Skip to main content

2018 | OriginalPaper | Buchkapitel

GUESS: Genetic Uses in Video Encryption with Secret Sharing

verfasst von : Shikhar Sharma, Krishan Kumar

Erschienen in: Proceedings of 2nd International Conference on Computer Vision & Image Processing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, video security systems are essential for supervision everywhere, for example video conference, WhatsApp, ATM, airport, railway station, and other crowded places. In multi-view video systems, various cameras are producing a huge amount of video content which makes it difficult for fast browsing and securing the information. Due to advancement in networking, digital cameras, and media, interactive sites, the importance of privacy and security is rapidly increasing. Hence, nowadays the security of digital videos become an emerging research area in the multimedia domain; especially when the communication happens over the Internet. Cryptography is an essential practice to protect the information in this digital world. Standard encryption techniques like AES/DES are not optimal and efficient in case of videos. Therefore, a technique is immediately required, which can provide the security to video content. In this paper, we address the video security-related issues and their solutions. An optimized version of the genetic algorithm is employed to solve the aforementioned issues through modeling the simplified version of genetic processes. It is used to generate a frame sequence such that the correlation between any two frames is minimized. The frame sequence determines the randomization in order of frames of a video. The proposed method is not only fast but also more accurate to enhance the efficiency of an encryption process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat K., Krishan, et al. “Eratosthenes sieve based key-frame extraction technique for event summarization in videos.” MTAP (2017), pp. 1–22. K., Krishan, et al. “Eratosthenes sieve based key-frame extraction technique for event summarization in videos.” MTAP (2017), pp. 1–22.
2.
Zurück zum Zitat Kelahmetoglu, et al., Efficient utility of WhatsApp: from computer screen to the surgeon’s hand to determine maxillofacial traumas, JCS, 26, 4, (2015), pp. 1437. Kelahmetoglu, et al., Efficient utility of WhatsApp: from computer screen to the surgeon’s hand to determine maxillofacial traumas, JCS, 26, 4, (2015), pp. 1437.
3.
Zurück zum Zitat G. A. Spanos, et al., Performance Study of a Selective Encryption Scheme for the Security of Networked Real-Time Video, ICCCN, (1995), pp. 2–10. G. A. Spanos, et al., Performance Study of a Selective Encryption Scheme for the Security of Networked Real-Time Video, ICCCN, (1995), pp. 2–10.
4.
Zurück zum Zitat K., Kumar, et al., Equal Partition based Clustering approach for Event Summarization in Videos, SITIS’16, 2016, pp. 119–126. K., Kumar, et al., Equal Partition based Clustering approach for Event Summarization in Videos, SITIS’16, 2016, pp. 119–126.
5.
Zurück zum Zitat K., Sridhar, et al., System method and article of manufacture with integrated video conferencing billing in a communication system architecture, U.S. Patent No. 5,867,494. (1999). K., Sridhar, et al., System method and article of manufacture with integrated video conferencing billing in a communication system architecture, U.S. Patent No. 5,867,494. (1999).
6.
Zurück zum Zitat M., Sari, What Up with WhatsApp, TABJ, (2014), pp. 28. M., Sari, What Up with WhatsApp, TABJ, (2014), pp. 28.
7.
Zurück zum Zitat A., Mohamed, et al., An overview of video encryption techniques, IJCTE, 2, 1, (2010), pp. 103–110. A., Mohamed, et al., An overview of video encryption techniques, IJCTE, 2, 1, (2010), pp. 103–110.
8.
Zurück zum Zitat W., Chung, et al., Fast encryption methods for audiovisual data confidentiality, ITISOP, 2001. W., Chung, et al., Fast encryption methods for audiovisual data confidentiality, ITISOP, 2001.
9.
Zurück zum Zitat C., Shi, et al., A fast MPEG video encryption algorithm, ACM ICM’98. C., Shi, et al., A fast MPEG video encryption algorithm, ACM ICM’98.
10.
Zurück zum Zitat M., Gough, Video conferencing over IP: Configure, secure, and troubleshoot, Elsevier, (2006). M., Gough, Video conferencing over IP: Configure, secure, and troubleshoot, Elsevier, (2006).
11.
Zurück zum Zitat A. Senior et al., Enabling video privacy through computer vision, IEEE Security & Privacy, 3, 3, (2005), pp. 50-57. A. Senior et al., Enabling video privacy through computer vision, IEEE Security & Privacy, 3, 3, (2005), pp. 50-57.
12.
Zurück zum Zitat W. Zhang, S. S. Cheung and Minghua Chen, Hiding privacy information in video surveillance system, IEEE ICIP, (2005), pp. 868–871. W. Zhang, S. S. Cheung and Minghua Chen, Hiding privacy information in video surveillance system, IEEE ICIP, (2005), pp. 868–871.
13.
Zurück zum Zitat G.R. Blakley, Safeguarding Cryptographic Keys, Proc. Am. Federation of Information Processing Soc, 48, (1979), pp. 313-317. G.R. Blakley, Safeguarding Cryptographic Keys, Proc. Am. Federation of Information Processing Soc, 48, (1979), pp. 313-317.
14.
Zurück zum Zitat A. Shamir, How to Share a Secret, Comm. ACM, 22, 11, (1979), pp. 612–613. A. Shamir, How to Share a Secret, Comm. ACM, 22, 11, (1979), pp. 612–613.
15.
Zurück zum Zitat S. J., Gustavus, Symmetric and asymmetric encryption, ACM Computing Surveys (CSUR) 11, 4, (1979), pp. 305-330. S. J., Gustavus, Symmetric and asymmetric encryption, ACM Computing Surveys (CSUR) 11, 4, (1979), pp. 305-330.
16.
Zurück zum Zitat L., Wei, Using genetic algorithm for network intrusion detection, Proceedings of the United States Department of Energy Cyber Security Group, 1, (2004), pp. 1–8. L., Wei, Using genetic algorithm for network intrusion detection, Proceedings of the United States Department of Energy Cyber Security Group, 1, (2004), pp. 1–8.
17.
Zurück zum Zitat A. Kumar, N. Rajpal, Application of Genetic Algorithm in the Field of Steganography, Journal of Information Technology, 2, 1, (2004), pp. 12-15. A. Kumar, N. Rajpal, Application of Genetic Algorithm in the Field of Steganography, Journal of Information Technology, 2, 1, (2004), pp. 12-15.
18.
Zurück zum Zitat A. Kumar, et al., New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms, NCC’05, IIT Kharagpur (2005) pp. 579–583. A. Kumar, et al., New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms, NCC’05, IIT Kharagpur (2005) pp. 579–583.
19.
Zurück zum Zitat A. Soni, et al., Key Gen. Using Genetic Algorithm for Image Encryption, (2013). A. Soni, et al., Key Gen. Using Genetic Algorithm for Image Encryption, (2013).
20.
Zurück zum Zitat L., Qiao, et al., A new algorithm for MPEG video encryption, ICISST, 1997. L., Qiao, et al., A new algorithm for MPEG video encryption, ICISST, 1997.
21.
Zurück zum Zitat A. Tragha, et al., ICIGA: Improved Cryptography Inspired by Genetic Algorithms, ICHIT’06, (2006). A. Tragha, et al., ICIGA: Improved Cryptography Inspired by Genetic Algorithms, ICHIT’06, (2006).
22.
Zurück zum Zitat S. Wang, et al., A secure steganography method based on genetic algorithm, JIHMSP, 1, 1, (2010), pp. 28–35. S. Wang, et al., A secure steganography method based on genetic algorithm, JIHMSP, 1, 1, (2010), pp. 28–35.
23.
Zurück zum Zitat Hasso, et al., Steganography in Video Files, IJCSI, 13, 1, (2016), pp. 32. Hasso, et al., Steganography in Video Files, IJCSI, 13, 1, (2016), pp. 32.
24.
Zurück zum Zitat K. Krishan, et al., Event BAGGING: A novel event summarization approach in multi-view surveillance videos, IEEE IESC’17, 2017. K. Krishan, et al., Event BAGGING: A novel event summarization approach in multi-view surveillance videos, IEEE IESC’17, 2017.
25.
Zurück zum Zitat K. Kumar, et al., “SOMES: An efficient SOM technique for Event Summarization in multi-view surveillance videos,” Springer ICACNI’17, 2017. K. Kumar, et al., “SOMES: An efficient SOM technique for Event Summarization in multi-view surveillance videos,” Springer ICACNI’17, 2017.
Metadaten
Titel
GUESS: Genetic Uses in Video Encryption with Secret Sharing
verfasst von
Shikhar Sharma
Krishan Kumar
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7895-8_5

Neuer Inhalt