Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection

This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the con...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IET image processing Ročník 12; číslo 1; s. 42 - 52
Hlavní autoři: Khlif, Naziha, Masmoudi, Atef, Kammoun, Fahmi, Masmoudi, Nouri
Médium: Journal Article
Jazyk:angličtina
Vydáno: The Institution of Engineering and Technology 01.01.2018
Témata:
ISSN:1751-9659, 1751-9667
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.
AbstractList This study presents a chaos‐based crypto‐compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter‐prediction, the intra‐prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo‐random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real‐time application and convenient for all the H.264/AVC profiles or even with other video compression standards.
Author Khlif, Naziha
Masmoudi, Atef
Kammoun, Fahmi
Masmoudi, Nouri
Author_xml – sequence: 1
  givenname: Naziha
  surname: Khlif
  fullname: Khlif, Naziha
  email: naziha.khlif@gmail.com
  organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia
– sequence: 2
  givenname: Atef
  surname: Masmoudi
  fullname: Masmoudi, Atef
  organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia
– sequence: 3
  givenname: Fahmi
  surname: Kammoun
  fullname: Kammoun, Fahmi
  organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia
– sequence: 4
  givenname: Nouri
  surname: Masmoudi
  fullname: Masmoudi, Nouri
  organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia
BookMark eNqFkF1LwzAUQIMouE1_gG959aFdki5t49scmxsM_Jq-hiRNXEbXlLRT9u9NmYiIH0_3PpxzuZw-OK5cpQG4wCjGaMSGVreRrX1MEM5ihAg5Aj2cURyxNM2OP3fKTkG_aTYIUYZy2gP3j1rtvIZqLVxrFSx2ooS6Un5ft9ZVsFFrvdXQOA_nMUlHw_HzBL7aQjuoXGW0D6ytXmDtXatVp5yBEyPKRp9_zAF4mk1Xk3m0vL1ZTMbLSBGW46iQWplUMkMFkcpgyYpESKpEIRNKc0pwQo3RKrBEUZnkjLAklZihIpUSF8kAZIe7yrum8dpwZVvRfdB6YUuOEe_K8FCGhzK8K8O7MsHE38za263w-z-dq4PzZku9_1_gi7sHcj1DOMU4yJcHucM2buerEIYvpquO-uLUhQls9AP7-2PvOUOaTw
CitedBy_id crossref_primary_10_1016_j_jisa_2019_01_001
crossref_primary_10_1109_ACCESS_2022_3223355
crossref_primary_10_1007_s11831_018_9298_8
crossref_primary_10_1016_j_dsp_2022_103746
crossref_primary_10_1007_s00530_020_00648_7
crossref_primary_10_1007_s11042_019_7253_9
crossref_primary_10_1016_j_image_2020_115994
crossref_primary_10_1520_JTE20160456
crossref_primary_10_1016_j_dsp_2022_103651
crossref_primary_10_3390_app132312706
crossref_primary_10_1007_s11276_021_02695_y
crossref_primary_10_3390_s19245366
crossref_primary_10_3390_sym12030332
crossref_primary_10_1049_iet_ipr_2019_0587
crossref_primary_10_1049_cmu2_12303
crossref_primary_10_1049_ipr2_12329
crossref_primary_10_1007_s11760_023_02767_w
Cites_doi 10.1109/TCSVT.2011.2129090
10.1007/s11554-010-0181-6
10.1109/TCSVT.2012.2204941
10.1109/ICIP.2007.4379960
10.1049/iet-ipr.2013.0598
10.1007/BF01608556
10.1109/81.974872
10.4304/jmm.5.5.464-472
10.1142/S021812740401151X
10.1109/TIP.2003.819861
10.1109/STA.2013.6783148
10.1038/261459a0
10.1109/TCSVT.2011.2162290
10.1142/S0218127405014052
10.1109/WIFS.2011.6123130
10.1109/MINES.2009.26
10.2991/icsem.2013.29
10.1002/0470869615
10.1007/978-3-540-30543-9_49
10.1023/B:MTAP.0000033983.62130.00
10.1016/j.physleta.2013.12.010
10.1007/s11235-010-9351-x
10.1109/TCSVT.2007.896635
10.1109/IPAS.2014.7043256
10.1109/TCSVT.2013.2248588
10.1109/TCE.2006.1649688
10.1520/JTE20140182
10.1109/ATSIP.2014.6834579
10.1007/s11042-007-0150-7
ContentType Journal Article
Copyright The Institution of Engineering and Technology
2021 The Authors. IET Image Processing published by John Wiley & Sons, Ltd. on behalf of The Institution of Engineering and Technology
Copyright_xml – notice: The Institution of Engineering and Technology
– notice: 2021 The Authors. IET Image Processing published by John Wiley & Sons, Ltd. on behalf of The Institution of Engineering and Technology
DBID AAYXX
CITATION
DOI 10.1049/iet-ipr.2017.0022
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef


DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
EISSN 1751-9667
EndPage 52
ExternalDocumentID 10_1049_iet_ipr_2017_0022
IPR2BF01611
Genre article
GroupedDBID 0R
24P
29I
4.4
5GY
6IK
8FE
8FG
8VB
AAJGR
ABJCF
ABPTK
ACGFS
ACIWK
AENEX
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BENPR
BFFAM
BGLVJ
CS3
DU5
EBS
EJD
ESX
HCIFZ
HZ
IFIPE
IPLJI
JAVBF
L6V
LAI
M43
M7S
MS
O9-
OCL
P2P
P62
PTHSS
QWB
RIE
RNS
RUI
S0W
UNR
ZL0
.DC
0R~
1OC
AAHHS
AAHJG
ABQXS
ACCFJ
ACCMX
ACESK
ACXQS
ADZOD
AEEZP
AEQDE
AIWBW
AJBDE
ALUQN
AVUZU
CCPQU
GROUPED_DOAJ
HZ~
IAO
ITC
K1G
MCNEO
MS~
OK1
ROL
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IDLOA
PHGZM
PHGZT
PQGLB
WIN
ID FETCH-LOGICAL-c2981-dbecf6b9f5a2bcf1b9d3ab5cadb355852135ffec9812c5b3892936b190d6bb1d3
IEDL.DBID 24P
ISICitedReferencesCount 18
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000419403600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1751-9659
IngestDate Tue Nov 18 22:00:25 EST 2025
Wed Oct 29 21:21:46 EDT 2025
Wed Jan 22 16:32:34 EST 2025
Tue Jan 05 21:45:57 EST 2021
Thu May 09 18:04:54 EDT 2019
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords data compression
secure chaotic dual encryption scheme
advanced video coding protection
cryptography
decision module
video coding
context adaptive variable length coding
adaptive codes
chaos-based crypto-compression scheme
pseudorandom bit generators
compression ratio
chaotic communication
selective encryption approach
piecewise linear chaotic maps
variable length codes
H.264/AVC video conferencing protection
inter-prediction encryption
data protection
intra-prediction encryption
format compliance
video compression standards
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2981-dbecf6b9f5a2bcf1b9d3ab5cadb355852135ffec9812c5b3892936b190d6bb1d3
PageCount 11
ParticipantIDs wiley_primary_10_1049_iet_ipr_2017_0022_IPR2BF01611
iet_journals_10_1049_iet_ipr_2017_0022
crossref_primary_10_1049_iet_ipr_2017_0022
crossref_citationtrail_10_1049_iet_ipr_2017_0022
ProviderPackageCode RUI
PublicationCentury 2000
PublicationDate 20180100
January 2018
2018-01-00
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 1
  year: 2018
  text: 20180100
PublicationDecade 2010
PublicationTitle IET image processing
PublicationYear 2018
Publisher The Institution of Engineering and Technology
Publisher_xml – name: The Institution of Engineering and Technology
References Jiang, J.; Liu, Y.; Su, Z. (C12) 2010; 5
Wang, Y.; O'Neill, M.; Kurugollu, F. (C30) 2013; 23
Damak, T.; Loukil, H.; Ben Atitallah, A. (C40) 2012; 59
Masuda, N.; Aihara, K. (C26) 2002; 49
Li, S.; Chen, G.; Mou, X. (C33) 2005; 15
Dalal, U.D.; Joshi, J.M. (C22) 2011; 5
Asghar, M.N.; Ghanbari, M. (C6) 2013; 23
Hénon, M. (C35) 1976; 50
Huynh-Thu, Q.; Ghanbari, M. (C42) 2012; 49
Shi, C.; Bhargava, B.; Wang, S. (C18) 2004; 24
Shah, J.; Saxena, V. (C7) 2011; 8
Khlif, N.; Damak, T.; Kammoun, F. (C37) 2016; 44
Mao, Y.; Lian, S.; Chen, G. (C36) 2004; 14
Shahid, Z.; Chaumont, M.; Puech, W. (C3) 2011; 21
Lian, S.; Liu, Z.; Ren, Z. (C17) 2006; 52
Wu, Y.; Noonan, P.J.; Agaian, S. (C46) 2011; 1
Stutz, T.; Uhl, A. (C8) 2012; 22
Wang, Z.; Bovik, A.C.; Sheikh, H.R. (C43) 2004; 13
Masmoudi, A.; Puech, W. (C31) 2014; 8
Lian, S.; Liu, Z.; Ren, Z. (C20) 2007; 17
Lian, S.; Sun, J.; Liu, G. (C27) 2008; 38
Werda, I.; Damak, T.; Grandpierre, T. (C39) 2010; 7
May, R.M. (C32) 1976; 261
Wu, G.C.; Baleanu, D.; Zeng, S.D. (C34) 2014; 378
2007; 17
December 2011
2006; 52
October 1998
December 2013
1976; 261
2011; 1
November 2014
May 2008
2013; 23
2008; 38
2004; 24
May 2013
2009
1996
1994
September 2011
2003
2012; 59
March 2014
2011; 5
2011; 8
2014; 378
1999
December 2004
2002; 49
February 2012
December 2005
2001
1976; 50
2004; 14
September 2007
2004; 13
November 2009
August 2013
August 2012
2011; 21
2012; 49
2005; 15
2014; 8
2010; 5
2012; 22
2010; 7
2016; 44
e_1_2_7_6_1
e_1_2_7_5_1
e_1_2_7_4_1
e_1_2_7_3_1
e_1_2_7_9_1
Lian S. (e_1_2_7_45_1) 2009
Schneier B. (e_1_2_7_46_1) 1996
e_1_2_7_7_1
e_1_2_7_19_1
e_1_2_7_18_1
e_1_2_7_17_1
e_1_2_7_16_1
e_1_2_7_40_1
e_1_2_7_2_1
e_1_2_7_15_1
e_1_2_7_14_1
e_1_2_7_42_1
e_1_2_7_13_1
e_1_2_7_43_1
e_1_2_7_12_1
e_1_2_7_44_1
e_1_2_7_11_1
e_1_2_7_10_1
Richardson I.E.G. (e_1_2_7_39_1) 2003
e_1_2_7_26_1
e_1_2_7_27_1
Damak T. (e_1_2_7_41_1) 2012; 59
e_1_2_7_28_1
e_1_2_7_29_1
Dalal U.D. (e_1_2_7_23_1) 2011; 5
Wu Y. (e_1_2_7_47_1) 2011; 1
e_1_2_7_30_1
e_1_2_7_25_1
e_1_2_7_31_1
e_1_2_7_24_1
e_1_2_7_32_1
e_1_2_7_33_1
e_1_2_7_22_1
e_1_2_7_34_1
e_1_2_7_21_1
e_1_2_7_35_1
e_1_2_7_20_1
e_1_2_7_36_1
e_1_2_7_37_1
e_1_2_7_38_1
Shah J. (e_1_2_7_8_1) 2011; 8
References_xml – volume: 44
  start-page: 160
  issue: 1
  year: 2016
  end-page: 174
  ident: C37
  article-title: Joint selective encryption of CAVLC and signs of motion vectors for H.264/AVC
  publication-title: J. Test. Eval.
– volume: 17
  start-page: 774
  issue: 6
  year: 2007
  end-page: 778
  ident: C20
  article-title: Commutative encryption and watermarking in video compression
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 23
  start-page: 425
  issue: 3
  year: 2013
  end-page: 437
  ident: C6
  article-title: An efficient security system for CABAC bin-strings of H.264/SVC
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 59
  start-page: 20
  issue: 19
  year: 2012
  end-page: 27
  ident: C40
  article-title: Software and hardware architecture of H.264/AVC decoder
  publication-title: Int. J. Comput. Appl.
– volume: 49
  start-page: 28
  issue: 1
  year: 2002
  end-page: 40
  ident: C26
  article-title: Cryptosystems with discretized chaotic maps
  publication-title: IEEE Trans. Circuits and Systems: Fundamental Theory and Applications
– volume: 52
  start-page: 621
  issue: 2
  year: 2006
  end-page: 629
  ident: C17
  article-title: Secure advanced video coding based on selective encryption algorithms
  publication-title: IEEE Trans. Consum. Electron.
– volume: 50
  start-page: 69
  issue: 1
  year: 1976
  end-page: 77
  ident: C35
  article-title: A two-dimensional mapping with a strange attractor
  publication-title: Commun. Math. Phys.
– volume: 5
  start-page: 464
  issue: 5
  year: 2010
  end-page: 472
  ident: C12
  article-title: An improved selective encryption for H.264 video based on intra prediction mode scrambling
  publication-title: J. Multimed.
– volume: 24
  start-page: 57
  issue: 1
  year: 2004
  end-page: 79
  ident: C18
  article-title: MPEG video encryption algorithms
  publication-title: Multimedia Tools Appl.
– volume: 21
  start-page: 565
  issue: 5
  year: 2011
  end-page: 576
  ident: C3
  article-title: Fast protection of h.264/avc by selective encryption of CAVLC and CABAC for I and P frames
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 15
  start-page: 3119
  issue: 10
  year: 2005
  end-page: 3151
  ident: C33
  article-title: On the dynamical degradation of digital piecewise linear chaotic maps
  publication-title: Int. J. Bifurcation Chaos
– volume: 261
  start-page: 459
  issue: 5560
  year: 1976
  end-page: 467
  ident: C32
  article-title: Simple mathematical models with very complicated dynamics
  publication-title: Nature
– volume: 49
  start-page: 35
  issue: 1
  year: 2012
  end-page: 48
  ident: C42
  article-title: The accuracy of PSNR in predicting video quality for different video scenes and frame rates
  publication-title: Telecommun. Syst.
– volume: 22
  start-page: 325
  issue: 3
  year: 2012
  end-page: 339
  ident: C8
  article-title: A survey of H.264AVC/SVC encryption
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 38
  start-page: 75
  issue: 1
  year: 2008
  end-page: 89
  ident: C27
  article-title: Efficient video encryption scheme based on advanced video coding
  publication-title: Multimedia Tools Appl.
– volume: 23
  start-page: 1476
  issue: 9
  year: 2013
  end-page: 1490
  ident: C30
  article-title: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 8
  start-page: 525
  issue: 2
  year: 2011
  end-page: 534
  ident: C7
  article-title: Video encryption: a survey
  publication-title: IJCSI Int. J. Comput. Sci. Issues
– volume: 5
  start-page: 256
  issue: 7
  year: 2011
  end-page: 260
  ident: C22
  article-title: Selective encryption using ISMACryp in real time video streaming of H.264/AVC for DVB-H application
  publication-title: World Acad. Sci. Eng.Technol.
– volume: 13
  start-page: 600
  issue: 4
  year: 2004
  end-page: 612
  ident: C43
  article-title: Image quality assessment: from error visibility to structural similarity
  publication-title: IEEE Trans. Image Process.
– volume: 14
  start-page: 3616
  issue: 10
  year: 2004
  end-page: 3624
  ident: C36
  article-title: A novel fast image encryption scheme based on 3D chaotic Baker maps
  publication-title: Int. J. Bifurcation Chaos
– volume: 7
  start-page: 215
  issue: 4
  year: 2010
  end-page: 232
  ident: C39
  article-title: Real time H.264/AVC baseline decoder implementation on TMS320C6416
  publication-title: J. Real-Time Image Process.
– volume: 8
  start-page: 671
  issue: 12
  year: 2014
  end-page: 686
  ident: C31
  article-title: Lossless chaos-based crypto-compression scheme for image protection
  publication-title: IET Image Process.
– volume: 378
  start-page: 484
  issue: 5
  year: 2014
  end-page: 487
  ident: C34
  article-title: Discrete chaos in fractional sine and standard maps
  publication-title: Phys. Lett. A
– volume: 1
  start-page: 31
  issue: 4
  year: 2011
  end-page: 38
  ident: C46
  article-title: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology
  publication-title: J. Sel. Areas Telecommun. JSAT
– volume: 59
  start-page: 20
  issue: 19
  year: 2012
  end-page: 27
  article-title: Software and hardware architecture of H.264/AVC decoder
  publication-title: Int. J. Comput. Appl.
– year: 2009
– volume: 49
  start-page: 35
  issue: 1
  year: 2012
  end-page: 48
  article-title: The accuracy of PSNR in predicting video quality for different video scenes and frame rates
  publication-title: Telecommun. Syst.
– volume: 44
  start-page: 160
  issue: 1
  year: 2016
  end-page: 174
  article-title: Joint selective encryption of CAVLC and signs of motion vectors for H.264/AVC
  publication-title: J. Test. Eval.
– start-page: 1752
  year: August 2012
  end-page: 1756
– volume: 1
  start-page: 31
  issue: 4
  year: 2011
  end-page: 38
  article-title: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology
  publication-title: J. Sel. Areas Telecommun. JSAT
– start-page: 1
  year: December 2011
  end-page: 6
– volume: 5
  start-page: 464
  issue: 5
  year: 2010
  end-page: 472
  article-title: An improved selective encryption for H.264 video based on intra prediction mode scrambling
  publication-title: J. Multimed.
– volume: 49
  start-page: 28
  issue: 1
  year: 2002
  end-page: 40
  article-title: Cryptosystems with discretized chaotic maps
  publication-title: IEEE Trans. Circuits and Systems: Fundamental Theory and Applications
– year: 2001
– volume: 23
  start-page: 425
  issue: 3
  year: 2013
  end-page: 437
  article-title: An efficient security system for CABAC bin‐strings of H.264/SVC
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– year: 2003
– volume: 24
  start-page: 57
  issue: 1
  year: 2004
  end-page: 79
  article-title: MPEG video encryption algorithms
  publication-title: Multimedia Tools Appl.
– volume: 15
  start-page: 3119
  issue: 10
  year: 2005
  end-page: 3151
  article-title: On the dynamical degradation of digital piecewise linear chaotic maps
  publication-title: Int. J. Bifurcation Chaos
– year: 1996
– volume: 13
  start-page: 600
  issue: 4
  year: 2004
  end-page: 612
  article-title: Image quality assessment: from error visibility to structural similarity
  publication-title: IEEE Trans. Image Process.
– volume: 7
  start-page: 215
  issue: 4
  year: 2010
  end-page: 232
  article-title: Real time H.264/AVC baseline decoder implementation on TMS320C6416
  publication-title: J. Real‐Time Image Process.
– start-page: 229
  year: May 2013
  end-page: 232
– volume: 23
  start-page: 1476
  issue: 9
  year: 2013
  end-page: 1490
  article-title: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 8
  start-page: 671
  issue: 12
  year: 2014
  end-page: 686
  article-title: Lossless chaos‐based crypto‐compression scheme for image protection
  publication-title: IET Image Process.
– start-page: 187
  year: May 2008
  end-page: 190
– volume: 14
  start-page: 3616
  issue: 10
  year: 2004
  end-page: 3624
  article-title: A novel fast image encryption scheme based on 3D chaotic Baker maps
  publication-title: Int. J. Bifurcation Chaos
– year: 1994
– volume: 378
  start-page: 484
  issue: 5
  year: 2014
  end-page: 487
  article-title: Discrete chaos in fractional sine and standard maps
  publication-title: Phys. Lett. A
– volume: 5
  start-page: 256
  issue: 7
  year: 2011
  end-page: 260
  article-title: Selective encryption using ISMACryp in real time video streaming of H.264/AVC for DVB‐H application
  publication-title: World Acad. Sci. Eng.Technol.
– volume: 8
  start-page: 525
  issue: 2
  year: 2011
  end-page: 534
  article-title: Video encryption: a survey
  publication-title: IJCSI Int. J. Comput. Sci. Issues
– start-page: 314
  year: December 2013
  end-page: 317
– volume: 17
  start-page: 774
  issue: 6
  year: 2007
  end-page: 778
  article-title: Commutative encryption and watermarking in video compression
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– start-page: 386
  year: December 2004
  end-page: 393
– start-page: 1121
  year: December 2005
  end-page: 1124
– volume: 21
  start-page: 565
  issue: 5
  year: 2011
  end-page: 576
  article-title: Fast protection of h.264/avc by selective encryption of CAVLC and CABAC for I and P frames
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– start-page: 381
  year: October 1998
  end-page: 386
– start-page: 425
  year: February 2012
  end-page: 429
– start-page: 478
  year: November 2009
  end-page: 482
– start-page: 2185
  year: September 2011
  end-page: 2189
– volume: 261
  start-page: 459
  issue: 5560
  year: 1976
  end-page: 467
  article-title: Simple mathematical models with very complicated dynamics
  publication-title: Nature
– start-page: 1
  year: November 2014
  end-page: 7
– start-page: 1
  year: March 2014
  end-page: 6
– volume: 38
  start-page: 75
  issue: 1
  year: 2008
  end-page: 89
  article-title: Efficient video encryption scheme based on advanced video coding
  publication-title: Multimedia Tools Appl.
– start-page: 148
  year: August 2013
  end-page: 152
– volume: 22
  start-page: 325
  issue: 3
  year: 2012
  end-page: 339
  article-title: A survey of H.264AVC/SVC encryption
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– start-page: IV‐85
  year: September 2007
  end-page: IV‐88
– volume: 50
  start-page: 69
  issue: 1
  year: 1976
  end-page: 77
  article-title: A two‐dimensional mapping with a strange attractor
  publication-title: Commun. Math. Phys.
– year: 1999
– volume: 52
  start-page: 621
  issue: 2
  year: 2006
  end-page: 629
  article-title: Secure advanced video coding based on selective encryption algorithms
  publication-title: IEEE Trans. Consum. Electron.
– ident: e_1_2_7_4_1
  doi: 10.1109/TCSVT.2011.2129090
– ident: e_1_2_7_40_1
  doi: 10.1007/s11554-010-0181-6
– volume-title: Applied cryptography: protocols, algorithms, and source code in C
  year: 1996
  ident: e_1_2_7_46_1
– ident: e_1_2_7_7_1
  doi: 10.1109/TCSVT.2012.2204941
– ident: e_1_2_7_15_1
  doi: 10.1109/ICIP.2007.4379960
– ident: e_1_2_7_29_1
– ident: e_1_2_7_32_1
  doi: 10.1049/iet-ipr.2013.0598
– ident: e_1_2_7_36_1
  doi: 10.1007/BF01608556
– ident: e_1_2_7_27_1
  doi: 10.1109/81.974872
– ident: e_1_2_7_13_1
  doi: 10.4304/jmm.5.5.464-472
– ident: e_1_2_7_37_1
  doi: 10.1142/S021812740401151X
– ident: e_1_2_7_44_1
  doi: 10.1109/TIP.2003.819861
– ident: e_1_2_7_3_1
– ident: e_1_2_7_25_1
  doi: 10.1109/STA.2013.6783148
– ident: e_1_2_7_33_1
  doi: 10.1038/261459a0
– ident: e_1_2_7_9_1
  doi: 10.1109/TCSVT.2011.2162290
– ident: e_1_2_7_22_1
– ident: e_1_2_7_34_1
  doi: 10.1142/S0218127405014052
– ident: e_1_2_7_17_1
– volume: 1
  start-page: 31
  issue: 4
  year: 2011
  ident: e_1_2_7_47_1
  article-title: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology
  publication-title: J. Sel. Areas Telecommun. JSAT
– ident: e_1_2_7_6_1
  doi: 10.1109/WIFS.2011.6123130
– volume: 59
  start-page: 20
  issue: 19
  year: 2012
  ident: e_1_2_7_41_1
  article-title: Software and hardware architecture of H.264/AVC decoder
  publication-title: Int. J. Comput. Appl.
– ident: e_1_2_7_5_1
– ident: e_1_2_7_10_1
– ident: e_1_2_7_12_1
  doi: 10.1109/MINES.2009.26
– ident: e_1_2_7_16_1
– ident: e_1_2_7_2_1
– ident: e_1_2_7_30_1
  doi: 10.2991/icsem.2013.29
– volume-title: H.264/AVC and MPEG4 video compression, video coding for next generation multimedia
  year: 2003
  ident: e_1_2_7_39_1
  doi: 10.1002/0470869615
– ident: e_1_2_7_11_1
  doi: 10.1007/978-3-540-30543-9_49
– ident: e_1_2_7_24_1
– volume: 8
  start-page: 525
  issue: 2
  year: 2011
  ident: e_1_2_7_8_1
  article-title: Video encryption: a survey
  publication-title: IJCSI Int. J. Comput. Sci. Issues
– ident: e_1_2_7_19_1
  doi: 10.1023/B:MTAP.0000033983.62130.00
– ident: e_1_2_7_35_1
  doi: 10.1016/j.physleta.2013.12.010
– ident: e_1_2_7_43_1
  doi: 10.1007/s11235-010-9351-x
– ident: e_1_2_7_21_1
  doi: 10.1109/TCSVT.2007.896635
– ident: e_1_2_7_14_1
  doi: 10.1109/IPAS.2014.7043256
– ident: e_1_2_7_31_1
  doi: 10.1109/TCSVT.2013.2248588
– volume: 5
  start-page: 256
  issue: 7
  year: 2011
  ident: e_1_2_7_23_1
  article-title: Selective encryption using ISMACryp in real time video streaming of H.264/AVC for DVB‐H application
  publication-title: World Acad. Sci. Eng.Technol.
– ident: e_1_2_7_18_1
  doi: 10.1109/TCE.2006.1649688
– ident: e_1_2_7_38_1
  doi: 10.1520/JTE20140182
– ident: e_1_2_7_42_1
– ident: e_1_2_7_26_1
– ident: e_1_2_7_20_1
  doi: 10.1109/ATSIP.2014.6834579
– ident: e_1_2_7_28_1
  doi: 10.1007/s11042-007-0150-7
– volume-title: Multimedia content encryption: techniques and applications
  year: 2009
  ident: e_1_2_7_45_1
SSID ssj0059085
Score 2.195556
Snippet This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To...
This study presents a chaos‐based crypto‐compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To...
SourceID crossref
wiley
iet
SourceType Enrichment Source
Index Database
Publisher
StartPage 42
SubjectTerms adaptive codes
advanced video coding protection
chaos‐based crypto‐compression scheme
chaotic communication
compression ratio
context adaptive variable length coding
cryptography
data compression
data protection
decision module
format compliance
H.264/AVC video conferencing protection
inter‐prediction encryption
intra‐prediction encryption
piecewise linear chaotic maps
pseudorandom bit generators
Research Article
secure chaotic dual encryption scheme
selective encryption approach
variable length codes
video coding
video compression standards
Title Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection
URI http://digital-library.theiet.org/content/journals/10.1049/iet-ipr.2017.0022
https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-ipr.2017.0022
Volume 12
WOSCitedRecordID wos000419403600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 1751-9667
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0059085
  issn: 1751-9659
  databaseCode: WIN
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-9667
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0059085
  issn: 1751-9659
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF60evBifWJ9sYh4EKLJbjbJHmuxWJBSxUdvIfsIFrQtbRX8985s0koRKoiXHHZnkjCzM_tlNjNDyGmoMyOYjD0lYu6FCgNNue97WRRzw7k1Uea6ltzG7XbS7crOEmlMc2GK-hCzgBtahvPXaOCZKrqQAKgFJfbsxOsNsaRngFUIGfjhlSDgMS5tFnam7hh7eguXFYn95CMhZ0eb8vLHLeY2p2WYnoesbs9pVv_lbTfIegk5ab1YI5tkyfa3SLWEn7Q07vE2uXOxd0v1SzYAUopZWhTmRp_OrVD4DrZvlgLKpTcXgHAu608Niml8A6qneYOwEdKy9AOw7JDH5vVD48YrOy54mskk8AxoNI-UzEXGlM4DJQ3PlAB9KizDDls9F_ibCdAyLRSAHUALkQJQYSKlAsN3SaU_6Ns9Qq3xtc9twhMlw4wLyXLBAM5EGluxR7xG_KmoU12WI8euGK-pOxYPZQoiS0FkKYosRZHVyPmMZVjU4lhEfIZjpUWOFxGezBG2rh_SVuf-myAdmrxGuNPu789FXnbVRCQd7P-J64CswXhSxHkOSWUyerdHZFV_THrj0bFb3HB9brW_AOEl-4k
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9swED_abNC-LPtoWfYpxuhDwY0tWY71mGUNCctCNtLRN2F9mAbWJCTZYP_97mQnIxQ6GHu17mxz0ul-Pvl-B_A-tYWTXHUiIzsiSg0lmso4joqsI5wQ3mVF6Foy6ozH-fW1mhzAx20tTMUPsUu4kWeE_ZocnBLS1QdnSiSZM7-JZkvi9EyIhpDjRvwgxWhDfQx4Otnux9TUW4aySGoon0m1O9tU7Tu32ItOhzi8j1lD0Ok3_8_rPoZHNehk3WqVPIEDP38KzRqAstq918_gS8i-e2ZvigWKMqrTYji2-hU2FoZfwv7WM8S5bHCBGKfd_dZjVMi3YHZbOYihkNXkD6hyAlf9y2lvENU9FyLLVZ5EDue0zIwqZcGNLROjnCiMxBk1RMSOwV5I-tEEZbmVBuEO4oXMIKxwmTGJE6fQmC_m_jkw72IbC5-L3Ki0EFLxUnIENJmlZuyZaEG8tbW2NSE59cX4rsPBeKo0mkyjyTSZTJPJWnC-U1lWbBz3CZ_Rtdon1_cJvtsTHF5O9XDy9Y-AXrqyBSJM79-fS7r8Q5-wdPLin7TewtFg-nmkR8Pxp5dwjDJ5lfV5BY3N6od_DQ_tz81svXoTVvpv4pz-XA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3fa9swED6ytIy-LF270WxrK8rYQ8GrbVmO9ZilDQkLIR3d6JuwfpgF2iQkaWH__e5kJyMMUih9tU62OenuPp983wF8TkxuRSxbgRYtHiSaEk1FGAZ52uKWc2fT3HctGbSGw-z2Vo5qcLmqhSn5IdYJN7IM76_JwN3MFuUHZ0IkmWO3DMYz4vSMiIYwRke8kwj0tcTvnIxW_piaegtfFkkN5VMh12eb8uK_W2xEp1c4vIlZfdDpNl7mdffhTQU6WbvcJW-h5iYH0KgAKKvMe3EI1z777pj5nU9RlFGdFsOx-R_vWBh-Cbt7xxDnst5XxDgX7V8dRoV8U2ZWlYMYCllF_oBT3sHP7tVNpxdUPRcCE8ssCiyuaZFqWYg81qaItLQ81wJXVBMROwZ7LuhHE5SNjdAIdxAvpBphhU21jix_D_XJdOKOgDkbmpC7jGdaJjkXMi5EjIAmNdSMPeVNCFe6VqYiJKe-GHfKH4wnUqHKFKpMkcoUqawJ5-sps5KNY5vwF7pW2eRim-DZhmD_6kb1Rz_-CShcySZwv7xPP5fmxt-6hKWjD8-adQqvR5ddNegPv3-EPRTJyqTPJ6gv5w_uGHbN43K8mJ_4jf4XiLT94A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+chaotic+dual+encryption+scheme+for+H.264%2FAVC+video+conferencing+protection&rft.jtitle=IET+image+processing&rft.au=Khlif%2C+Naziha&rft.au=Masmoudi%2C+Atef&rft.au=Kammoun%2C+Fahmi&rft.au=Masmoudi%2C+Nouri&rft.date=2018-01-01&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-9659&rft.eissn=1751-9667&rft.volume=12&rft.issue=1&rft.spage=42&rft.epage=52&rft_id=info:doi/10.1049%2Fiet-ipr.2017.0022&rft.externalDBID=10.1049%252Fiet-ipr.2017.0022&rft.externalDocID=IPR2BF01611
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-9659&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-9659&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-9659&client=summon