Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the con...
Uloženo v:
| Vydáno v: | IET image processing Ročník 12; číslo 1; s. 42 - 52 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
The Institution of Engineering and Technology
01.01.2018
|
| Témata: | |
| ISSN: | 1751-9659, 1751-9667 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards. |
|---|---|
| AbstractList | This study presents a chaos‐based crypto‐compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter‐prediction, the intra‐prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo‐random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real‐time application and convenient for all the H.264/AVC profiles or even with other video compression standards. |
| Author | Khlif, Naziha Masmoudi, Atef Kammoun, Fahmi Masmoudi, Nouri |
| Author_xml | – sequence: 1 givenname: Naziha surname: Khlif fullname: Khlif, Naziha email: naziha.khlif@gmail.com organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia – sequence: 2 givenname: Atef surname: Masmoudi fullname: Masmoudi, Atef organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia – sequence: 3 givenname: Fahmi surname: Kammoun fullname: Kammoun, Fahmi organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia – sequence: 4 givenname: Nouri surname: Masmoudi fullname: Masmoudi, Nouri organization: Electrical Department, Laboratory of Electronics and Information Technologies National Engineering School of Sfax, Sfax University, Road Soukra Km 3.5, BP 3038, Sfax, Tunisia |
| BookMark | eNqFkF1LwzAUQIMouE1_gG959aFdki5t49scmxsM_Jq-hiRNXEbXlLRT9u9NmYiIH0_3PpxzuZw-OK5cpQG4wCjGaMSGVreRrX1MEM5ihAg5Aj2cURyxNM2OP3fKTkG_aTYIUYZy2gP3j1rtvIZqLVxrFSx2ooS6Un5ft9ZVsFFrvdXQOA_nMUlHw_HzBL7aQjuoXGW0D6ytXmDtXatVp5yBEyPKRp9_zAF4mk1Xk3m0vL1ZTMbLSBGW46iQWplUMkMFkcpgyYpESKpEIRNKc0pwQo3RKrBEUZnkjLAklZihIpUSF8kAZIe7yrum8dpwZVvRfdB6YUuOEe_K8FCGhzK8K8O7MsHE38za263w-z-dq4PzZku9_1_gi7sHcj1DOMU4yJcHucM2buerEIYvpquO-uLUhQls9AP7-2PvOUOaTw |
| CitedBy_id | crossref_primary_10_1016_j_jisa_2019_01_001 crossref_primary_10_1109_ACCESS_2022_3223355 crossref_primary_10_1007_s11831_018_9298_8 crossref_primary_10_1016_j_dsp_2022_103746 crossref_primary_10_1007_s00530_020_00648_7 crossref_primary_10_1007_s11042_019_7253_9 crossref_primary_10_1016_j_image_2020_115994 crossref_primary_10_1520_JTE20160456 crossref_primary_10_1016_j_dsp_2022_103651 crossref_primary_10_3390_app132312706 crossref_primary_10_1007_s11276_021_02695_y crossref_primary_10_3390_s19245366 crossref_primary_10_3390_sym12030332 crossref_primary_10_1049_iet_ipr_2019_0587 crossref_primary_10_1049_cmu2_12303 crossref_primary_10_1049_ipr2_12329 crossref_primary_10_1007_s11760_023_02767_w |
| Cites_doi | 10.1109/TCSVT.2011.2129090 10.1007/s11554-010-0181-6 10.1109/TCSVT.2012.2204941 10.1109/ICIP.2007.4379960 10.1049/iet-ipr.2013.0598 10.1007/BF01608556 10.1109/81.974872 10.4304/jmm.5.5.464-472 10.1142/S021812740401151X 10.1109/TIP.2003.819861 10.1109/STA.2013.6783148 10.1038/261459a0 10.1109/TCSVT.2011.2162290 10.1142/S0218127405014052 10.1109/WIFS.2011.6123130 10.1109/MINES.2009.26 10.2991/icsem.2013.29 10.1002/0470869615 10.1007/978-3-540-30543-9_49 10.1023/B:MTAP.0000033983.62130.00 10.1016/j.physleta.2013.12.010 10.1007/s11235-010-9351-x 10.1109/TCSVT.2007.896635 10.1109/IPAS.2014.7043256 10.1109/TCSVT.2013.2248588 10.1109/TCE.2006.1649688 10.1520/JTE20140182 10.1109/ATSIP.2014.6834579 10.1007/s11042-007-0150-7 |
| ContentType | Journal Article |
| Copyright | The Institution of Engineering and Technology 2021 The Authors. IET Image Processing published by John Wiley & Sons, Ltd. on behalf of The Institution of Engineering and Technology |
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2021 The Authors. IET Image Processing published by John Wiley & Sons, Ltd. on behalf of The Institution of Engineering and Technology |
| DBID | AAYXX CITATION |
| DOI | 10.1049/iet-ipr.2017.0022 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences |
| EISSN | 1751-9667 |
| EndPage | 52 |
| ExternalDocumentID | 10_1049_iet_ipr_2017_0022 IPR2BF01611 |
| Genre | article |
| GroupedDBID | 0R 24P 29I 4.4 5GY 6IK 8FE 8FG 8VB AAJGR ABJCF ABPTK ACGFS ACIWK AENEX AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS BENPR BFFAM BGLVJ CS3 DU5 EBS EJD ESX HCIFZ HZ IFIPE IPLJI JAVBF L6V LAI M43 M7S MS O9- OCL P2P P62 PTHSS QWB RIE RNS RUI S0W UNR ZL0 .DC 0R~ 1OC AAHHS AAHJG ABQXS ACCFJ ACCMX ACESK ACXQS ADZOD AEEZP AEQDE AIWBW AJBDE ALUQN AVUZU CCPQU GROUPED_DOAJ HZ~ IAO ITC K1G MCNEO MS~ OK1 ROL AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN |
| ID | FETCH-LOGICAL-c2981-dbecf6b9f5a2bcf1b9d3ab5cadb355852135ffec9812c5b3892936b190d6bb1d3 |
| IEDL.DBID | 24P |
| ISICitedReferencesCount | 18 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000419403600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-9659 |
| IngestDate | Tue Nov 18 22:00:25 EST 2025 Wed Oct 29 21:21:46 EDT 2025 Wed Jan 22 16:32:34 EST 2025 Tue Jan 05 21:45:57 EST 2021 Thu May 09 18:04:54 EDT 2019 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | data compression secure chaotic dual encryption scheme advanced video coding protection cryptography decision module video coding context adaptive variable length coding adaptive codes chaos-based crypto-compression scheme pseudorandom bit generators compression ratio chaotic communication selective encryption approach piecewise linear chaotic maps variable length codes H.264/AVC video conferencing protection inter-prediction encryption data protection intra-prediction encryption format compliance video compression standards |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2981-dbecf6b9f5a2bcf1b9d3ab5cadb355852135ffec9812c5b3892936b190d6bb1d3 |
| PageCount | 11 |
| ParticipantIDs | wiley_primary_10_1049_iet_ipr_2017_0022_IPR2BF01611 iet_journals_10_1049_iet_ipr_2017_0022 crossref_primary_10_1049_iet_ipr_2017_0022 crossref_citationtrail_10_1049_iet_ipr_2017_0022 |
| ProviderPackageCode | RUI |
| PublicationCentury | 2000 |
| PublicationDate | 20180100 January 2018 2018-01-00 |
| PublicationDateYYYYMMDD | 2018-01-01 |
| PublicationDate_xml | – month: 1 year: 2018 text: 20180100 |
| PublicationDecade | 2010 |
| PublicationTitle | IET image processing |
| PublicationYear | 2018 |
| Publisher | The Institution of Engineering and Technology |
| Publisher_xml | – name: The Institution of Engineering and Technology |
| References | Jiang, J.; Liu, Y.; Su, Z. (C12) 2010; 5 Wang, Y.; O'Neill, M.; Kurugollu, F. (C30) 2013; 23 Damak, T.; Loukil, H.; Ben Atitallah, A. (C40) 2012; 59 Masuda, N.; Aihara, K. (C26) 2002; 49 Li, S.; Chen, G.; Mou, X. (C33) 2005; 15 Dalal, U.D.; Joshi, J.M. (C22) 2011; 5 Asghar, M.N.; Ghanbari, M. (C6) 2013; 23 Hénon, M. (C35) 1976; 50 Huynh-Thu, Q.; Ghanbari, M. (C42) 2012; 49 Shi, C.; Bhargava, B.; Wang, S. (C18) 2004; 24 Shah, J.; Saxena, V. (C7) 2011; 8 Khlif, N.; Damak, T.; Kammoun, F. (C37) 2016; 44 Mao, Y.; Lian, S.; Chen, G. (C36) 2004; 14 Shahid, Z.; Chaumont, M.; Puech, W. (C3) 2011; 21 Lian, S.; Liu, Z.; Ren, Z. (C17) 2006; 52 Wu, Y.; Noonan, P.J.; Agaian, S. (C46) 2011; 1 Stutz, T.; Uhl, A. (C8) 2012; 22 Wang, Z.; Bovik, A.C.; Sheikh, H.R. (C43) 2004; 13 Masmoudi, A.; Puech, W. (C31) 2014; 8 Lian, S.; Liu, Z.; Ren, Z. (C20) 2007; 17 Lian, S.; Sun, J.; Liu, G. (C27) 2008; 38 Werda, I.; Damak, T.; Grandpierre, T. (C39) 2010; 7 May, R.M. (C32) 1976; 261 Wu, G.C.; Baleanu, D.; Zeng, S.D. (C34) 2014; 378 2007; 17 December 2011 2006; 52 October 1998 December 2013 1976; 261 2011; 1 November 2014 May 2008 2013; 23 2008; 38 2004; 24 May 2013 2009 1996 1994 September 2011 2003 2012; 59 March 2014 2011; 5 2011; 8 2014; 378 1999 December 2004 2002; 49 February 2012 December 2005 2001 1976; 50 2004; 14 September 2007 2004; 13 November 2009 August 2013 August 2012 2011; 21 2012; 49 2005; 15 2014; 8 2010; 5 2012; 22 2010; 7 2016; 44 e_1_2_7_6_1 e_1_2_7_5_1 e_1_2_7_4_1 e_1_2_7_3_1 e_1_2_7_9_1 Lian S. (e_1_2_7_45_1) 2009 Schneier B. (e_1_2_7_46_1) 1996 e_1_2_7_7_1 e_1_2_7_19_1 e_1_2_7_18_1 e_1_2_7_17_1 e_1_2_7_16_1 e_1_2_7_40_1 e_1_2_7_2_1 e_1_2_7_15_1 e_1_2_7_14_1 e_1_2_7_42_1 e_1_2_7_13_1 e_1_2_7_43_1 e_1_2_7_12_1 e_1_2_7_44_1 e_1_2_7_11_1 e_1_2_7_10_1 Richardson I.E.G. (e_1_2_7_39_1) 2003 e_1_2_7_26_1 e_1_2_7_27_1 Damak T. (e_1_2_7_41_1) 2012; 59 e_1_2_7_28_1 e_1_2_7_29_1 Dalal U.D. (e_1_2_7_23_1) 2011; 5 Wu Y. (e_1_2_7_47_1) 2011; 1 e_1_2_7_30_1 e_1_2_7_25_1 e_1_2_7_31_1 e_1_2_7_24_1 e_1_2_7_32_1 e_1_2_7_33_1 e_1_2_7_22_1 e_1_2_7_34_1 e_1_2_7_21_1 e_1_2_7_35_1 e_1_2_7_20_1 e_1_2_7_36_1 e_1_2_7_37_1 e_1_2_7_38_1 Shah J. (e_1_2_7_8_1) 2011; 8 |
| References_xml | – volume: 44 start-page: 160 issue: 1 year: 2016 end-page: 174 ident: C37 article-title: Joint selective encryption of CAVLC and signs of motion vectors for H.264/AVC publication-title: J. Test. Eval. – volume: 17 start-page: 774 issue: 6 year: 2007 end-page: 778 ident: C20 article-title: Commutative encryption and watermarking in video compression publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 23 start-page: 425 issue: 3 year: 2013 end-page: 437 ident: C6 article-title: An efficient security system for CABAC bin-strings of H.264/SVC publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 59 start-page: 20 issue: 19 year: 2012 end-page: 27 ident: C40 article-title: Software and hardware architecture of H.264/AVC decoder publication-title: Int. J. Comput. Appl. – volume: 49 start-page: 28 issue: 1 year: 2002 end-page: 40 ident: C26 article-title: Cryptosystems with discretized chaotic maps publication-title: IEEE Trans. Circuits and Systems: Fundamental Theory and Applications – volume: 52 start-page: 621 issue: 2 year: 2006 end-page: 629 ident: C17 article-title: Secure advanced video coding based on selective encryption algorithms publication-title: IEEE Trans. Consum. Electron. – volume: 50 start-page: 69 issue: 1 year: 1976 end-page: 77 ident: C35 article-title: A two-dimensional mapping with a strange attractor publication-title: Commun. Math. Phys. – volume: 5 start-page: 464 issue: 5 year: 2010 end-page: 472 ident: C12 article-title: An improved selective encryption for H.264 video based on intra prediction mode scrambling publication-title: J. Multimed. – volume: 24 start-page: 57 issue: 1 year: 2004 end-page: 79 ident: C18 article-title: MPEG video encryption algorithms publication-title: Multimedia Tools Appl. – volume: 21 start-page: 565 issue: 5 year: 2011 end-page: 576 ident: C3 article-title: Fast protection of h.264/avc by selective encryption of CAVLC and CABAC for I and P frames publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 15 start-page: 3119 issue: 10 year: 2005 end-page: 3151 ident: C33 article-title: On the dynamical degradation of digital piecewise linear chaotic maps publication-title: Int. J. Bifurcation Chaos – volume: 261 start-page: 459 issue: 5560 year: 1976 end-page: 467 ident: C32 article-title: Simple mathematical models with very complicated dynamics publication-title: Nature – volume: 49 start-page: 35 issue: 1 year: 2012 end-page: 48 ident: C42 article-title: The accuracy of PSNR in predicting video quality for different video scenes and frame rates publication-title: Telecommun. Syst. – volume: 22 start-page: 325 issue: 3 year: 2012 end-page: 339 ident: C8 article-title: A survey of H.264AVC/SVC encryption publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 38 start-page: 75 issue: 1 year: 2008 end-page: 89 ident: C27 article-title: Efficient video encryption scheme based on advanced video coding publication-title: Multimedia Tools Appl. – volume: 23 start-page: 1476 issue: 9 year: 2013 end-page: 1490 ident: C30 article-title: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 8 start-page: 525 issue: 2 year: 2011 end-page: 534 ident: C7 article-title: Video encryption: a survey publication-title: IJCSI Int. J. Comput. Sci. Issues – volume: 5 start-page: 256 issue: 7 year: 2011 end-page: 260 ident: C22 article-title: Selective encryption using ISMACryp in real time video streaming of H.264/AVC for DVB-H application publication-title: World Acad. Sci. Eng.Technol. – volume: 13 start-page: 600 issue: 4 year: 2004 end-page: 612 ident: C43 article-title: Image quality assessment: from error visibility to structural similarity publication-title: IEEE Trans. Image Process. – volume: 14 start-page: 3616 issue: 10 year: 2004 end-page: 3624 ident: C36 article-title: A novel fast image encryption scheme based on 3D chaotic Baker maps publication-title: Int. J. Bifurcation Chaos – volume: 7 start-page: 215 issue: 4 year: 2010 end-page: 232 ident: C39 article-title: Real time H.264/AVC baseline decoder implementation on TMS320C6416 publication-title: J. Real-Time Image Process. – volume: 8 start-page: 671 issue: 12 year: 2014 end-page: 686 ident: C31 article-title: Lossless chaos-based crypto-compression scheme for image protection publication-title: IET Image Process. – volume: 378 start-page: 484 issue: 5 year: 2014 end-page: 487 ident: C34 article-title: Discrete chaos in fractional sine and standard maps publication-title: Phys. Lett. A – volume: 1 start-page: 31 issue: 4 year: 2011 end-page: 38 ident: C46 article-title: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology publication-title: J. Sel. Areas Telecommun. JSAT – volume: 59 start-page: 20 issue: 19 year: 2012 end-page: 27 article-title: Software and hardware architecture of H.264/AVC decoder publication-title: Int. J. Comput. Appl. – year: 2009 – volume: 49 start-page: 35 issue: 1 year: 2012 end-page: 48 article-title: The accuracy of PSNR in predicting video quality for different video scenes and frame rates publication-title: Telecommun. Syst. – volume: 44 start-page: 160 issue: 1 year: 2016 end-page: 174 article-title: Joint selective encryption of CAVLC and signs of motion vectors for H.264/AVC publication-title: J. Test. Eval. – start-page: 1752 year: August 2012 end-page: 1756 – volume: 1 start-page: 31 issue: 4 year: 2011 end-page: 38 article-title: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology publication-title: J. Sel. Areas Telecommun. JSAT – start-page: 1 year: December 2011 end-page: 6 – volume: 5 start-page: 464 issue: 5 year: 2010 end-page: 472 article-title: An improved selective encryption for H.264 video based on intra prediction mode scrambling publication-title: J. Multimed. – volume: 49 start-page: 28 issue: 1 year: 2002 end-page: 40 article-title: Cryptosystems with discretized chaotic maps publication-title: IEEE Trans. Circuits and Systems: Fundamental Theory and Applications – year: 2001 – volume: 23 start-page: 425 issue: 3 year: 2013 end-page: 437 article-title: An efficient security system for CABAC bin‐strings of H.264/SVC publication-title: IEEE Trans. Circuits Syst. Video Technol. – year: 2003 – volume: 24 start-page: 57 issue: 1 year: 2004 end-page: 79 article-title: MPEG video encryption algorithms publication-title: Multimedia Tools Appl. – volume: 15 start-page: 3119 issue: 10 year: 2005 end-page: 3151 article-title: On the dynamical degradation of digital piecewise linear chaotic maps publication-title: Int. J. Bifurcation Chaos – year: 1996 – volume: 13 start-page: 600 issue: 4 year: 2004 end-page: 612 article-title: Image quality assessment: from error visibility to structural similarity publication-title: IEEE Trans. Image Process. – volume: 7 start-page: 215 issue: 4 year: 2010 end-page: 232 article-title: Real time H.264/AVC baseline decoder implementation on TMS320C6416 publication-title: J. Real‐Time Image Process. – start-page: 229 year: May 2013 end-page: 232 – volume: 23 start-page: 1476 issue: 9 year: 2013 end-page: 1490 article-title: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 8 start-page: 671 issue: 12 year: 2014 end-page: 686 article-title: Lossless chaos‐based crypto‐compression scheme for image protection publication-title: IET Image Process. – start-page: 187 year: May 2008 end-page: 190 – volume: 14 start-page: 3616 issue: 10 year: 2004 end-page: 3624 article-title: A novel fast image encryption scheme based on 3D chaotic Baker maps publication-title: Int. J. Bifurcation Chaos – year: 1994 – volume: 378 start-page: 484 issue: 5 year: 2014 end-page: 487 article-title: Discrete chaos in fractional sine and standard maps publication-title: Phys. Lett. A – volume: 5 start-page: 256 issue: 7 year: 2011 end-page: 260 article-title: Selective encryption using ISMACryp in real time video streaming of H.264/AVC for DVB‐H application publication-title: World Acad. Sci. Eng.Technol. – volume: 8 start-page: 525 issue: 2 year: 2011 end-page: 534 article-title: Video encryption: a survey publication-title: IJCSI Int. J. Comput. Sci. Issues – start-page: 314 year: December 2013 end-page: 317 – volume: 17 start-page: 774 issue: 6 year: 2007 end-page: 778 article-title: Commutative encryption and watermarking in video compression publication-title: IEEE Trans. Circuits Syst. Video Technol. – start-page: 386 year: December 2004 end-page: 393 – start-page: 1121 year: December 2005 end-page: 1124 – volume: 21 start-page: 565 issue: 5 year: 2011 end-page: 576 article-title: Fast protection of h.264/avc by selective encryption of CAVLC and CABAC for I and P frames publication-title: IEEE Trans. Circuits Syst. Video Technol. – start-page: 381 year: October 1998 end-page: 386 – start-page: 425 year: February 2012 end-page: 429 – start-page: 478 year: November 2009 end-page: 482 – start-page: 2185 year: September 2011 end-page: 2189 – volume: 261 start-page: 459 issue: 5560 year: 1976 end-page: 467 article-title: Simple mathematical models with very complicated dynamics publication-title: Nature – start-page: 1 year: November 2014 end-page: 7 – start-page: 1 year: March 2014 end-page: 6 – volume: 38 start-page: 75 issue: 1 year: 2008 end-page: 89 article-title: Efficient video encryption scheme based on advanced video coding publication-title: Multimedia Tools Appl. – start-page: 148 year: August 2013 end-page: 152 – volume: 22 start-page: 325 issue: 3 year: 2012 end-page: 339 article-title: A survey of H.264AVC/SVC encryption publication-title: IEEE Trans. Circuits Syst. Video Technol. – start-page: IV‐85 year: September 2007 end-page: IV‐88 – volume: 50 start-page: 69 issue: 1 year: 1976 end-page: 77 article-title: A two‐dimensional mapping with a strange attractor publication-title: Commun. Math. Phys. – year: 1999 – volume: 52 start-page: 621 issue: 2 year: 2006 end-page: 629 article-title: Secure advanced video coding based on selective encryption algorithms publication-title: IEEE Trans. Consum. Electron. – ident: e_1_2_7_4_1 doi: 10.1109/TCSVT.2011.2129090 – ident: e_1_2_7_40_1 doi: 10.1007/s11554-010-0181-6 – volume-title: Applied cryptography: protocols, algorithms, and source code in C year: 1996 ident: e_1_2_7_46_1 – ident: e_1_2_7_7_1 doi: 10.1109/TCSVT.2012.2204941 – ident: e_1_2_7_15_1 doi: 10.1109/ICIP.2007.4379960 – ident: e_1_2_7_29_1 – ident: e_1_2_7_32_1 doi: 10.1049/iet-ipr.2013.0598 – ident: e_1_2_7_36_1 doi: 10.1007/BF01608556 – ident: e_1_2_7_27_1 doi: 10.1109/81.974872 – ident: e_1_2_7_13_1 doi: 10.4304/jmm.5.5.464-472 – ident: e_1_2_7_37_1 doi: 10.1142/S021812740401151X – ident: e_1_2_7_44_1 doi: 10.1109/TIP.2003.819861 – ident: e_1_2_7_3_1 – ident: e_1_2_7_25_1 doi: 10.1109/STA.2013.6783148 – ident: e_1_2_7_33_1 doi: 10.1038/261459a0 – ident: e_1_2_7_9_1 doi: 10.1109/TCSVT.2011.2162290 – ident: e_1_2_7_22_1 – ident: e_1_2_7_34_1 doi: 10.1142/S0218127405014052 – ident: e_1_2_7_17_1 – volume: 1 start-page: 31 issue: 4 year: 2011 ident: e_1_2_7_47_1 article-title: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology publication-title: J. Sel. Areas Telecommun. JSAT – ident: e_1_2_7_6_1 doi: 10.1109/WIFS.2011.6123130 – volume: 59 start-page: 20 issue: 19 year: 2012 ident: e_1_2_7_41_1 article-title: Software and hardware architecture of H.264/AVC decoder publication-title: Int. J. Comput. Appl. – ident: e_1_2_7_5_1 – ident: e_1_2_7_10_1 – ident: e_1_2_7_12_1 doi: 10.1109/MINES.2009.26 – ident: e_1_2_7_16_1 – ident: e_1_2_7_2_1 – ident: e_1_2_7_30_1 doi: 10.2991/icsem.2013.29 – volume-title: H.264/AVC and MPEG4 video compression, video coding for next generation multimedia year: 2003 ident: e_1_2_7_39_1 doi: 10.1002/0470869615 – ident: e_1_2_7_11_1 doi: 10.1007/978-3-540-30543-9_49 – ident: e_1_2_7_24_1 – volume: 8 start-page: 525 issue: 2 year: 2011 ident: e_1_2_7_8_1 article-title: Video encryption: a survey publication-title: IJCSI Int. J. Comput. Sci. Issues – ident: e_1_2_7_19_1 doi: 10.1023/B:MTAP.0000033983.62130.00 – ident: e_1_2_7_35_1 doi: 10.1016/j.physleta.2013.12.010 – ident: e_1_2_7_43_1 doi: 10.1007/s11235-010-9351-x – ident: e_1_2_7_21_1 doi: 10.1109/TCSVT.2007.896635 – ident: e_1_2_7_14_1 doi: 10.1109/IPAS.2014.7043256 – ident: e_1_2_7_31_1 doi: 10.1109/TCSVT.2013.2248588 – volume: 5 start-page: 256 issue: 7 year: 2011 ident: e_1_2_7_23_1 article-title: Selective encryption using ISMACryp in real time video streaming of H.264/AVC for DVB‐H application publication-title: World Acad. Sci. Eng.Technol. – ident: e_1_2_7_18_1 doi: 10.1109/TCE.2006.1649688 – ident: e_1_2_7_38_1 doi: 10.1520/JTE20140182 – ident: e_1_2_7_42_1 – ident: e_1_2_7_26_1 – ident: e_1_2_7_20_1 doi: 10.1109/ATSIP.2014.6834579 – ident: e_1_2_7_28_1 doi: 10.1007/s11042-007-0150-7 – volume-title: Multimedia content encryption: techniques and applications year: 2009 ident: e_1_2_7_45_1 |
| SSID | ssj0059085 |
| Score | 2.195556 |
| Snippet | This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To... This study presents a chaos‐based crypto‐compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To... |
| SourceID | crossref wiley iet |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 42 |
| SubjectTerms | adaptive codes advanced video coding protection chaos‐based crypto‐compression scheme chaotic communication compression ratio context adaptive variable length coding cryptography data compression data protection decision module format compliance H.264/AVC video conferencing protection inter‐prediction encryption intra‐prediction encryption piecewise linear chaotic maps pseudorandom bit generators Research Article secure chaotic dual encryption scheme selective encryption approach variable length codes video coding video compression standards |
| Title | Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection |
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-ipr.2017.0022 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-ipr.2017.0022 |
| Volume | 12 |
| WOSCitedRecordID | wos000419403600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 1751-9667 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0059085 issn: 1751-9659 databaseCode: WIN dateStart: 20130101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access (WRLC) customDbUrl: eissn: 1751-9667 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0059085 issn: 1751-9659 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwEA9z-uCL8xPnF0HEByGuaZuueZxjY3sZU6burTRpigPdxjYF_3vv0nYyhAniSx-SuzZccne_JL07Qq546ioTqpRJNxTM94VhoXZiBr4ojUOjY6USW2yi3uuFw6Hsl0iziIXJ8kMsD9xQM6y9RgWPVVaFBEAtTOLILNhoiik9OWYhdMEOb3Lu1XFpu36_MMdY01vYqEisJx8IubzalLUfr1hxThvQvQpZrc9pV_5ltLtkJ4ectJGtkT1SMuN9UsnhJ82Ve35A7u3Zu6H6JZ4AKcUoLQp9s09rVijsg82boYByaecWEE6t8dSkGMY3obqIGwRHSPPUD8BySB7brUGzw_KKC0y7MuQsgRlNAyVTEbtKp1zJxIuV0HGiMA07uHpP4G8mQOtqoQDsAFoIFICKJFCKJ94RKY8nY3NMqJPCvtsYzYXGWFe8nQNdF8YDwBZo5VSJU4g60nk6cqyK8RrZa3FfRiCyCEQWocgiFFmV3CxZplkujnXE19iWa-R8HeHlCmG3NYi6_YdvgmiapFXi2dn9_bvI6961EUnzkz9xnZJtaA-zc54zUl7M3s052dIfi9F8dmEXNzyfu70v_tT8hw |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwED_mFPTF-YnzM4j4INStH6nt45wbG84xZYpvoUlTHOg2tin433uXdpMhTBBf27u2XHK5Xy693wGc2YkjdSATK3QCbnke11agypGFsSiJAq0iKWPTbOKq3Q6en8NODm6mtTApP8Qs4UaeYdZrcnBKSKcbTo9IMnt6YvWGxOlpEw2hgwvxsofRhvoYOF5nuh5TU29uyiKpobzPw9nZZlj68Yi56LSEt-cxqwk69cL_fO4GrGegk1XSWbIJOd3fgkIGQFnm3uNtuDfZd83USzRAUUZ1WgzvjT7NwsJwJ6zfNEOcyxqXiHFKlacqo0K-AVPTykEMhSwjf0CVHXis17rVhpX1XLCUEwa2FeOYJr4MEx45UiW2DGM3klxFsSQidgz2LqcfTVDWUVwi3EG84EuEFbEvpR27u5DvD_p6D1g5wZ231srmiqpd6XwOvZ1rFyGbr2S5COWprYXKCMmpL8arMAfjXijQZAJNJshkgkxWhIuZyjBl41gkfE7XMp8cLxI8nRNs1rqi2Xn4FhDDOCmCa4b39_eSrnNdJyxt7_9J6wRWG927lmg127cHsIYyQZr1OYT8ZPSuj2BFfUx649GxmelfCCb_Wg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB5qFfFifWJ9LiIehNjmsTE51j5oUUqVKr0t2c0GC9qWtgr-e2c2aaUIFcRrMpOE2Z2Zb3cz3wBc2IkjdSATK3QCbnke11agypGFuSiJAq0iKWPTbOKm3Q56vbCTg9qsFiblh5hvuJFnmHhNDq5HcZIuOD0iyezrqdUfEaenTTSEDgbiVY9jrCV-Z68zi8fU1JubskhqKO_zcH62GZZ-PGIhO63g7UXMapJOo_A_n7sFmxnoZJV0lmxDTg92oJABUJa592QXHszuu2bqJRqiKKM6LYb3xp8msDBcCes3zRDnsuY1YpxS5bnKqJBvyNSschBTIcvIH1BlD54a9W61aWU9FyzlhIFtxTimiS_DhEeOVIktw9iNJFdRLImIHZO9y-lHE5R1FJcIdxAv-BJhRexLacfuPuQHw4E-AFZOcOWttbK5ompXOp9Db-faRcjmK1kuQnlma6EyQnLqi_EqzMG4Fwo0mUCTCTKZIJMV4WquMkrZOJYJX9K1zCcnywTPFwRb9a5odR6_BQSOZBFcM7y_v5d0ndsGYWn78E9aZ7DeqTXEfat9dwQbKBKkmz7HkJ-O3_UJrKmPaX8yPjUT_QutMf7e |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+chaotic+dual+encryption+scheme+for+H.264%2FAVC+video+conferencing+protection&rft.jtitle=IET+image+processing&rft.au=Khlif%2C+Naziha&rft.au=Masmoudi%2C+Atef&rft.au=Kammoun%2C+Fahmi&rft.au=Masmoudi%2C+Nouri&rft.date=2018-01-01&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-9659&rft.eissn=1751-9667&rft.volume=12&rft.issue=1&rft.spage=42&rft.epage=52&rft_id=info:doi/10.1049%2Fiet-ipr.2017.0022&rft.externalDocID=10_1049_iet_ipr_2017_0022 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-9659&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-9659&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-9659&client=summon |