fourier Transform (FrFT).In the presented opto-video LASM-based FrFT scheme,the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using two-phase modulation forms on the video frame,the first in the time-domain and the second in the FrFT domain.In the end,the ciphervideo frame is spotted utilizing a CCD digital camera and transformed into a digital structure that can be managed using a computer.We test the proposed opto-video LASM-based FrFT scheme using various security tools.The outcomes demonstrate that the presented scheme can effectively encrypt and decrypt video signals.In addition,it encrypts videos with a high level of encryption quality without sacrificing its resistance to noise immunity.Finally,the test outcomes demonstrate that the presented scheme is immune to known attacks.

        Keywords: Optical encryption;FrFT;logistic-adjusted sine map

        1 Introduction

        Since the presentation of video cameras in the mid of 19th century,watching movies and videos have become a norm in our daily lives.For instance,we watch movies and films for entertainment and educational purposes.Videos have also been utilized for many other applications,including but not limited to video chatting and conferencing to communicate with people,advertising products and services and playing video games.Videos are considered nowadays the most common form of information transmitted over the internet.Online video traffic had increased from 67%of all internet traffic in 2014 to 80%of all internet traffic in 2019.This increase is due to advancements in internet speeds.A lot of video traffic is confidential and must be kept only for the intended users [1,2].For instance,video chatting and conferencing can be hacked to obtain secret information.In addition,paid Video on Demand(VoD)services must be kept only for the rightful subscribers.Copyrighted films and videos must be kept safe from tampering or stealing.That is why in many applications encrypting videos while being transmitted over the internet is a must.

        Since videos are large,traditional encryption systems are not practically used to encrypt videos.Therefore,we must consider the trade-off between performance and security.To address this issue,many works in encrypting videos had been introduced in the literature.Xu et al.[3]presented an efficient video encryption system.Their system is based on generating a keystream to encrypt videos selectively.This keystream is created using a chaotic pseudo-random number generator(RNG).The experimental outcomes demonstrate that their system is efficient,and it can withstand cryptanalysis attacks.

        Fahmeeda et al.[4]presented a computational and time-efficient video encryption system suitable for real-time video applications such as VOD and pay-per-view without affecting security.Their system does not require any special hardware requirements,and the encryption/decryption keys are small and manageable.In their system,the video frames in the videos are twisted by an angle and encrypted using keys created by Faro in an out perfect scrambling algorithm.

        Altaf et al.[5]presented a selective video encryption system that considersincreasing security with minimal computational resources.Their system also preserves the video compression and fulfillment to the video format.First,their system compresses the video data in a way the statistical and structural properties are maintained.Then,chaotic maps alter the substation boxes in the advanced encryption standard(AES)[6].Then the video is encrypted utilizing the altered AES and H.264/AVC[7].The test results show that their system has reasonably distorted the encrypted video without negatively affecting the video format and compression.Valli et al.[8]proposed two video encryption systems based on chaotic maps.The first is based on a high 12D chaotic map,and the second one is founded on the Ikeda delay differential equation(DDE).To encrypt the videos,the proposed system uses the chaotic maps to scramble the first frame,then the scrambled first frame is then XORed with the second frame,and the result is scrambled using the chaotic map and so on.This technique in encryption is called cipher block chaining(CBC).Their systems are secure against cryptanalysis attacks,but this comes with the cost of not supporting parallel processing.Salamudeen et al.[9]presented a video encryption system that uses spin and element anti-diagonal matrices to encrypt videos.The spin matrix is used to divide the video frame into blocks of pixels,and then the element anti-diagonal matrix is used to encrypt/decrypt these blocks.Their system is computationally efficient and fast,which makes it suitable for online video streaming.In addition,the proposed system effectively degrades the quality of the encrypted video,and it does not rely on the video format.Their system can withstand cryptanalysis attacks.In [10],Xu presented a hybrid encryption/steganographic system used to secure high efficiency video coding(HEVC).Their system is commutative,i.e.,the embedded data has no negative effect on decrypting an encrypted video,and the inserted data can be properly recovered from the ciphered video.The HEVC parameters of motion vector difference (MVD) sign,the intra-prediction mode (IPM) and the quantized transform coefficient (QTC) signs are encoded.This results in a huge degradation in the video quality.The proposed system embeds the data in the QTC,which minimizes the effect of the embedded data on the video.The proposed system allows extracting the embedded data from both the encrypted and decrypted versions of the video.Nalawade et al.[11]introduced a video encryption scheme that is built on the RSA algorithm,named after its inventors Rivest,Lihua et al.[12]and Pseudo Noise(PN).This system is suitable for videos that require a high-security level regardless of the encryption/decryption speeds.Their system is designed to encrypt Audio Video Interleaved(AVI)[13]video format,but it can be easily modified to encrypt Moving Picture Experts Group (MPEG)[14]video format.The frames and the audio of the foundation video file are encrypted twice using the RSA algorithm followed by PN to increase the security level.Khyioon et al.[15]introduced a video encryption method built on the NTRU [16]encryption (an open-source cryptosystem based on the lattice) and chaotic maps.Their system works with various video formats,including AVI,Windows Media Video(WMV),MOV,which is a format for QuickTime and MP4.Their system encrypts videos using the NTRU encryption while decrypts videos using chaotic maps.This allows a high level of security while maintaining a high decryption speed.They implemented their system using visual basic.

        Long et al.[17]proposed a hybrid steganographic/encryption system that works for the HEVC video format.The signs of residual coefficients and the amplitudes of motion vector differences are encrypted using RC4[18]using an encryption key.At the same time,data can be embedded in nonzero AC residual coefficients using a hiding key,which is independent of the encryption key.Their system is separable,i.e.,a receiver can decrypt the video with an acceptable quality if he possesses the decryption key but cannot get the hidden data without the hiding key.On the other hand,the receiver can get the inserted data using the hiding key but cannot decrypt the video without the decryption key.Thus,he must have both keys to decrypt the video and extract the inserted data.

        The remainder of the paper is sectioned as follows.Section 2 explores the fundamental transform frameworks,including the Logistic-adjusted-Sine map(LASM)and the Fractional Fourier Transform(FrFT).Section 3 presents the opto-video LASM-based FrFT scheme.Section 4 represents the simulation outcomes of the proposed opto-video LASM-based FrFT scheme.Finally,section 5 represents the conclusions of the paper.

        2 Fundamental Transform Frameworks

        This part presents the two essential components utilized to construct the proposed video encryption system;the Logistic-adjusted-Sine map and the Fractional Fourier Transform(FrFT).

        2.1 Logistic Adjusted Sine Map(LASM)

        The LASM represents a 2D chaotic mapping that can mix the pixels in a video frame.Its mathematical form is as follows[19,20]:

        where μ ∈[0,1].The LASM is a mixture of Sine and Logistic maps.Firstly,the logistic equationxi(1-xi)is modulated by μ after adding it to the Sine map.Next,the phase matrix is expanded to 2D.With the LASM,the two inputs are controlled,and the resulted(xi+1,yi+1)are distributed to the 2D phase matrix.It is much more complicated than the Sine and Logistic maps and the outcomes are more complicated than predicted[19,20].

        2.2 The Fractional Fourier Transform(FrFT)

        The FrFT represents a linear alteration thought as a generality of the classical Fourier Transform(FT).Hence,the FrFT is named rotational FT.The FrFT kernel is expressed as follows[21-23]:

        The FrFT works by revolving the entered signal in the continuous time-frequency plane anticlockwise from(t,w)coordinates to(u,v)coordinates via an angle α=aπ/2,0 ≤a ≤1.The FrFT of a signal x(t)is expressed as follows:

        where u is some hybrid time-frequency variable.For a generalized function f(x),

        where a is the FrFT transform fractional order and α is the operator of FrFT[21-23].

        3 The Proposed Encryption Mechanism

        In the proposed opto-video LASM-based FrFT scheme,the plainvideo frames are split into distinct frames and then transformed to optical signals utilizing an optical source.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using twophase modulation forms;the first in the time-domain and the second in the FrFT domain.Lastly,the video frame is collected and transferred into a digital structure that can be managed via a computer.Therefore,the encryption steps for the presented opto-video LASM-based FrFT scheme can be reviewed as follows:

        a) Read the plainvideo bit-streams.

        b) Divide the incoming condensed plainvideo bit-streams into separated plainvideo frames.

        c) For each plainvideo frame,apply the LASM and the optical FrFT,apply LASM and the inverse of optical FrFT to get the ciphervideo frame.

        d) Collect all ciphervideo frames to create the ciphervideo bit-streams.

        e) Send the ciphervideo bit-streams via a communication network to the receiver.

        In the decryption mechanism of the proposed opto-video LASM-based FrFT scheme,each ciphervideo frame is subjected to the optical FrFT and the inverse of LASM,and then apply the inverse of optical FrFT and again the inverse of LASM to get the plainvideo frame.Finally,the decrypted video frames are accumulated to acquire the plainvideo bit-streams.Therefore,the receiver begins collecting the ciphervideo bit-streams.Thus,the steps of the decoding process for the proposed optovideo LASM-based FrFT scheme can be reviewed as follows:

        a) Receive the ciphervideo bit-streams.

        b) Divide the incoming ciphervideo bit-streams into separated ciphervideo frames.

        c) For each ciphervideo frame,apply the optical FrFT and the inverse of LASM,apply the inverse of optical FrFT and again the inverse of LASM to get the plainvideo frame.

        d) Collect all plainvideo frames to produce the recovered plainvideo bit-streams.

        4 Experimental Results

        We test the proposed opto-video LASM-based FrFT scheme using four samples of different video frames presented in Fig.1.

        Figure 1:Different samples of original video frames

        We first visually inspect the encoded and decoded video frames of the proposed opto-video LASM-based FrFT scheme.Then,we test the quality of the encoded video frames utilizing the entropy[24],the correlation coefficient[25],the histogram deviation(DI)[26],the irregular deviation(DH)[27],the number of pixel change rate(NPCR)and the unified average change intensity(UACI)[28].We also compare histograms[29]of the source,the encrypted,and the decrypted video frames.Next,we test the noise resistance of the presented opto-video LASM-based FrFT scheme using the peak signal to noise ratio(PSNR),the Structural Similarity Index(SSIM)and the Feature Similarity Index(FSIM)[30].Finally,we test the immunity of the presented opto-video LASM-based FrFT scheme against some recognized attacks such as occlusion and edge detection.

        4.1 Visual Inspection

        We visually inspect the encrypted and decrypted video frames quality.The visual results are depicted in Tab.1.From these figures,we can see that the proposed opto-video LASM-based FrFT scheme can conceal the details of the video frames and successfully retrieve back the original frames without any noticeable quality distortion.

        4.2 Encryption Quality

        We first explain the measurements used to investigate the encryption quality of the presented opto-video LASM-based FrFT scheme,and then we show and discuss the results.

        Table 1:Encryption and decrypted video frames using the proposed opto-video LASM-based FrFT scheme

        4.2.1 The Entropy

        Information entropy is used to measure how much information is in a video frame[24].It is built on the chances of the existence of every pixel’s value in the video frame.The more the entropy is,the more the chances of every pixel’s value in the video frame are close to each other.Consequently,the more improved is the characteristic of the encoded video frames[24].The information entropy can be expressed as:

        where IE(x)is the entropy in bits and P(xi)is the chance of the existence of the pixel xi.

        4.2.2 Correlation Coefficient

        An accepted video encryption system must hide any statistical similarity among the video frame and its encoded form.This is essential to avoid any leak of the video frame data.The correlation coefficient is a measurement of the statistical hardiness of encryption systems.A recognized characteristic of video frames is that the neighboring pixels are vastly correlated.An accepted video encryption system should conceal this correlation.The correlation coefficient CC(P,C)among the video frame P(xi,yj)and the encrypted video frame C(x,yj)is expressed as[25]:

        where E{·}is the expectation symbol.Small CC values imply better encryption system.

        4.2.3 The Histogram Deviation(DH)

        The histogram deviationDHmeasures the deviation characteristics of the video encryption system either by evaluating the variation among the original and encoded video frames[26]or by calculating the variance among the spaces under the histogram plots using the equation:

        where d(i)is the absolute change between the amplitudes at pixel level i of the acquired histograms of the plain and encoded video frames.The size of the plain and encoded video frames is denoted as W×H.HighDHvalues imply more enhanced characteristics of the encoded video frame[26].

        4.2.4 The Irregular Deviation(DI)

        The video encryption quality can be calculated by finding theDIvalue from encrypting the video frame[27].TheDIcan be calculated as:

        where h(i) is the video frame histogram at level i,and M is the mean histogram distribution value for an ideal encrypted video frame.The less the value of DI is,the more improved the encoded video frames[27].

        4.2.5 NPCR and UACI

        A vital characteristic of a video encryption system is the diffusion characteristic[28].A minimal alteration in the video frame before encryption leads to a whole transformation in the encrypted video frame.This is essential for video encryption systems to endure cryptanalysis attacks.Two tools are utilized to measure the diffusion characteristic;the NPCR and the UACI[26].The NPCR determines the number of altered pixels between the two video frames.Suppose that C1(xi,yj),and C2(xi,yj)are two encrypted video frames such that these two video frames are changed in only one pixel.The NPCR can be expressed as[28]:

        where N is the pixels number in the video frame and D(xi,yj)can be expressed as:

        The UACI calculates the average intensity change between C1(xi,yj)and C2(xi,yj).

        It can be expressed as[28]:

        High NPCR and UACI values imply more enhanced encoded video frames quality.The outcomes of the entropy,the correlation coefficients,the histogram deviation(DH),the irregular deviation(DI),NPCR and UACI of the proposed opto-video LASM-based FrFT scheme are listed in Tab.2.

        Table 2:The quality matrices results of the proposed opto-video LASM-based FrFT scheme

        4.2.6 The Histogram Analysis

        The histogram of a video frame is a plot that demonstrates the relationship among the pixel values and their occurrences in the video frame[29].The more constant the plot is,the more enhanced is the encrypted video frames quality.Furthermore,the plainvideo and ciphervideo frames histogram must be dissimilar to ensure no statistical information leak about these frames.In addition,the histograms of the decrypted and the original frames must be identical for perfect decryption.The histograms of the plainvideo,ciphervideo,and decoded frames are shown in Tab.3.

        Table 3:Histogram outcomes of the plainvideo,ciphervideo,and decoded frames using the proposed opto-video LASM-based FrFT scheme

        4.3 Noise Immunity

        The noise immunity for the proposed opto-video LASM-based FrFT scheme is defined as the capability of the encryption system to successfully decrypt the video frame when it is vulnerable to noise throughout the communication.The noise immunity of the proposed opto-video LASM-based FrFT scheme is verified using the Additive White Gaussian Noise(AWGN)and salt and pepper noise of multiple intensities.After that,we compare the decrypted ciphervideo frame quality.The assessment of the noise immunity is done using visual inspection,the PSNR,the SSIM and the FSIM[30].

        The PSNR is the fraction between the maximum pixel value(255 in the case of gray scale frames or 224-1 in RGB frames)to the mean square error(MSE).

        The PSNR can be expressed as[30]:

        where MSE is calculated as[30]:

        where O(xi,yj)and D(xi,yj)denote the pixel values at places xi,yjin plainvideo and the deciphered ciphervideo frames,correspondingly[30].

        The SSIM measures the decrypted video frame quality compared with the original video frame for the structure information,the luminance masking and the contrast masking[30].The SSIM ranges between 1 and-1 where 1 shows that both video frames are matching.It is expressed as follows[30]:

        where m,m2and σ represent the video frame mean,variance,and standard deviation.The o,r are the plain and decoded video frames.σordenotes the covariance of both video frames.c1,c2are constants[30].

        The Feature Similarity Index Method (FSIM) measures the features resemblance of two video frames using two factors;the Phase Congruency (PC) and Gradient Magnitude (GM) [26].The PC detects the video frame structures in the frequency domain while the GM gets the video frame gradient[30].

        Assume two video frames;O for the plainvideo and R for the decrypted ciphervideo frame.The congruency of the decrypted and the original video frames are PC1 and PC2.We also obtain the magnitude gradients G1 and G2 from the decrypted and original video frames correspondingly.The FSIM can be evaluated as follows[30]:

        Next,we find the resemblance between both video frames based on G1 and G2 as follows:

        where T1,T2 are positive constants.

        FSIM of the two video frames can be formulated using Spcand SGas follows[30]:

        where a and b are the factors of comparative standing between the PC and the MG[30].The decrypted video frames are shown in Tab.4.The results of PSNR,SSIM and FSIM among the plainvideo and decrypted ciphervideo frames with AWGN and salt and pepper noises are depicted in Tabs.5-7.

        Table 4:The decrypted video frames utilizing the presented opto-video LASM-based FrFT scheme in the presence of AWGN and Salt&Peppers noises

        Table 5:PSNR for the decrypted video frames utilizing the presented opto-video LASM-based FrFT scheme in the presence of AWGN and Salt&Peppers noises

        Table 6:SSIM for the decrypted video frames utilizing the presented opto-video LASM-based FrFT scheme in the presence of AWGN and Salt&Peppers noises

        Table 7:FSIM for the decrypted video frames utilizing the presented opto-video LASM-based FrFT scheme in the presence of AWGN and Salt&Peppers noises

        4.4 Immunity Against Occlusion Attacks

        The occlusion attack is an attack that crops the encrypted video frames,and the proposed optovideo LASM-based FrFT scheme can withstand this attack if most of the features can be recovered in the decryption.We test the proposed opto-video LASM-based FrFT scheme by attacking the encrypted video frames with 25%and 50%occlusions and testing the similarity between the original and decrypted video frames.The occlusion attack results for Ballaroom 200 and Vasar video frames illustrated in Tab.8 prove the immunity of the presented opto-video LASM-based FrFT scheme against the occlusion attack.

        Table 8:Immunity of the presented opto-video LASM-based FrFT scheme to occlusion attack for the encrypted 3VD Ballaroom 200 and Vasar with 25%,and 50%occlusions

        5 Conclusions

        This paper presents an efficient and secure opto-video LASM-based FrFT scheme based on LASM and FrFT.In the proposed opto-video LASM-based FrFT scheme,the encoded video frames are split into distinct frames and then transformed from electrical signals to optical signals utilizing an optical supply.Each of the optical video frames is encrypted by utilizing the LASM in the optical FrFT system using two-phase modulation forms;the first in the time-domain and the second in the FrFT domain.In the end,the video frame is captured with a CCD digital camera and transformed into a digital format which can be handled with the computer.We tested the quality of the proposed optovideo LASM-based FrFT scheme using the visual inspection,the entropy,the correlation coefficient,the DH,the DI,the histogram analysis,the NPCR and the UACI.The results showed that the presented opto-video LASM-based FrFT scheme effectively encrypts and decrypts video signals without forfeiting its resistance to noise immunity.In addition,the presented opto-video LASM-based FrFT system was tested for its immunityvs.recognized attacks such as the occlusion attack and the edge detection,and the results showed that its immunity against these types of attacks.To conclude,the proposed opto-video LASM-based FrFT scheme can be used to secure videos transmitted over the internet without sacrificing its efficiency.

        Acknowledgement:The authors would like to thank the Deanship of Scientific Research,Taif University Researchers Supporting Project Number (TURSP-2020/08),Taif University,Taif,Saudi Arabia for supporting this research work.

        Funding Statement:This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting Project Number(TURSP-2020/08),Taif University,Taif,Saudi Arabia.

        Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

        五十路一区二区中文字幕| 无套内谢孕妇毛片免费看看| 香蕉网站在线| 亚洲免费视频一区二区三区| 中文av字幕一区二区三区| 久久午夜羞羞影院免费观看| 99久久亚洲精品无码毛片| 精品18在线观看免费视频| 国产视频免费一区二区| 国产免费又色又爽粗视频| 亚洲精品无码不卡在线播放he| 亚洲熟女网站| 91国语对白在线观看| 欧美成人网视频| 思思久久96热在精品不卡| 日韩精品av在线一区二区| 国产亚洲精品97在线视频一| 国产精品一区二区久久乐下载 | 伊人蕉久中文字幕无码专区| 91精品国产综合久久青草| 国产在线观看女主播户外| 青青草原亚洲| 欧美午夜精品久久久久久浪潮| 一区二区三区国产97| 日本成年一区久久综合| 亚洲国产成人片在线观看 | 国产99久久久国产精品免费看| 国产精品多人P群无码| 香蕉久久久久久久av网站| 日韩国产一区| 国产精品成人黄色大片| 日韩女同视频在线网站| 欧美日韩一区二区综合| 精品91亚洲高清在线观看| 国产中文字幕亚洲国产| a级毛片免费观看在线播放| 99亚洲精品久久久99| 人妻少妇精品视频一区二区三区| 自拍偷自拍亚洲一区二区| 亚洲妇熟xxxx妇色黄| 品色堂永远的免费论坛|