Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


A New Approach of Crypto-compression on MPEG Format

Y. Benlcouiri, M. Benabdellah, M.C. Ismaili and A. Azizi
ACSA Laboratory, Faculty of Sciences, Mohammed First University, Oujda, Morocco
Research Journal of Applied Sciences, Engineering and Technology  2014  18:3791-3796
http://dx.doi.org/10.19026/rjaset.7.735  |  © The Author(s) 2014
Received: October 26, 2013  |  Accepted: December 04, 2013  |  Published: May 10, 2014

Abstract

Issues of security and compression of transmitted data have become an important concern in multimedia technology. In this study, we propose an efficient approach to secure video sequences in real time using the method of choosing reference images that is based on the Faber-schauder Multi-scale Transform to reduce the data flow. The encryption step is based on the principle of affine encryption to achieve transposition and to perform some manipulations such as puzzle to reduce the amount of bits to be processed on the image. Testing this approach on video sequences revealed an improvement in data flow and provides a stronger security and a good encryption time.

Keywords:

Compression, congruence, encryption, Faber-schauder Multi-scale Transform (FMT), MPEG, puzzle, reference image, Z/pZ fields,


References

  1. Benabdellah, M., M. Gharbi, F. Regragui and E.H. Bouyakhf, 2005. A method for choosing reference images based on edge detection for video compression. Georgian Electron. Sci. J. Comput. Sci. Telecommun., 3(7): 33-39.
  2. Benabdellah, M., M. Gharbi, F. Regragui and E.H. Bouyakhf, 2007. Choice of reference images for video compression. Int. J. Appl. Math. Sci., 1: 2187-2201.
  3. Benlcouiri, Y., M. Benabdellah, M.C. Ismaili and A. Azizi, 2013. Affine cipher extended to (Z/pZ) and it's application in images. Proceedings of the 20th International Conference on Telecommunications (ICT, 2013), pp: 1-5.
  4. Choo, E., J. Lee, H. Lee and G. Nam, 2007. SRMT: A lightweight encryption scheme for secure real-time multimedia transmission. Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, pp: 60-65.
    CrossRef    
  5. Choon, L.S., 2004. Lightweight and cost-effective MPEG video encryption. Proceedings of the International Conference on Information and Communication Technologies: From Theory to Applications, pp: 525-526.
  6. Shannon, C.E., 1949. Communication theory of secrecy systems. Bell Syst. Tech. J., 28: 656-715.
    CrossRef    
  7. Tang, L., 1996. Methods for encrypting and decrypting MPEG video data efficiently. Proceedings of the 4th ACM International Conference on Multimedia, pp: 219-229.
    CrossRef    
  8. Zeghid, M., M. Machhout, L. Khriji and A. Baganne, 2007. A modified AES based algorithm for image encryption. Int. J. Comput. Sci. Eng., 1(1): 70-75.
  9. Zeng, W. and S. Lei, 2003. Efficient frequency domain selective scrambling of digital video. IEEE T. Multimedia, 5: 118-219.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved