Skip to main content
Log in

Efficient opto MVC/HEVC cybersecurity framework based on arnold map and discrete cosine transform

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The rapid increase in Internet and social media services results in many cybercriminals that cause a significant deterioration in Internet security with massive unwanted consequences. Encryption technology can be employed to provide data security in digital multimedia communications. From this scene, this paper studies and proposes an efficient optical Multiview Video Coding/High-Efficiency Video Coding (MVC/HEVC) cybersecurity framework using chaotic Arnold map Transform (AMT) and Discrete Cosine Transform (DCT) for the secure transmission of MVC/HEVC data. The proposed AMT-DCT-based optical MVC/HEVC cybersecurity framework consists has two stages. In the first stage, the video frames are shuffled using the AMT, multiplied by the initial random phase mask (RPM1), and decomposed with the DCT. In the second stage, the DCT shuffled video frames are secondly shuffled using the AMT, modulated with the second random phase mask (RPM2), and decomposed with the inverse of DCT to obtain the finally encrypted video frames. The usage of AMT as a pre-processing shuffling process guarantees the advantages of noise resistance. Experiments prove that the proposed AMT-DCT-based optical MVC/HEVC cybersecurity scheme can withstand various multimedia attacks compared to the literature work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Abdelwahab KM, Abd El-atty SM, El-Shafai W, El-Rabaie S, Abd El-Samie FE (2020) Efficient SVD-based audio watermarking technique in FRT domain. Multimed Tools Appl 79(9):5617–5648

    Google Scholar 

  • Al-Afandy KA, El-Shafai W, El-Rabaie ESM, Abd El-Samie FE, Faragallah OS, El-Mhalaway A, El-Halawany MM (2018) Robust hybrid watermarking techniques for different color imaging systems. Multimed Tools Appl 77(19):25709–25759

    Google Scholar 

  • Alarifi A, Sankar S, Altameem T, Jithin KC, Amoon M, El-Shafai W (2020a) A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8:128548–128573

    Google Scholar 

  • Alarifi A, Amoon M, Aly MH, El-Shafai W (2020b) Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 8:221246–221268

    Google Scholar 

  • Bronzino F, Schmitt P, Ayoubi S, Martins G, Teixeira R, Feamster N (2020) Inferring streaming video quality from encrypted traffic: practical models and deployment experience. ACM SIGMETRICS Perform Eval Rev 48(1):27–28

    Google Scholar 

  • Chang HT, Wang YT, Chen CY (2020) Angle multiplexing optical image encryption in the Fresnel transform domain using phase-only computer-generated hologram. Photonics 7(1):1

    Google Scholar 

  • Dalal M, Juneja M (2021) A secure and robust video steganography scheme for covert communication in H. 264/AVC. Multimed Tools Appl 80:14383–14407

    Google Scholar 

  • Dey S, Khanra M (2020) Cybersecurity of plug-in electric vehicles: cyber attack detection during charging. IEEE Trans Ind Electron 68:478–487

    Google Scholar 

  • Dolati N, Beheshti A, Azadegan H (2021) A selective encryption for H 264/AVC videos based on scrambling. Multimed Tools Appl 80(2):2319–2338

    Google Scholar 

  • Elashry IF, El-Shafai W, Hasan ES, El-Rabaie S, Abbas AM, Abd El-Samie FE, Faragallah OS (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79(29):20665–20687

    Google Scholar 

  • El-Bakary EM, El-Shafai W, El-Rabaie S, Zahran O, El-Halawany M, Abd El-Samie FE (2019) Proposed enhanced hybrid framework for efficient 3D-MVC and 3D-HEVC wireless communication. Multimed Tools Appl 78(11):14173–14193

    Google Scholar 

  • El-Shafai W (2015a) Pixel-level matching based multi-hypothesis error concealment modes for wireless 3D H. 264/MVC communication. 3D Res 6(3):1–11

    Google Scholar 

  • El-Shafai W (2015b) Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res. https://doi.org/10.1007/s13319-015-0042-y

    Article  Google Scholar 

  • El-Shafai W, El-Rabaie S, El-Halawany M, Abd El-Samie FE (2017) Enhancement of wireless 3d video communication using color-plus-depth error restoration algorithms and Bayesian Kalman filtering. Wirel Pers Commun 97(1):245–268

    Google Scholar 

  • El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2018a) Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication. Int J Commun Syst 31(4):e3478

    Google Scholar 

  • El-Shafai W, El-Rabaie ESM, El-Halawany M, Abd El-Samie FE (2018b) Efficient multi-level security for robust 3D color-plus-depth HEVC. Multimed Tools Appl 77(23):30911–30937

    Google Scholar 

  • El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2018c) Performance evaluation of enhanced error correction algorithms for efficient wireless 3D video communication systems. Int J Commun Syst 31(1):e3396

    Google Scholar 

  • El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2018d) Recursive Bayesian filtering-based error concealment scheme for 3D video communication over severely lossy wireless channels. Circuits Syst Signal Process 37(11):4810–4841

    Google Scholar 

  • El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2018e) Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication. Multimed Tools Appl 77(11):13145–13172

    Google Scholar 

  • El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2019) Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimed Tools Appl 78(19):27211–27244

    Google Scholar 

  • El-Shafai W, Almomani I, Alkhayer A (2021) Optical Bit-Plane-based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication. IEEE Access 9:65004–35026

    Google Scholar 

  • Faragallah OS, Alzain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Soh B (2018) Block-based optical color image encryption based on double random phase encoding. IEEE Access 7:4184–4194

    Google Scholar 

  • Faragallah OS, AlZain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Soh B (2020a) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79(3):2495–2519

    Google Scholar 

  • Faragallah OS, Afifi A, El-Shafai W, El-Sayed HS, Alzain MA, Al-Amri JF, Abd El-Samie FE (2020b) Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications. IEEE Access 8:103200–103218

    Google Scholar 

  • Faragallah OS, Afifi A, El-Shafai W, El-Sayed HS, Naeem EA, Alzain MA, Abd El-Samie FE (2020c) Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications. IEEE Access 8:42491–42503

    Google Scholar 

  • Faragallah OS, Afifi A, El-Sayed HS, Alzain MA, Al-Amri JF, Abd El-Samie FE, El-Shafai W (2020d) Efficient HEVC integrity verification scheme for multimedia cybersecurity applications. IEEE Access 8:167069–167089

    Google Scholar 

  • Faragallah OS, El-sayed HS, Afifi A, El-Shafai W (2021a) Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Opt Lasers Eng 137:333

    Google Scholar 

  • Faragallah OS, El-Shafai W, Sallam AI, Elashry I, El-Rabaie ESM, Afifi A, El-Sayed HS (2021b) Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02832-z

    Article  Google Scholar 

  • Farah MB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:77

    MATH  Google Scholar 

  • Ganin AA, Quach P, Panwar M, Collier ZA, Keisler JM, Marchese D, Linkov I (2020) Multicriteria decision framework for cybersecurity risk assessment and management. Risk Anal 40(1):183–199

    Google Scholar 

  • Guan B, Xu D, Li Q (2020) An efficient commutative encryption and data hiding scheme for HEVC video. IEEE Access 8:60232–60245

    Google Scholar 

  • Gunduz MZ, Das R (2020) Cyber-security on smart grid: Threats and potential solutions. Comput Netw 169:107094

    Google Scholar 

  • He J, Xu Y, Luo W, Tang S, Huang J (2020) A novel selective encryption scheme for H. 264/AVC video with improved visual security. Signal Process 89:115994

    Google Scholar 

  • Ibrahim S, Egila MG, Shawky H, Elsaid MK, El-Shafai W, Abd El-Samie FE (2020) Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed Tools Appl 19:14053–14078

    Google Scholar 

  • Kaur H, Jindal N (2020) Image and video forensics: a critical survey. Wirel Pers Commun 11:1281–1302

    Google Scholar 

  • Liansheng S, Cong D, Xiao Z, Ailing T, Anand A (2019) Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Lasers Eng 122:113–122

    Google Scholar 

  • Long M, Peng F, Gong X (2018) A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network. Int J Digit Crime Forensics (IJDCF) 10(2):23–39

    Google Scholar 

  • Peng F, Zhang X, Lin ZX, Long M (2019) A tunable selective encryption scheme for H. 265/HEVC based on chroma IPM and coefficient scrambling. IEEE Trans Circuits Syst Video Technol 30(8):2765–2780

    Google Scholar 

  • Shifa A, Asghar MN, Ahmed A, Fleury M (2020) Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams. J Ambient Intell Humaniz Comput 11(11):5369–5397

    Google Scholar 

  • Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press, London

    Google Scholar 

  • Simon J, Omar A (2020) Cybersecurity investments in the supply chain: Coordination and a strategic attacker. Eur J Oper Res 282(1):161–171

    MathSciNet  MATH  Google Scholar 

  • Singh N (2018) XOR encryption techniques of video steganography: a comparative analysis. In: Chi M (ed) International conference on intelligent systems design and applications. Springer, Cham, pp 203–214

    Google Scholar 

  • Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79(23):15901–15921

    Google Scholar 

  • Soliman NF, Khalil MI, Algarni AD, Ismail S, Marzouk R, El-Shafai W (2021) Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed Tools Appl 80(3):4789–4823

    Google Scholar 

  • Taha MA, Hamidouche W, Sidaty N, Viitanen M, Vanne J, Assad SE, Déforges O (2020) Privacy protection in real time HEVC standard using chaotic system. Cryptography 4(2):18

    Google Scholar 

  • Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KKR (2020) A systematic literature review of blockchain cyber security. Digit Commun Netw 6(2):147–156

    Google Scholar 

  • Thiyagarajan K, Lu R, El-Sankary K, Zhu H (2018) Energy-aware encryption for securing video transmission in Internet of Multimedia Things. IEEE Trans Circuits Syst Video Technol 29(3):610–624

    Google Scholar 

  • Wang M, Pousset Y, Carré P, Perrine C, Zhou N, Wu J (2020) Optical image encryption scheme based on apertured fractional Mellin transform. Opt Laser Technol 124:106001

    Google Scholar 

  • Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545–559

    MathSciNet  MATH  Google Scholar 

  • Xu H, Tong X, Wang Z, Zhang M, Liu Y, Ma J (2020) Robust video encryption for H. 264 compressed bit-stream based on cross-coupled chaotic cipher. Multimed Syst 6:363–381

    Google Scholar 

  • Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816

    Google Scholar 

  • Zhang LP, Liu Y, Wei ZC, Jiang HB, Bi QS (2020) A novel class of two-dimensional chaotic maps with infinitely many coexisting attractors. Chin Phys B 26:060501

    Google Scholar 

  • Zimba A, Wang Z, Mulenga M, Odongo NH (2020) Crypto mining attacks in information systems: an emerging threat to cyber security. J Comput Inform Syst 60(4):297–308

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid El-Shafai.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Faragallah, O.S., El-Sayed, H.S. & El-Shafai, W. Efficient opto MVC/HEVC cybersecurity framework based on arnold map and discrete cosine transform. J Ambient Intell Human Comput 14, 1591–1606 (2023). https://doi.org/10.1007/s12652-021-03382-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03382-8

Keywords

Navigation