Visible to the public "Algorithm for secure visual communication"Conflict Detection Enabled

Title"Algorithm for secure visual communication"
Publication TypeConference Paper
Year of Publication2015
AuthorsM. K. Mishra, S. S. Sengar, S. Mukhopadhyay
Conference Name2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN)
Date PublishedFeb
ISBN Number978-1-4799-5991-4
Accession Number15077236
KeywordsCiphers, cryptography, data privacy, economic utilization, Encryption, entropy coding, GDH.3, H.264/AVC, lightweight selective encryption algorithm, malicious intervention, Multimedia communication, multimedia encryption scheme, network bandwidth availability, privacy, pubcrawl170102, public channel, RC4, secure visual communication, Signal processing algorithms, Streaming media, symmetric hierarchical encryption, telecommunication network reliability, telecommunication security, teleconferencing, video coding, Video communication, video conference, video data handling, video data storage space, video data transmission, video encryption, XOR operation

The enormous size of video data of natural scene and objects is a practical threat to storage, transmission. The efficient handling of video data essentially requires compression for economic utilization of storage space, access time and the available network bandwidth of the public channel. In addition, the protection of important video is of utmost importance so as to save it from malicious intervention, attack or alteration by unauthorized users. Therefore, security and privacy has become an important issue. Since from past few years, number of researchers concentrate on how to develop efficient video encryption for secure video transmission, a large number of multimedia encryption schemes have been proposed in the literature like selective encryption, complete encryption and entropy coding based encryption. Among above three kinds of algorithms, they all remain some kind of shortcomings. In this paper, we have proposed a lightweight selective encryption algorithm for video conference which is based on efficient XOR operation and symmetric hierarchical encryption, successfully overcoming the weakness of complete encryption while offering a better security. The proposed algorithm guarantees security, fastness and error tolerance without increasing the video size.

Citation Key7095310