An Enhanced Multimedia Video Surveillance Security Using Wavelet Encryption Framework

Authors

  • Velliangiri S Department of Computer Science and Engineering, CMR Institute of Technology, Hyderabad, Telangana-501401 India https://orcid.org/0000-0001-9273-8181

DOI:

https://doi.org/10.13052/jmm1550-4646.1534

Keywords:

Wavelet transforms, advanced encryption standard, secured transmission, multimedia video security

Abstract

Multimedia digital data include medical record and financial documents, which are not guaranteed with security. The concerns for security of multimedia digital data is been a widespread issue in the field of cybernetics. With increasing malwares in video payloads, the proposed study aims to reduce the embedding of malwares using Pseudo Arbitrary Permutation based Cellular Automata Encryption (PAP-CAE) System in video payloads. This method reduces the malware attacks and distortion rate by permuting the secret keys with Pseudo arbitrary permutation. Before the application of PAP-CAE, 2D wavelet transform is applied on the multimedia files that compresses the complex files into different scales and position to be transmitted via a network with reduced size. Simultaneously, it performs the process of decryption and decompression to retrieve the original files. The proposed method is evaluated against existing methods to test its efficacy in terms of detection accuracy, detection time of malwares and false positive rate. The result shows that the proposed method is effective against the detection of malwares in multimedia video files.

Downloads

Download data is not yet available.

Author Biography

Velliangiri S, Department of Computer Science and Engineering, CMR Institute of Technology, Hyderabad, Telangana-501401 India

S. Velliangiri obtained his Bachelor’s in Computer Science and Engineering from Anna University, Chennai. Master’s in Computer Science and Engineering from Karpagam University, Coimbatore and Doctor of Philosophy in Information and Communication Engineering from Anna University, Chennai. He is working as an Associate Professor in CMR Institute of Technology, Hyderabad, Telangana. He is a member of Institute of Electrical and Electronics Engineers (IEEE) and International Association of Engineers (IAENG). He is specialized in Network security and Optimization techniques. He has published twenty five International journals and presented ten International conferences. He has authored and co-author of several books. He served as Area Editor in EAI Endorsed journal of Energy Web (Scopus) and Journal of computer science Bentham (Scopus).He was the reviewer of IET Communication, Elseiver, Taylor and Francis, Springer, Inderscience and other reputed scopus indexed journals.

References

Langelaar, G., Setyawan, I., Lagendijk, R., 2000. Watermarking of digital image and video data – A state of art review. IEEE Signal Process. Mag., 20–46

Rahman, S. M. (2001). Design and management of multimedia information systems: opportunities and challenges. IGI Global.

Yahalom, R., Steren, A., Nameri, Y., Roytman, M., Porgador, A., &Elovici, Y. (2019). Improving the effectiveness of intrusion detection systems for hierarchical data. Knowledge-Based Systems, 168, 59-69.

Lian, S., Kanellopoulos, D., &Ruffo, G. (2009). Recent advances in multimedia information system security. Informatica, 33(1).

Aljawarneh, S., &Yassein, M. B. (2017). A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools and Applications, 76(21), 22703-22724.

Aljawarneh, S., &Yassein, M. B. (2018). A multithreaded programming approach for multimedia big data: encryption system. Multimedia Tools and Applications, 1-20.

Li, C., Lin, D., &Lü, J. (2017). Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE MultiMedia, 24(3), 64-71.

Li, C. (2016). Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Processing, 118, 203-210.

Ye, G., & Huang, X. (2018). Spatial image encryption algorithm based on chaotic map and pixel frequency. Science China Information Sciences, 61(5), 058104.

Peng, F., Gong, X. Q., Long, M., & Sun, X. M. (2017). A selective encryption scheme for protecting H. 264/AVC video in multimedia social network. Multimedia Tools and Applications, 76(3), 3235-3253.

Wang, X., Liu, C., Xu, D., & Liu, C. (2016). Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dynamics, 84(3), 1417-1429.

Wolfram, S. (2018). Cellular automata and complexity: collected papers. CRC Press.

Zhang, X., Seo, S. H., & Wang, C. (2018). A Lightweight Encryption Method for Privacy Protection in Surveillance Videos. IEEE Access, 6, 18074-18087.

Clarke, K. C. (2018). Cellular automata and agent-based models. Handbook of regional science, 1-16.

Jeong, J., Kwon, S., Hong, M. P., Kwak, J., & Shon, T. (2019). Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance. Multimedia Tools and Applications, 1-15.

Xiao, C., Wang, L., Zhu, M., & Wang, W. (2016). A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft. Journal of Network and Computer Applications, 59, 117-125.

Peng, F., Gong, X. Q., Long, M., & Sun, X. M. (2017). A selective encryption scheme for protecting H. 264/AVC video in multimedia social network. Multimedia Tools and Applications, 76(3), 3235-3253.

Thanki, R., Dwivedi, V., &Borisagar, K. (2017). A hybrid watermarking scheme with CS theory for security of multimedia data. Journal of King Saud University-Computer and Information Sciences.

Xiao, C., Wang, L., Jie, Z., & Chen, T. (2016, June). A multi-level intelligent selective encryption control model for multimedia big data security in sensing system with resource constraints. In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 148-153). IEEE.

Thiyagarajan, K., Lu, R., El-Sankary, K., & Zhu, H. (2019). Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things. IEEE Transactions on Circuits and Systems for Video Technology, 29(3), 610-624.

Alsmirat, M. A., Obaidat, I., Jararweh, Y., & Al-Saleh, M. (2017). A security framework for cloud-based video surveillance system. Multimedia Tools and Applications, 76(21), 22787-22802.

Joshi, A. M., Gupta, S., Girdhar, M., Agarwal, P., &Sarker, R. (2017). Combined DWT–DCT-based video watermarking algorithm using Arnold transform technique. In Proceedings of the international conference on data engineering and communication technology (pp. 455-463). Springer, Singapore.

Downloads

Published

2020-05-03

Issue

Section

Articles