المصدر: | مجلة بحوث جامعة تعز - سلسلة الآداب والعلوم الإنسانية والتطبيقية |
---|---|
الناشر: | جامعة تعز |
المؤلف الرئيسي: | Jaafar, Bdullah (Author) |
مؤلفين آخرين: | Mohammed, Ahmed Abdulqader (Co-Author) |
المجلد/العدد: | ع39 |
محكمة: | نعم |
الدولة: |
اليمن |
التاريخ الميلادي: |
2024
|
الشهر: | مارس |
الصفحات: | 230 - 257 |
رقم MD: | 1495321 |
نوع المحتوى: | بحوث ومقالات |
اللغة: | الإنجليزية |
قواعد المعلومات: | EduSearch, AraBase, HumanIndex |
مواضيع: | |
كلمات المؤلف المفتاحية: |
Video Encryption | Chaos Encryption | Chaotic Maps | Symmetrical Encryption | Information Security
|
رابط المحتوى: |
الناشر لهذه المادة لم يسمح بإتاحتها. |
LEADER | 02646nam a22002537a 4500 | ||
---|---|---|---|
001 | 2239190 | ||
041 | |a eng | ||
044 | |b اليمن | ||
100 | |9 793493 |a Jaafar, Bdullah |e Author | ||
245 | |a A Colour Video Encryption Scheme based on Chaotic Maps | ||
260 | |b جامعة تعز |c 2024 |g مارس | ||
300 | |a 230 - 257 | ||
336 | |a بحوث ومقالات |b Article | ||
520 | |b The development of wireless and mobile communications has led to the expansion of digital multimedia (video and image) exchange over computer networks. So, there is a need to protect video content in many digital applications such as confidential video conferencing, medical imaging systems and payTV, etc. Video encryption is widely used as a way to provide security for digital video. In this paper, we introduce a secure scheme for colour video encryption using chaotic maps. Video encryption divides the file into a group of images called frames, and then the video encryption process goes through five stages: shuffle the video frames, permutation, confusion, diffusion on frame level and diffusion on video space components level. The proposed scheme uses four chaotic maps to shuffle, permutation, confuse, and diffuse the video frames. It also uses two other chaotic maps to initialize and control the above chaotic maps. The key space of our scheme is 2128 which makes the brute force attack impracticable. To analyze security and robustness of the proposed scheme, several security tests are used such as peak signal-to-noise ratio (PSNR), signal to noise ratio (SNR), histogram analysis, correlation coefficient analysis, information entropy, differential attacks, keyspace, and key sensitivity. The results of the different types of analyses indicate that the proposed video encryption scheme has high sensitivity and security. | ||
653 | |a الاتصالات اللاسلكية |a الوسائط المتعددة الرقمية |a أنظمة التصوير |a الخرائط الفوضوية | ||
692 | |b Video Encryption |b Chaos Encryption |b Chaotic Maps |b Symmetrical Encryption |b Information Security | ||
700 | |9 793498 |a Mohammed, Ahmed Abdulqader |e Co-Author | ||
773 | |4 الادب |4 العلوم الاجتماعية ، متعددة التخصصات |6 Literature |6 Social Sciences, Interdisciplinary |c 007 |e University of Taiz Research Journal - Arts and Humanities |l 039 |m ع39 |o 0931 |s مجلة بحوث جامعة تعز - سلسلة الآداب والعلوم الإنسانية والتطبيقية |v 000 | ||
856 | |u 0931-000-039-007.pdf | ||
930 | |d n |p y |q n | ||
995 | |a EduSearch | ||
995 | |a AraBase | ||
995 | |a HumanIndex | ||
999 | |c 1495321 |d 1495321 |