Secure Implementation for Video Streams Based on Fully and Permutation Encryption Techniques

Ahmed M. Elshamy, M. A. Abdelghany, Ahmad Q. Alhamad, Hesham F.A. Hamed, Hamdy M. Kelash, Aziza I. Hussein

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

Securing multimedia data has become very important especially in the applications related to government and military fields. With the rapid development in computer and communication clude some critical information which should not be visible to unauthorized attackers. Accordingly, security and privacy have become a top priority. Over the last few years a variety of video encryption algorithms have applied to secure video transmission. We will focus in this paper on introducing a new technique applied in video encryption and comparing between Henon chaotic map system, phase modulation system and the proposed technique, as network technology, increasing amounts of multimedia data are generated and transmitted in commercial and military fields through various communication media, which may in well to ensure the proposed video encryption technique can be used to achieve an efficiency, security and immunity to noise for video encryption system.

Original languageEnglish
Title of host publication2017 International Conference on Computer and Applications, ICCA 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages50-55
Number of pages6
ISBN (Electronic)9781538627525
DOIs
StatePublished - 20 Oct 2017
Externally publishedYes
Event2017 International Conference on Computer and Applications, ICCA 2017 - Doha, United Arab Emirates
Duration: 6 Sep 20177 Sep 2017

Publication series

Name2017 International Conference on Computer and Applications, ICCA 2017

Conference

Conference2017 International Conference on Computer and Applications, ICCA 2017
Country/TerritoryUnited Arab Emirates
CityDoha
Period6/09/177/09/17

Keywords

  • Henon chaotic map
  • phase modulation system
  • video encryption

Fingerprint

Dive into the research topics of 'Secure Implementation for Video Streams Based on Fully and Permutation Encryption Techniques'. Together they form a unique fingerprint.

Cite this