Video Encryption Algorithm and Key Manag
Video Encryption Algorithm and Key Manag
com
ISSN : 2248-9622, Vol. 7, Issue 7, ( Part -3) July 2017, pp.01-05
ABSTRACT
Advancements in networking technologies like cloud computing have popularized applications like, Video-On
Demand (VOD), video conferencing, pay-per-view, video broadcast, etc, in all such applications, confidentiality
of the video data during transmission in network and during storage is extremely important. This necessitates
secure video encryption algorithms suitable for multimedia application because of the large data size and real
time constraint. Conventional encryption algorithms are designed for generic data, and as such, it does not
support many specific video application requirements. In the paper we propose a computationally efficient and
secure video encryption algorithm that makes encryption feasible for real-time applications without heavy
computational overhead and reduces key management by utilizing block shuffling technique. Block Shuffling
based video encryption with Faro IN OUT Shuffle and rotation, i.e., first image is rotated by an angle then key is
generated based Block size using Faro IN OUT perfect shuffle which is a perfect shuffling algorithm which is
isomorphic to random permutation. we will show that our proposed method provide more scrambling of image
then random permutation and no need to maintain long key file.
Keywords: Block Shuffling, Faro Perfect Shuffle, Key Management, Mean Squared Error, Peak Signal to Noise
Ratio, Pure Random Permutation, Structural Similarity Index Measure, Video Encryption
I. INTRODUCTION
Security is becoming escalating concern in Categorization of Video Encryption Algorithms
increasing multimedia defined world. With Layered Encryption, in this technique videos
continuing development of network communications, frames are encrypted using DES, IDEA, AES,
fast advances in Internet technology, easily capturing RSA, etc. those techniques are not suitable for
of videos and cloud computing systems multimedia real time applications due to speed limitations
data are of importance for use more and more widely, Selective Encryption, encrypt the bytes in frame
in applications such as video-on-demand, video that require more security to reduce
conferencing, broadcasting, etc. as it is closely computational complexities
related to many aspects of daily life, including Permutation based Encryption, use scrambling of
education, commerce, entertainment, defense and frame to encrypt, random numbers are used as
politics. In order to maintain privacy or security key to scrambling process.
sensitive data need to be protected before The work is motivated to provide video security
transmission or storage. through block shuffling with key generated using
Authorized user only can get back the Faro IN OUT shuffle rather than random
original content using the decryption algorithm. permutation.
Encrypting, a block cipher might take an n-bit block
of plaintext as input and output a corresponding n-bit Random Permutation
block of cipher-text. Exact transformation is Random permutation a random ordering of a set of
controlled using a second input – the secret key. objects, i.e, a permutation valued random variable.
Decryption is similar, takes an n-bit block of cipher- The use of random permutations is often fundamental
text together with the secret key and outputs the to fields that use randomized algorithms such
original n-bit block of plaintext. Block-ciphers as coding theory, cryptography, and simulation.
examples are RC5, AES, DES, Blowfish, many more. Generation of a random permutation for a set of
In this case we use block shuffling in each frame to length n uniformly at random interval is generated as
perform encryption decryption is performed by re- sequence by taking a random number between 1 and
shuffling blocks back. n sequentially, ensuring no repetition, and
interpreting this sequence (r1, ..., rn) as the 𝐴𝑙𝑔𝑜𝑟𝑖𝑡𝑚 1: 𝐾𝑒𝑦 𝐺𝑒𝑛𝑒𝑟𝑎𝑡𝑖𝑜𝑛 𝑈𝑠𝑖𝑛𝑔 𝐹𝑎𝑟𝑜
permutation shown below equ. (1). 𝑃𝑒𝑟𝑓𝑒𝑐𝑡 𝑆𝑢𝑓𝑓𝑙𝑒
𝐼𝑛𝑝𝑢𝑡: 𝐹𝑟𝑎𝑚𝑒 𝑆𝑖𝑧𝑒 𝑀𝑋𝑁, 𝐵𝑙𝑜𝑐𝑘 𝑆𝑖𝑧𝑒 𝐵
𝑂𝑢𝑡𝑝𝑢𝑡: 𝐴𝑛 𝐴𝑟𝑟𝑎𝑦 𝑜𝑓 𝐼𝑛𝑡𝑒𝑔𝑒𝑟𝑠 𝐾
1,2,3, … . , 𝑛 𝑆𝑡𝑒𝑝 1: 𝐹𝑖𝑛𝑑 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐵𝑙𝑜𝑐𝑘 𝑖𝑛 𝑓𝑟𝑎𝑚𝑒 ‘2𝑛’
(1)
𝑟1, 𝑟2, 𝑟3, … , 𝑟𝑛 𝑢𝑠𝑖𝑛𝑔 𝑓𝑟𝑎𝑚𝑒 𝑠𝑖𝑧𝑒 𝑎𝑛𝑑 𝑏𝑙𝑜𝑐𝑘 𝑠𝑖𝑧𝑒
𝑆𝑡𝑒𝑝 2: 𝐷𝑖𝑣𝑖𝑑𝑒 𝑛 𝑖𝑛𝑡𝑜 𝑡𝑤𝑜 𝑎𝑙𝑣𝑒𝑠 (0, 1, . . . , 𝑛
Image Shuffler: Key Generation using Faro − 1, 𝑛, . . . , 2𝑛 − 1)
Perfect Shuffle 𝑆𝑡𝑒𝑝 3: 𝐼𝑛𝑡𝑒𝑟𝑙𝑎𝑐𝑒 𝑡𝑒 𝑑𝑖𝑣𝑖𝑑𝑒𝑑 𝑎𝑙𝑣𝑒𝑠 𝑢𝑠𝑖𝑛𝑔
Perfect shuffle is a permutation of n 𝐼𝑛 𝑆𝑢𝑓𝑓𝑙𝑒 𝐼 (𝑛, 0, 𝑛 + 1, . . . , 2𝑛 − 1, 𝑛 − 1)
elements each shuffle produces a new permutation or 𝑆𝑡𝑒𝑝 4: 𝐴𝑝𝑝𝑙𝑦 𝑜𝑢𝑡 𝑠𝑢𝑓𝑓𝑙𝑒 𝑜𝑛 𝑂 𝑂𝑢𝑡 𝑠𝑢𝑓𝑓𝑙𝑒 (𝐼)
returns to a previous at some point the process would 𝑆𝑡𝑒𝑝 5: 𝑟𝑒𝑡𝑢𝑟𝑛 𝐾𝑒𝑦 𝐾 ← 𝑂, 𝐵
return to the original order. Moreover, there are n! set
of n elements. The key generated group generated
using Faro perfect shuffle is a non-random process.
There are two ways to perfectly shuffle using faro in
𝐴𝑙𝑔𝑜𝑟𝑖𝑡𝑚 2: 𝐹𝑟𝑎𝑚𝑒 𝐸𝑛𝑐𝑟𝑦𝑝𝑡𝑖𝑜𝑛 𝑢𝑠𝑖𝑛𝑔
and out shuffle. The process Key generation starts by
𝐵𝑙𝑜𝑐𝑘 𝑆𝑢𝑓𝑓𝑙𝑖𝑛𝑔
deciding the number of blocks in an image (natural
number - 2n blocks), both the methods cut the 𝐼𝑛𝑝𝑢𝑡 ∶ 𝐹𝑟𝑎𝑚𝑒 𝐹𝑖 𝑤𝑒𝑟𝑒 𝑖 = 1,2 … . . , 𝑛,
number 2n into half‟s and interlace perfectly. The in 𝐵𝑙𝑜𝑐𝑘 𝑆𝑖𝑧𝑒 𝐵, 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐵𝑙𝑜𝑐𝑘𝑠 2𝑛
shuffle „I‟ leaves the original first block at second 𝑂𝑢𝑡𝑝𝑢𝑡 ∶ 𝑃𝑒𝑟𝑓𝑒𝑐𝑡𝑙𝑦 𝑆𝑢𝑓𝑓𝑙𝑒𝑑 𝐹𝑟𝑎𝑚𝑒 𝐹𝑖′
block position. The out shuffle „0‟ leaves the original 𝐹𝑜𝑟 𝑒𝑎𝑐 𝑖 = 1,2, … , 𝑛
first block on correct position. Let the blocks be 𝑆𝑡𝑒𝑝 1: 𝑅𝑖 → 𝑅𝑜𝑡𝑎𝑡𝑒 𝐹𝑖 (90° 𝑜𝑟 180°)
labeled (0, 1, . . . , n − 1, n, . . . , 2n − 1). After an in 𝑆𝑡𝑒𝑝 2: 𝑈𝑠𝑒 𝐴𝑙𝑔𝑜𝑟𝑖𝑡𝑚 1 𝑓𝑜𝑟 𝑘𝑒𝑦 𝑔𝑒𝑛𝑒𝑟𝑎𝑡𝑖𝑜𝑛
shuffle the order is (n, 0, n + 1, . . . , 2n − 1, n − 𝑆𝑡𝑒𝑝 3: 𝑈𝑠𝑒 𝐵𝑙𝑜𝑐𝑘 𝑆𝑖𝑧𝑒 𝐵 𝑡𝑜 𝑙𝑜𝑔𝑖𝑐𝑎𝑙𝑙𝑦 𝑑𝑖𝑣𝑖𝑑𝑒 𝑅𝑖
1). After an out shuffle, the order is (O , n, l, n + 𝑖𝑛𝑡𝑜 2𝑛 𝑏𝑙𝑜𝑐𝑘𝑠
l, . . . , n − 1,2n − 1). 𝑆𝑡𝑒𝑝 4: 𝐹𝑖′ ← 𝑃𝑒𝑟𝑓𝑜𝑟𝑚 𝐵𝑙𝑜𝑐𝑘 𝑆𝑢𝑓𝑓𝑙𝑖𝑛𝑔
The proposed algorithm use a combination 𝑏𝑎𝑠𝑒𝑑 𝑜𝑛 𝑏𝑙𝑜𝑐𝑘𝑠 𝑔𝑒𝑛𝑒𝑟𝑎𝑡𝑒𝑑 𝑖𝑛 𝑠𝑡𝑒𝑝3
of In and Out faro shuffles to generate a group, this 𝑢𝑠𝑖𝑛𝑔 𝐾𝑒𝑦 𝐾
group will be called the shuffle group and denoted (I,
0). Both of the methods preserve symmetry at the Decryption is analogies with encryptions provided
center (0 and 2n - 1, 1 and 2n - 2, etc.) are sent to the receiver of frames has the same degree of
symmetric positions about the center. Thus (I, 0) is a rotation, block size, order of faro shuffle.
subgroup of the centrally symmetric permutations.
This group is isomorphic to the Weyl group (The III. EXPERIMENTAL RESULTS
Weyl group is isomorphic to the group of In order to evaluate the performance of the
permutations [11]) Bn. Where 𝐵𝑛 is the hyper- proposed encryption scheme, The video data used for
octahedral group 𝐵𝑛 is the group of all permutations analysis have different motion characteristics and
w of kl, … , kn such that~ 4 = −w i for i = varying resolution with a frames rate of 25 fps. The
1. 2 … . , n. The order of Bn is n! 2n sample test video sequence include videos toy_plane,
Further, paper is organized as follows: Section bar_100, table_tennis, pond, etc. A good encryption
II, gives the proposed video encryption algorithm. procedure should be robust against all kind of
Experimental analysis of results showing the cryptanalytic, statistical, differential and brute-force
performance of proposed algorithms compared with attacks. Thus the histogram of the ciphered frame
other state of art method given in Section III. Lastly, must not be uniform with original frame to avoid
Section IV serves to present our conclusions and statistical attacks, and the key space must be large
ideas for future work related to this research. enough to avoid brute force attacks. Below show the
performance analysis of the proposed approach.
II. PROPOSED VIDEO ENCRYPTION
ALGORITHM 3.1 Histogram Analysis of Frames
The Proposed algorithm for video In proposed experiment the plain frame and its
encryption works on individual frames. Each frame corresponding ciphered frame histograms are shown
goes through Algorithm 1, Algorithm 2, all the in Fig. 1.
frames are combined to form an encrypted video.
4 0.061489
2 0.285943
1 1.114790
Sayyada Fahmeeda Sultana. " Video Encryption Algorithm and Key Management using Perfect
Shuffle." International Journal of Engineering Research and Applications (IJERA) 7.7
(2017): 01-05