ArticlePDF Available

Abstract

span lang="EN-US">In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream cipher method is presented and investigated for video encryption based on hybrid chaotic map and ChaCha20 algorithm. Two chaotic maps are employed for keys generation process in order to achieve permutation and encryption tasks, respectively. The frames sequences are encrypted-decrypted based on symmetric scheme with assist of ChaCha20 algorithm. The proposed lightweight stream cipher method has been tested on several video samples to confirm suitability and validation in term of encryption–decryption procedures. The performance evaluation metrics include visual test, histogram analysis, information entropy, correlation analysis and differential analysis. From the experimental results, the proposed lightweight encryption method exhibited a higher security with lower computation time compared with state-of-the-art encryption methods.</span
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 5, October 2022, pp. 4988~5000
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i5.pp4988-5000 4988
Journal homepage: http://ijece.iaescore.com
Novel lightweight video encryption method based on ChaCha20
stream cipher and hybrid chaotic map
Abeer Tariq Maolood, Ekhlas Khalaf Gbashi, Eman Shakir Mahmood
Department of Computer Science, University of Technology, Baghdad, Iraq
Article Info
ABSTRACT
Article history:
Received May 26, 2021
Revised Jun 24, 2022
Accepted Jul 4, 2022
In the recent years, an increasing demand for securing visual resource-
constrained devices become a challenging problem due to the characteristics
of these devices. Visual resource-constrained devices are suffered from
limited storage space and lower power for computation such as wireless
sensors, internet protocol (IP) camera and smart cards. Consequently, to
support and preserve the video privacy in video surveillance system,
lightweight security methods are required instead of the existing traditional
encryption methods. In this paper, a new light weight stream cipher method
is presented and investigated for video encryption based on hybrid chaotic
map and ChaCha20 algorithm. Two chaotic maps are employed for keys
generation process in order to achieve permutation and encryption tasks,
respectively. The frames sequences are encrypted-decrypted based on
symmetric scheme with assist of ChaCha20 algorithm. The proposed
lightweight stream cipher method has been tested on several video samples
to confirm suitability and validation in term of encryptiondecryption
procedures. The performance evaluation metrics include visual test,
histogram analysis, information entropy, correlation analysis and differential
analysis. From the experimental results, the proposed lightweight encryption
method exhibited a higher security with lower computation time compared
with state-of-the-art encryption methods.
Keywords:
ChaCha20
Chaotic maps
Stream cipher
Video encryption
Video privacy
This is an open access article under the CC BY-SA license.
Corresponding Author:
Abeer Tariq Maolood
Department of Computer Science, University of Technology
52 Road, Al Senaa’h Street, Baghdad, Iraq
Email: abeer.t.maolood@uotechnology.edu.iq
1. INTRODUCTION
Recently, the encryption of multimedia data at the for front of research today, due to the continuous
increment in digital communication on the internet and increasing uses of video in a wide range of applications
security and privacy issues into serious attention. The nominal aim of multimedia data encryption is to make
the multimedia information robust against the unauthorized divulgence in transit and storage. Many presented
encryption schemes which are to preserve text data and image data are not adequate for video encryption
because of the real time restriction and huge data volume in the video. Therefore, a lot of works have been
presented for video encryption to improve the encryption quality and video security conditions based on
utilizing different encryption algorithms. Hence, by comparing the chaos-based encryption with several
encryption schemes, it has demonstrated an excellent performance with confirmed ability of increased
security and privacy based on utilizing variable keys [1][8]. These make the chaotic scheme is adequate to
implement video encryption for different applications. On the other hand, the ChaCha20 is stream cipher
algorithm depended on XORed the plaintext with stream of pseudo-random bytes as a key of ChaCha20
Int J Elec & Comp Eng ISSN: 2088-8708
Novel lightweight video encryption method based on ChaCha20 stream … (Abeer Tariq Maolood)
4989
[9][12]. ChaCha20 provides high confidence and much sensitive to change of the initial conditions, where a
simple flipping of single bit into the input stream will because unpredictable changes at the output stream.
The problems of the previous schemes for securing the video data can be defined as, where these
schemes were not taken into account the various parameters at simultaneously, such as quality of security,
efficient computational with execution time, and compression efficiency, where many video-encryption
schemes have been proposed to secure the local videos. Therefore, several of these schemes not adequate for
secure the video transmission at real-world applications. From this point of issue, the motivation of this paper
is to propose solution which can meet main requirements for secure transmitting the public and private videos
based on a new encryption scheme by combined of chaos-based encryption models and ChaCha20 symmetric
stream cipher algorithm. In this paper, the proposed scheme reduces the size of video data by extraction the
differences of sequences frames based on dynamic reference frame. The resultant video will be double
encrypted using two encryption phases, chaos-map and ChaCha20. The proposed scheme provides the main
requirements for transmitting videos which are compression by reduces the video data, computational,
quality of security by utilized double security phases, and efficient computations by utilizing two-model
chaotic maps, first model to generate encryption keys to encrypt individual frame and second model to
generate initial key of ChaCha20 algorithm. This paper is organized as follows: section 1 presents an
introduction of this paper, section 2 presents the related work, section 3 presents the objectives and
contributions of proposed video encryption scheme, the material and methods presented in section 4, the
proposed video encryption scheme presented in section 5, the experimental results presented in section 6, the
conclusion presented in section 7 at a final of this paper.
2. RELATED WORK
In this section, different related works on video encryptions are discussed and explained. The
security performance analysis of video encryption schemes is presented and investigated in different
research. In general, the video encryption was divided for selective encryption and full encryption, based on
the amount of encrypted data and the requirements of the security level [13][18].
A selective video encryption scheme was presented to encrypt the interested part of the frame which
of greatest information for the user, based on entropy measure of the frame data blocks and utilizing the
chaotic map [19]. The presented, method depends on encrypted video by selecting interesting macro-blocks
to be encrypted based on entropy measure. This method exhibited a strength security against an
entropy-based attack, and it is suitable for video on demand applications. The encrypted video outflow this
scheme has the same frames with distortion of several macro-blocks in each frame. In [20], a selective video
encryption scheme based on coding characteristics was presented based on two case of encryption video.
First case is complete selective video encryption using video encoding and 4D hyper-chaotic systems at the
small amount of encrypted data. Second case is selective video encryption was implemented based on video
characteristic encoding such as the motion vector difference (MVD), residual coefficient, intra prediction
mode (IPM) and delta-QP in each slice of H.264/AVC encoding algorithm. This method presented high
quality of encrypted video with high processing complexity for encrypted video. The encryption scheme was
depended on three phases of work progress such as first phase is constructing plaintext, second phase is
encrypting plaintext, and third phase is replacing the original bitstream. The H.264/AVC encoding algorithm
was adopted to encode the video into independent multiple slices. The advanced encryption standard (AES)
based cipher feedback mode (CFB) was utilized to encrypt these slices individually. The pseudo-random
number generator (PRNG) was used to generate the required keys and real time updated.
On the other hand, a lot of researchers have been presented different schemes to encrypt whole
video frame by adopting different encryption algorithms [21][26]. In work [24], to generate the key stream
for video frames encryption, two algorithms were utilized different chaotic. The video file had been
compressed before applied encryption process. The two proposed schemes were sensitive to slight variations
in any components of comprising the secret encryption key as apparent from the obtained differential
measures. In work [27], AES algorithm was adopted to encrypt video frame directly on the compressed
domain with motion picture expert group (MPEG) video compression. In this method, the time cycle of
compression and decompression was preserved.
In [28], the 2 dimension (2D) chaotic model was presented to apply encryption sachem for the
multimedia encryption at high security data transmission. Their work was presented a hybrid chaotic
structure based on multiple combined maps for different media encryption (text, voice, image, and video). At
video encryption scheme of this method, the whole video frames were encrypted as separated image. This
method exhibits high security data transmission with increases computation complexity and consuming in
processing time.
In [29], a three-level chaotic video encryption scheme was presented based on employed the
permutation and diffusion rounds. The maps of combination of logistic and tent (LTS) were utilized to obtain
ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 5, October 2022: 4988-5000
4990
the prefatory encryption parameters. Their method exhibited good competency for processing time; however,
the drawback was a compression reduction. The key generator block (KGB) was utilized to generate the
internal keys of the key generation technique in order to generate required keys for chaos system. The
internal keys were adopted to present the frame selection (FS) technique. On the bases of the presented
results, the key space of the presented scheme was 2212 which can prove good security level. Also, the
maximum deviation and deviation irregular were achieved good results compared with different related
works. In [30], the S-Box and two alternative schemes were utilized to present video encryption pipeline.
These schemes are higher dimensional chaotic map and Ikeda delay differential equation (DDE). The
associated limitations of this method were increasing the key complexity and processing time for encryption.
In [31], the region of interest (ROI) based on faster region based convolutional neural networks (R-CNN)
method for video encryption was presented to overcome the shortcoming of several video encryption
schemes. Different encryption schemes had been used to encrypt the non-ROI in order to implement fully
video frame encryption. This method presented an improved the performance of video encryption scheme
based on reduces the amount of data in video for encryption at ROI. However, the main limitation of this
method was increasing the encryption time and computation complexity by using two cases of encryptions
(ROI and non-ROI) with different encryption scheme.
On the other hand, the encryption of video traffic had been implemented based on design of
algorithms for identification/prediction attack from encrypted traffic. In [32], the practical mobile traffic had
been designed based on utilized the deep learning as a viable strategy. This classifier was proposed to extract
the features automatically and it has capability to deal with encrypted traffic, then reflecting their complex
patter of traffic, while in [33][36], multi classifier have been proposed for mobile application traffic based
on different approaches for instance Markov modeling, capture, and ground-truth creation. Finally, the
general comparisons of the previous video encryption schemes that demonstrated in the literature are
illustrated in Table 1.
Table 1. Comparisons of the previous video encryption schemes
3. OBJECTIVES AND CONTRIBUTIONS OF PROPOSED VIDEO ENCRYPTION SCHEME
Many researchers’ literature in this paper had been interested on the video encryption issue in order
to validate video encryption in real time by utilizing different techniques. Their works had been associated
with different weakness points. It is noteworthy, several video-encryption algorithms had been developed to
secure the local videos, but these encrypted videos are not appropriate for transmitting in real-world
applications. The main contribution of this paper, a new video encryption scheme has been proposed to
shorthand the computation time by reduction the data included in the frame. This contribution is carried out
based on computing the differences between sequences frames, in order to produce video frames, have less
video data than original video with availability to return original video at decryption end. The presented work
in this paper aims to improve the encryption quality, reduces processing time, reduces the execution time,
and increases the robustness against different attacks. In order to achieve these objectives, the proposed work
in this paper is adopted combinations of different algorithms to present light video encryption scheme which
are Henon chaotic map, ChaCha20 algorithm, and algorithm of differences of sequences frame. Finally, to
validate the mentioned aims of this paper, the proposed video encryption scheme will be tested by different
video files. Then, the finding of the experimental results will be described in sufficient details.
4. METHODS AND MATERIALS
The chaotic map and ChaCha20 algorithms are utilized in this paper to propose a new video
encryption scheme for real time applications. In order to implement the proposed video encryption scheme in
this paper, efficient secret keys are needed to obtain a robust and powerful encryption model against variant
attacks. Accordingly, hybrid chaotic maps are adopted and carried out in two phases models to generate the
secrete keys in this work. First chaotic model is employed to generate chaotic sequence-based permutation
Ref
Methods
Time
Encryption Ratio
Size
[31]
ROI and Fasted-CNN
0.2307 sec
100%
No change
[30]
Chaos maps and Ikeda
time delay system
0.8062 sec
100%
No change
[29]
Chaos system
0.5403 sec
100%
No change
[19]
Chaotic system
------
100%
[16]
Arnold cat map
--------
100/%
No change
Int J Elec & Comp Eng ISSN: 2088-8708
Novel lightweight video encryption method based on ChaCha20 stream … (Abeer Tariq Maolood)
4991
process of light-weight encryption scheme. The second chaotic model is exploited to generate the initial keys
of Chach20 method as will be explained in algorithm 1.
Algorithm 1: keys generation -based encryption
Input: a, b, Xo, Yo, Mid, M
Output: Key2[M] // list of generated keys
Define basic model parameters: a and b
Initialize model parameters (Xo and Yo)
Start Iteration Mid
Update XMid+1 and YMid+1
End iteration Mid
Start iteration M
X,Y ← update XM+1 and YM+1 ///Generate encryption keys using (2.a) and (2.b)
Key[M]=select1(X, Y, 32)
Key1[M]=select2(Key(M),16)
Key2[M]=integrate(Key, Key1)
End iteration M
4.1. Hybrid chaos models-based keys generation
Henon chaotic map presented in [37] is adopted in the first model (model 1) to generate
two-dimension chaotic map Xi, Yi where (i=1, 2, ..., M) and used to perform the permutation process in the
lightweight encryption phase.
Xi+1=1+b1Yi-a1Xi2 (1a)
Yi+1=Xi (1b)
Where a1, b1 are the initial parameters of this model with initial values a1 [1.07, 1.4] and b1=0.3. Xo1, Yo1
initial values are stand to Xo1=0.5, Yo1=0.5. It is worth noting that the first model of Henon chaotic maps is
iterated by (H×W)+Mid, where H, W refereed to high and width of the current frame, respectively. Mid is a
predefined iteration number. The second model is iterated by M times. The second model (model 2) of
Henon chaotic map presented in [6] is adopted to generate the important initial key of chach20 encryption
method. The initial values of this model are, a2=1.4, b2=0.3, Xo2=1.2, Yo2=0.8 as illustrated in (2):
Xi+1=1-a2Xi2+Yi (2a)
Yi+1=b2Xi (2b)
where both functions select1 () and select2 () are implemented for selecting 32, 16 bytes from the original
chaos keys X, Y, respectively. Then we integrate the obtained keys of each iteration to construct the final key
Key2 used later for chach20 encryption method.
4.2. ChaCha20 encryption algorithm
ChaCha20 algorithm is stream cipher has naturally good performance, as well as itis fast, secure,
and simple encryption algorithm. ChaCha20 implemented in this paper is derived from the code and
algorithms available in different research works and reports [9][12]. Its input includes a 48 byte consists of
32-byte key, a 4-byte counter, a 12-byte nonce. The core is a pseudo-random number generator. The output
cipher data is obtained by XOR'ing the input plain data with a pseudo-random stream:  
  󰇛 󰇜, at decryption, the same operation as
encryption:  󰇛 󰇜.
The ChaCha20 ciphering process is depended on 20 rounds of mathematical calculations using
XOR, addition and rotation using as inputs four 32-byte key, a 4-byte counter, a 12-byte nonce as input
matrix as shown in Table 2. The number of rounds depends on the application requirements such as 20 round
(maximum security), 8 rounds (maximum speed) or 12 rounds (balance between speed and security) [9]. In
our work, the 20 round of ChaCha20 algorithm is implemented to provide high data security for the
transmitted video.
Table 2. Input matrix
Const.
Const
Const
Const
Key
Key
Key
Key
Key
Key
Key
Key
Counter
Nonce
Nonce
Nonce
ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 5, October 2022: 4988-5000
4992
5. THE PROPOSED VIDEO ENCRYPTION SCHEME
This section describes the proposed encryption/decryption schemes for the acquired plain video
sequence Pv={F1, F2, ……Fn}. The main steps of the proposed encryption algorithm are schematized in
Figure 1 and illustrated in algorithm 2. Likewise, the main steps of the proposed decryption algorithm are
demonstrated in Figure 2 and stated in algorithm 3. The decryption phase is designed and implemented to
reconstruct the original video from the encrypted sequenced frames.
Algorithm 2: the proposed video encryption scheme
Input: Plain video Pv, Key2, a1, b1[1.07, 1.4], Xo1= 0.5, Yo1=0.5, a2 = 1.4, b2 = 0.3,
Xo2= 1.2, Yo2 =0.8, step
Output: Cipher video Cv
Begin
X1,Y1 ← Key Generation-based Permutation (a1, b1, Xo1, Yo1) // using model
Ke2, X2,Y2 ← Key Generation-based Encryption (a2, b2, Xo2, Yo2) // using model 2
Len=size(Pv)
Ref=Pv(1) // taken reference frame from Pv
Set i=1
while i+1<Len-step
Read (Pv, Fi) // read frames from Pv
DFi=Pre-processing (Fi, Ref) // find dissimilar frames using Algorithm (2)
LDFi=Lightweight Encryption (DFi, X1, Y1) // using Algorithm (4)
EPvi=Chacha-Encryption(LDFi, Key2)
Cv[i]=EPvi //Construct array of encrypted frames
if i% step==0 Ref=Fi end if
End while
End
Figure 1. Diagram of the proposed video encryption
algorithm
Figure 2. Diagram of the proposed video decryption
algorithm
Algorithm 3: video decryption scheme
Input: Cipher video Cv, Key2, X, Y, step
Output: Palin video Pv
Begin
Int J Elec & Comp Eng ISSN: 2088-8708
Novel lightweight video encryption method based on ChaCha20 stream … (Abeer Tariq Maolood)
4993
Len=size(Cv)
Ref=Cv(1)
While i+1<Len
Read (Cv, Fi) // read one frames from Pv
DCvi=Chacha-Decryption (Fi, Key2) // decryption phase
LDFi=Inverse-Lightweight (DCvi, X, Y) // inverse-lightweight phase according to model1
DFi=Pre-processing (LDFi, Ref)
Pv[i]=DFi //Construct encrypted video from encrypted frames
if i>=step then
Ref=Fi
end if
End while
End
5.1. Pre-processing of video using frames differences
In this section, the frame differences technique will be explained. This technique is applied at both
encryption and decryption sides in order to reduce the processing time. The main objective of utilizing
frames differences technique is to estimate the changes between sequenced frames (reference frame and
current frame) along video sample based on their dissimilarity measurement. In this context, the reference
frame is updated at a predefined interval of frames named step. Afterwards, the output video obtained from
pre-processing phase is passed into lightweight encryption phase with lower spatial information of each video
frame in order to minimize the computation time of the encryption/decryption processes. The main steps of
pre-processing approach are illustrated in Figure 3. The main contributions of adopting frame differences as
pre-processing phase in our video encryption scheme can be summarized as follows: i) minimize the spatial
information of video frame, ii) reduces the processing time and complexity of preprocessed video in
encryption and decryption sides, and iii) lower redundancy of video frames are acquired through adopting
step size for reference frame denoting.
Figure 3. Diagram of pre-processing approach
ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 5, October 2022: 4988-5000
4994
5.2. Lightweight encryption scheme
A lightweight encryption scheme is designed and implemented to encrypt dissimilar video frames
obtained from pre-processing video phase. The core of this algorithm is carrying out the data permutation for
individual frame based on the chaotic map model (1). The aim of lightweight encryption algorithm is to make
the encryption complexity is strong resistance against most measurable tests. The lightweight encryption
algorithm is illustrated in algorithm 4.
Algorithm 4: lightweight encryption
Input: Dissimilar video frame DFi, X1, Y1
Output: Cipher video frame LDFi
Begin
Examine the frame dimensions (DFi) and reshape into one dimensional vector of pixels
(DFvi=H×W×3) // H, W are height and width of DFi video frame)
Permute DFvi data frame (pixels) using chaotic sequence X1, Y1 // permutation phase
according to model1
LDFi=reshape (DFvi, H, W)
End
6. RESULTS AND DESCUSSION
The experimental results of many video files are tested to validate and investigate the objectives are
mentioned in this work. For this purpose, the proposed encryption scheme and the key generation algorithm
have been investigated on the platform (MATLAB 2018, windows 8.1-64-bit, CPU Cor i7, RAM 6 GB,
2.2 GHz) and tested with different video files. The strength and suitability of proposed scheme for video
encryption have been tested for key sensitivity, key space, computational time, randomness, and resistance
against statistical attacks.
The experimental results are demonstrated for different video files listed from any video dataset. For
the simulation experiments, the selected video files have properties are enlisted in Table 3. The important key
metrics are measured to validate the objectives of the proposed video encryption scheme. The following
progresses are implemented to establish the validation of the proposed scheme.
Table 3. Properties of video files used in simulation results
Attribute
Value
Number of frames
821
Height
640 pixels
Width
360 pixels
Frame rate
25-FPS
Bit per pixel
24-BPP
Video format
RGB24
6.1. Visual degradation measurements
To measure the perceptual distortion of the encrypted video frame compared with original video
frame, the visual degradation must be measured. The simulation results for selected video frames of different
videos are illustrated in Figure 4 (Figures 4(a) and 4(b)), where these videos have properties listed in Table 3.
From this figure, it can be inferred that, the proposed encryption scheme offers high scale of visual
degradation. Therefore, the proposed encryption/decryption scheme as shown in Figures 4(c) and 4(d)
respectively is very suitable to encrypt high class data-based multimedia applications.
6.2. Key space analysis
In crypto analysis system, the Brute force attack depends on trying out all possible keys to recover
the original video data. The size of key space for the encryption scheme provides its strength to make Brute-
force attack unfeasible. In this work two dimensional Henon chaotic systems were employed to provide a
larger key space. The 2D chaotic systems are utilized to generate the secret key for two encryption phases of
the proposed video encryption scheme. The encryption values of ChaCha20 depend on its initial seed keys
(key, nonce, counter and constants) and its related parameters associated with the second model of Henon
map. Likewise, the initial encryption values of light weight scheme depend upon the first model of Henon
map equation and its initial values. In addition, the key space depends upon the number of decimal places of
the mantissa which is approximately 215×215=230 for each of model1 and model2 which yields 260 key spaces
based chaotic map generation. This making the Brute force attack is computationally infeasible. This is a
main contribution of using two Henon chaotic maps to realize a larger key space. Further, the key space
regards the encryption phase based on ChaCha20 is denoted as 2348.
Int J Elec & Comp Eng ISSN: 2088-8708
Novel lightweight video encryption method based on ChaCha20 stream … (Abeer Tariq Maolood)
4995
(a)
(b)
(c)
(d)
Figure 4. Simulation results of proposed encryption scheme for selected frame taken from different videos:
(a) original frame, (b) differences frame, (c) encrypted frame, and (d) decrypted frame
6.3. Correlation coefficients analysis
The correlation coefficient reflects the pixels distribution and their relationships (dependency or
independency) in the adjacent video frames. This mean, the relationship between adjacent frames indicates
correlation value. The correlation is high when the correlation value is (approach to 1) at the linear
relationship, while correlation is implying low when the correlation value (approach to zero) at the nonlinear
relationship [8]. Therefore, the correlation value between adjacent frames of encrypted video must be
minimized. The correlation between adjacent frames is measured for the pixels located at the same position
of adjacent frames. In this paper, the differences between adjacent frames are adopted to provide a new video
frame with minimum data size. This technique makes the correlation value (approach to zero) and the
relationship between adjacent frames is nonlinear.
The experimental results of the correlation coefficients related to adjacent frames for the original
and encrypted frames are illustrated in Table 4. From these results, it is inferred that there exists negligible
correlation between original and encrypted frames, thereby providing no clue to make the statistical
cryptanalysis is possible. A scientific comparison was conducted between the proposed encryption scheme
and published research work presents in literature to evaluate the performance of the proposed encryption
scheme. This comparison has been implemented based on the properties of video file “dfs.avi”, which is
utilized in [14] and illustrated in Table 5. The comparison simulation results are illustrated in Table 6.
Table 4. Simulation results of correlation coefficient
Correlated
Frame No.
Correlation coefficient of red
component
Correlation coefficient of green
component
Correlation coefficient of blue
component
Original
Differences
Encrypted
Original
Differences
Encrypted
Original
Differences
Encrypted
1
1
1
1
1
1
1
1
1
1
1
1
2
0.9951
0.1077
-0.00027
0.9627
0.1065
-0.00053
0.9959
0.1106
-0.00074
2
3
0.9950
0.4121
-0.00049
0.9643
0.3800
-0.00310
0.9959
0.4276
-0.00043
3
4
0.9939
0.0219
0.00013
0.9670
0.0066
0.00051
0.9949
0.0089
0.00064
4
5
0.9932
0.0788
0.00025
0.9645
0.0570
0.00033
0.9942
0.0647
0.00073
5
6
0.9328
0.2263
0.00011
0.9610
0.2450
0.00201
0.9938
0.2348
0.00047
Table 5. Properties of video files “dfs.avi” [14]
Attribute
Value
Number of frames
102
Height
240 pixels
Width
320 pixels
Frame rate
15-FPS
Bit per pixel
24-BPP
Video format
RGB24
6.4. Histogram analysis
The histogram analysis reveals the graphical relationships between the original and encrypted frame
based on the frame pixels distribution. Statistical attacks are made by exploiting the predictable this
relationship to recover the original frames. The considerable changes in the histograms of encrypted frames
compared with the original frames reflect the strength of the encryption scheme against statistical attacks.
ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 5, October 2022: 4988-5000
4996
The histograms of the original frames are shown in Figure 5 (Figures 5(a) to 5(c)) and encrypted frames are
illustrated in Figures 5(d) to 5(f), for the red, green, and blue components. Obviously, the histograms of the
encrypted frame for three components red, green, blue are uniformly distributed and significantly different
from the original frames. Subsequently, they do not provide any evidence for exploiting the statistical attack.
Also, the differences frames are shown in Figures 5(g) to 5(i) and encrypted differences frames are illustrated
in Figures 5(j) to 5(l), for the red, green, and blue components.
Table 6. Comparison simulation results of correlation coefficient
Frame No.
Frame No.
Correlation coefficient of red
component
Correlation coefficient of green
component
Correlation coefficient of blue
component
Ref [14]
Proposed method
Ref [14]
Proposed method
Ref [14]
Proposed method
1
2
− 0.0065
-0.0082
− 0.0066
−0.0072
0.0020
-0.0062
2
2
1
1
1
1
1
1
2
3
− 0.00740
-0.00930
− 0.0067
− 0.0085
0.0089
0.00036
3
4
0.00022
0.00012
0.0037
− 0.00042
0.0087
0.00042
4
5
0.0014
-0.00250
0.0036
0.00031
0.00087
0.00023
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
Figure 5. Histogram components (red, green, blue) of original frame, differences frame and encrypted frame
for (original and differences frame): (a) original frame (red), (b) original frame (green), (c) original frame
(blue), (d) encrypted original frame (red), (e) encrypted original frame (green), (f) encrypted original frame
(blue), (g) differences frame (red), (h) differences frame (green), (i) differences frame (blue), (j) encrypted
differences frame (red), (k) encrypted differences frame (green), and (l) encrypted differences frame (blue)
Distribution
Distribution
Distribution
Distribution
Distribution
Distribution
Distribution
Distribution
Distribution
Distribution
Distribution
Distribution
Red value
Red value
Red value
Red value
Green value
Green value
Green value
Green value
Blue value
Blue value
Blue value
Blue value
Int J Elec & Comp Eng ISSN: 2088-8708
Novel lightweight video encryption method based on ChaCha20 stream … (Abeer Tariq Maolood)
4997
6.5. Randomness test
The randomness analysis is required in video cryptographic by measuring the entropy of each frame
at both original and encrypted video frames. From a security viewpoint, the entropy for the encrypted frame
should be close to an ideal value. Significantly, the higher values of entropy indicate results in high
randomness (statistically), and high distortion results in the encrypted frames.
 󰇛 󰇛󰇜󰇜
(3)
Where pi [0.0, 1.0] and −log pi represents the information associated with a single occurrence of pi. Using
(3) [19], entropy is found for selected frame taken from original, encrypted, and decrypted frames of the
video. The simulation results and comparison are illustrated in Table 7. From the simulation results, the
entropy values obtained are close to an ideal value of eight. Therefore, the proposed scheme provides an
encrypted video has strength against an entropy-based attack due to lower effectiveness of this type of
attackers when the data outflow is minimized.
Table 7. Simulation results and comparison of entropy (randomness)
Proposed Scheme
Ref [15]
The entropy of the original frame
7.9996
7.4541
The entropy of the encrypted frame
7.9989
7.4535
The entropy of the decrypted frame
7.9987
7.4537
6.6. Differential attacks analysis
Differential attack could be called the choice of plaintext attack, where it is utilized to measure the
influence of modification one pixel with respect to whole video frame. For this purpose, two measures
(NPCR and UACI) can be adopted to evaluate and measure the differential attack. These two measures can
be computed using mathematical formulas explained in (4) and (5) [19]:
 󰇛 󰇜

 
 (4)
 󰇛󰇜󰇛󰇜



 
 (5)
where F1(i, j) and F2(i, j) are the pixel intensity of two encrypted video frames F1 and F2 related to the
original video frames. The symbol (H) signifies the row count and (W) signifies the column count.
The D(i, j)=0 if encrypted F1(i, j)=original F1(i, j), otherwise it is equal to 1. Table 8 demonstrates
that the results of differential attack analysis for randomly chosen video frames. These results show that the
encrypted frame is 99.7% than the original video frames. Table 8 demonstrate that the results of differential
attack analysis for randomly chosen video frames. These results show that the encrypted frame is 99.7% than
the original video frames. Another type of comparison related to NPCR and UACI metrics was performed
which demonstrates the percentage of NPCR and UACI for different video samples as shown in Table 9.
Table 8. Simulation results of differential attacks
Sample frame
number
Video frame
chosen
NPCR %
UACI %
1
1
99.3
33.71
2
10
99.7
33.68
3
15
99.56
33.69
4
20
99.7
33.73
Table 9. Comparison results of NPCR and UACI metric
Test
video
Ref [28]
Ref [29]
Proposed
NPCR
UACI
NPCR
UACI
NPCR
UACI
Rhino
99.61
33.61
99.51
33.54
99.73
33.68
Flamingo
99.63
33.63
99.52
33.52
99.68
33.77
Train
99.63
33.63
99.61
33.50
99.71
33.78
VIP-train
99.61
33.60
99.58
33.62
99.75
33.67
6.7. Encryption speed time and encryption ratio analysis
In real time security applications, the encryption speed is a critical key to implement video
encryption scheme. Therefore, to increase the encryption speed of the encryption scheme, encryption ratio
should be minimized. Encryption ratio denoted as the ratio between the size of the encrypted frame and the
original frame size. Achieving the equilibrium between the strength of encryption and encryption speed by
completely encrypting the entire video frame and increases the encryption speed as well as adopting the differences
of video frames technique which proposed in this work as illustrated in pre-processing phase of this work.
The proposed scheme significantly reduces the time of encryption and decryption the whole video
by eliminating the similar information between the sequences frames making it suitable for real time video
ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 5, October 2022: 4988-5000
4998
encryption. In Tables 10 and 11, we have stated a comparison result related to consuming time of the
proposed scheme against literature research works. Obviously, the obtained results demonstrate that the
proposed video encryption scheme has less time consuming and faster compared to video encryption schemes
listed in in literature. It is owing to; our encryption scheme is based essentially on encryption the data
differences between sequences frames in video instead of encryption the whole video frames.
Table 10. A comparison results of encryption speed time (in frame/seconds) for randomly selected frames
Test video
Ref [30] 8D
Ref [30] 12D
Ref [30] IKeda
Ref [29]
Proposed scheme
Rhino
0.9124
1.7964
1.2147
0.5403
0.2311
Flamingo
0.8062
0.8402
1.1124
0.5982
0.2503
Train
0.8631
1.6493
0.9908
0.5178
0.1926
VIP-train
1.0588
2.3137
1.3574
0.4723
0.16821
Table 11. A comparison results of encryption time (second) per frame
Test video
Ref [29] (Time (second))
Proposed (Time (second))
Grandma
0.2927
0.0341
Akiyo
0.2994
0.0344
Foreman
0.3847
0.0427
6.8. Computational complexity of the proposed lightweight encryption scheme
This section discusses the computational complexity of the proposed lightweight encryption scheme.
Encryption and decryption of whole video frame is a one of the big problems to applied real time
cryptographic scheme at different video types. The proposed scheme in this paper contribute to mitigate this
problem by reduces the computational complexity of encryption scheme based on reduces the number of total
data points for each video frame through adopting the frame differences technique. This technique led to make
computational complexity of the cryptographic scheme is a light weight. Finally, the proposed encryption
scheme present reduces the computational complexity of encryption and improves the encryption speed.
7. CONCLUSION
In this paper, we have proposed, presented, and investigated a new light weight stream cipher
scheme of video frames based on hybrid chaotic system and ChaCha20 algorithm. A lightweight encryption
scheme-based permutation process is employed to scramble video frames contents using chaotic system-
model 1. We have used chaotic system for permutation task due to its robustness, randomness, and it is faster
than traditional scheme for stream ciphers. Thus, the chaos system was utilized to generate encryption keys at
the lightweight encryption phase and to generate the seed keys of ChaCha20 encryption algorithm. In
addition, to provide a larger key space, 2D chaotic systems have been employed to generate the secret keys
for two encryption phases of the proposed video encryption scheme. The permutation process associated with
the proposed encryption scheme is contributed to scramble the frame pixels based on chaos key streams to
provide the randomness distribution of the pixels’ positions. Our experimental results of UACI and NPCR
metrics have been shown that any small changes in the original video frame can be spread overall pixels in
the cipher video frame. The ChaCha20 stream cipher algorithm is implemented with 20 rounds (maximum
secure) in order to produces high quality, lightest and significant performance improvements of encryption
scheme. The ChaCha20 combined with chaos maps are utilized to provide robust video encryption scheme to send
public and private videos on unsecure communication network.
Further, we have presented a new technique for the purpose of encryption video contents through
exploiting the difference criteria between each sequences frames in order to minimize the computation time,
getting minimal correlation coefficient as well as obtaining image histogram with uniformly distribution. As
we shown in the experiments, the proposed method is more robust against the statistical attacks. Further, the
results of histograms and correlation coefficients proved that the proposed encryption scheme is resistance
against statistical attacks. Finally, the advantages of the proposed scheme have been highlighted by
comparing it against different state-of-the-arts methods from literature. Based on the acquired comparative
Int J Elec & Comp Eng ISSN: 2088-8708
Novel lightweight video encryption method based on ChaCha20 stream … (Abeer Tariq Maolood)
4999
performance results, the proposed scheme is obviously has extra efficacious in term of entropy, correlation
coefficients, NPCR and UACI metrics and encryption time(s). The suggested future works are implementing
the proposed encryption and decryption scheme using FPGA technique. Also, apply the proposed scheme in
this paper on the high quality 4k format for both image and video frames. Finally, the region of interest
extraction (ROI) will be utilized to implements the proposed scheme in order to reduce the important data
points of video frames. This leads to reduce the computation time and the computational complexity of video
encryption scheme, as well as making the encrypted video is very adequate for real time applications.
ACKNOWLEDGEMENTS
This article is supported by University of Technology/Computer Science Department, Baghdad, Iraq.
REFERENCES
[1] M. S. Azzaz, C. Tanougast, S. Sadoudi, and A. Bouridane, “Synchronized hybrid chaotic generators: Application to real-time
wireless speech encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 20352047,
Aug. 2013, doi: 10.1016/j.cnsns.2012.12.018.
[2] A. Hasheminejad and M. J. Rostami, “A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic
map,” Optik, vol. 184, pp. 205213, May 2019, doi: 10.1016/j.ijleo.2019.03.065.
[3] J. Yu, S. Guo, X. Song, Y. Xie, and E. Wang, “Image parallel encryption technology based on sequence generator and chaotic
measurement matrix,” Entropy, vol. 22, no. 1, pp. 7681, Jan. 2020, doi: 10.3390/e22010076.
[4] B. Yousif, F. Khalifa, A. Makram, and A. Takieldeen, “A novel image encryption/decryption scheme based on integrating
multiple chaotic maps,” AIP Advances, vol. 10, no. 7, Jul. 2020, doi: 10.1063/5.0009225.
[5] M. A. Murillo-Escobar, M. O. Meranza-Castillón, R. M. López-Gutiérrez, and C. Cruz-Hernández, “A chaoticencryption
algorithm for image privacy based on two pseudorandomly enhanced logistic maps,” in Multimedia Security Using Chaotic Maps:
Principles and Methodologies, Springer:, Germany, 2020, pp. 111136.
[6] M. Suneel, “Cryptographic pseudo-random sequences from the chaotic henon map,” Indian Academy of Sciences, vol. 34, no. 5,
pp. 689701, Apr. 2006.
[7] M. García-Martínez and E. Campos-Cantón, “Pseudo-random bit generator based on multi-modal maps,” Nonlinear Dynamics,
vol. 82, no. 4, pp. 21192131, Dec. 2015, doi: 10.1007/s11071-015-2303-y.
[8] F. A. Elizalde-Canales, I. D. J. Rivas-Cambero, L. F. Rebolledo-Herrera, and C. J. Camacho-Bello, “Pseudo-random bit generator
using chaotic seed for cryptographic algorithm in data protection of electric power consumption,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 2, pp. 13991409, Apr. 2019, doi: 10.11591/ijece.v9i2.pp1399-1409.
[9] M. Goll and S. Gueron, “Vectorization on ChaCha stream cipher,” in 2014 11th International Conference on Information
Technology: New Generations, Apr. 2014, pp. 612615, doi: 10.1109/ITNG.2014.33.
[10] L. E. Kane, J. J. Chen, R. Thomas, V. Liu, and M. Mckague, “Security and performance in IoT: A balancing Act,” IEEE Access,
vol. 8, pp. 121969121986, 2020, doi: 10.1109/ACCESS.2020.3007536.
[11] P. McLaren, W. J. Buchanan, G. Russell, and Z. Tan, “Deriving ChaCha20 key streams from targeted memory analysis,” Journal
of Information Security and Applications, vol. 48, Oct. 2019, doi: 10.1016/j.jisa.2019.102372.
[12] R. Velea, F. Gurzau, L. Margarit, I. Bica, and V.-V. Patriciu, “Performance of parallel ChaCha20 stream cipher,” in 2016 IEEE
11th International Symposium on Applied Computational Intelligence and Informatics (SACI), May 2016, pp. 391396, doi:
10.1109/SACI.2016.7507408.
[13] H. Schwarz, D. Marpe, and T. Wiegand, “Overview of the scalable video coding extension of the H.264/AVC standard,” IEEE
Transactions on Circuits and Systems for Video Technology, vol. 17, no. 9, pp. 11031120, Sep. 2007, doi:
10.1109/TCSVT.2007.905532.
[14] L. S. Lian, Multimedia content encryption: techniques and applications. New York, NY, USA: Auerbach Publications, 2008.
[15] F. Sbiaa, S. Kotel, M. Zeghid, R. Tourki, M. Machhout, and A. Baganne, “A selective encryption scheme with multiple security
levels for the H.264/AVC video coding standard,” in 2016 IEEE International Conference on Computer and Information
Technology (CIT), Dec. 2016, pp. 391398, doi: 10.1109/CIT.2016.53.
[16] J. S. Bowade, P. Khade, Raghuwansh, and D. M. M., “Technique of video encryption/scrambling using chaotic functions and
analysis,” Journal of Emerging Technologies and Innovative Research (JETIR), vol. 2, no. 6, pp. 19511958.
[17] S. Lian, J. Sun, J. Wang, and Z. Wang, “A chaotic stream cipher and the usage in video protection,” Chaos, Solitons & Fractals,
vol. 34, no. 3, pp. 851859, Nov. 2007, doi: 10.1016/j.chaos.2006.03.120.
[18] B. Jovanović and S. Gajin, “An efficient mechanism of cryptographic synchronization within selectively encrypted H.265/HEVC
video stream,” Multimedia Tools and Applications, vol. 77, no. 2, pp. 15371553, Jan. 2018, doi: 10.1007/s11042-017-4389-3.
[19] R. Malladar and R. Sanjeev Kunte, “Selective video encryption based onentropy measure,” in Integrated Intelligent Computing,
Communication and Security, 2019, pp. 603612.
[20] S. Cheng, L. Wang, N. Ao, and Q. Han, “A selective video encryption scheme based on coding characteristics,” Symmetry,
vol. 12, no. 3, pp. 332348, Feb. 2020, doi: 10.3390/sym12030332.
[21] Z. Lin, S. Yu, J. Lu, S. Cai, and G. Chen, “Design and ARM-embedded implementation of a chaotic map-based real-time secure
video communication system,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 7, pp. 12031216,
Jul. 2015, doi: 10.1109/TCSVT.2014.2369711.
[22] A. Alfalou, C. Brosseau, and N. Abdallah, “Simultaneous compression and encryption of color video imag es,” Optics
Communications, vol. 338, pp. 371379, Mar. 2015, doi: 10.1016/j.optcom.2014.10.020.
[23] J. Chen and F. Peng, “A perceptual encryption scheme for HEVC video with lossless compression,” International Journal of
Digital Crime and Forensics, vol. 10, no. 1, pp. 6778, Jan. 2018, doi: 10.4018/IJDCF.2018010106.
[24] H. Elkamchouchi, W. M. Salama, and Y. Abouelseoud, “New video encryption schemes based on chaotic maps,” IET Image
Processing, vol. 14, no. 2, pp. 397406, Feb. 2020, doi: 10.1049/iet-ipr.2018.5250.
[25] M. Eid, E.-S. M. El-kenawy, and A. Ibrahim, “A fast real-time video encryption/decryption technique based on hybrid chaotic
maps,” Journal of Computer Science and Information Systems, vol. 2, no. 2, pp. 18.
[26] F. Yan, A. M. Iliyasu, S. E. Venegas-Andraca, and H. Yang, “Video encryption and decryption on quantum computers,”
ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 5, October 2022: 4988-5000
5000
International Journal of Theoretical Physics, vol. 54, no. 8, pp. 28932904, Aug. 2015, doi: 10.1007/s10773-015-2524-3.
[27] S. Keshav and A. B. Deshmukh, “Video frame encryption algorithm using AES,” International Journal of Engineering Research
& Technology (IJERT), vol. 5, no. 6, pp. 588591, 2016.
[28] I. Yasser, M. A. Mohamed, A. S. Samra, and F. Khalifa, “A chaotic-based encryption/decryption framework for secure
multimedia communications,” Entropy, vol. 22, no. 11, pp. 12531276, Nov. 2020, doi: 10.3390/e22111253.
[29] R. Ranjith kumar, D. Ganeshkumar, A. Suresh, and K. Manigandan, “A new one round video encryption scheme based on 1D
chaotic maps,” in 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Mar. 2019,
pp. 439444, doi: 10.1109/ICACCS.2019.8728443.
[30] D. Valli and K. Ganesan, “Chaos based video encryption using maps and Ikeda time delay system,” The European Physical
Journal Plus, vol. 132, no. 12, p. 542, Dec. 2017, doi: 10.1140/epjp/i2017-11819-7.
[31] L. Duan, D. Zhang, F. Xu, and G. Cui, “A novel video encryption method based on faster R -CNN,” in Proceedings of the 2018
International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018), 2018, pp. 100104,
doi: 10.2991/csece-18.2018.21.
[32] G. Aceto, D. Ciuonzo, A. Montieri, and A. Pescape, “Mobile encrypted traffic classification using deep learning: Experimental
evaluation, lessons learned, and challenges,” IEEE Transactions on Network and Service Management, vol. 16, no. 2,
pp. 445458, Jun. 2019, doi: 10.1109/TNSM.2019.2899085.
[33] G. Aceto, D. Ciuonzo, A. Montieri, and A. Pescapé, “Multi-classification approaches for classifying mobile app traffic,” Journal
of Network and Computer Applications, vol. 103, pp. 131145, Feb. 2018, doi: 10.1016/j.jnca.2017.11.007.
[34] G. Aceto, G. Bovenzi, D. Ciuonzo, A. Montieri, V. Persico, and A. Pescape, “Characterization and prediction of mobile-app
traffic using markov modeling,” IEEE Transactions on Network and Service Management, vol. 18, no. 1, pp. 907925, Mar.
2021, doi: 10.1109/TNSM.2021.3051381.
[35] G. Aceto, D. Ciuonzo, A. Montieri, V. Persico, and A. Pescape, “MIRAGE: Mobile-app traffic capture and ground-truth
creation,” in 2019 4th International Conference on Computing, Communications and Security (ICCCS), Oct. 2019, pp. 18, doi:
10.1109/CCCS.2019.8888137.
[36] S. A. Mahmood, K. A. Hussein, Y. N. Jurn, and E. A. Albahrani, “Parallelizable cipher of color image based on two-dimensional
chaotic system,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 1, pp. 101111, Apr. 2020,
doi: 10.11591/ijeecs.v18.i1.pp101-111.
[37] Y. Liu, J. Zhang, D. Han, P. Wu, Y. Sun, and Y. S. Moon, “A multidimensional chaotic image encryption algorithm based on the
region of interest,” Multimedia Tools and Applications, vol. 79, no. 2526, pp. 1766917705, Jul. 2020, doi: 10.1007/s11042-020-
08645-8.
BIOGRAPHIES OF AUTHORS
Abeer Tariq Maolood received the M.Sc. and Ph.D. in Computer Science
from University of Technology, Iraq, 2005 and 2010, respectively. She has around 15 years
of teaching experience. Her areas of interests are computer and network security,
neural networks, and web applications security. She can be contacted at email:
abeer.t.maolood@uotechnology.edu.iq
Ekhlas Khalaf Gbashi earned her Ph.D. in networks security from the
Department of computer sciences at the Technology University. Ekhlas earned her bachelor’s
and master’s degree in computer sciences from the University of Technology (UOT),
Baghdad, Iraq in 1998, 2005. Ekhlas is a faculty member in the computer sciences Department
at the University of Technology (UOT) since 2000; where she became a Head of computer
security Branch at the UOT from 2016 until 2020. Her research interested focus on in
networks security (intrusion detection system), data security, computer networks, comparative
education and computer architecture, image processing and artificial intelligence (AI). She can
be contacted at email: Ekhlas.K.Gbashi@uotechnology.edu.iq
Eman Shakir Mahmood received the MSc. in Computer Science from
University of Technology, Iraq, 2006. She has around 14 years of teaching experience. Her
areas of interest's Image processing, operating system, computer security and web applications
security. She can be contacted at email: 110036@uotechnology.edu.iq
... In the realm of quantum encryption, Song et al. proposed a scheme based on qubit-planes and an improved logistic map, enhancing encryption strength [10]. Maolood et al. introduced a lightweight stream video encryption scheme combining chaotic maps and the ChaCha20 algorithm, achieving heightened security with reduced computation time [11]. Nevertheless, further analysis is needed regarding performance against noise and data loss attacks. ...
... It marginally deviates from the results reported in Refs. [4,11,16,17]. A primary advantage of our approach is its capability to generate encrypted videos with exceptionally low correlation coefficients. ...
... [4,7] for NPCR and Refs. [6,8,11] for UACI. Significantly, our encryption scheme boasts a larger key space and heightened key sensitivity relative to existing literature. ...
Article
Full-text available
Simulations are commonly used to develop and evaluate video encryption algorithms. Although these approaches are useful for demonstrating theoretical feasibility and algorithm performance, they neglect practical challenges and real-world communication conditions. This oversight creates a critical gap in evaluating their effectiveness and security in practical applications. In this paper, we describe a novel, to the best of our knowledge, video encryption scheme that employs a modified chaotic Colpitts oscillator, a customized Josephus problem, and ribonucleic acid (RNA) operations, and is implemented in visible light communication (VLC) environment. The modified Colpitts oscillator reveals significant phenomena, the most prominent for this study being chaos. The encryption scheme involves block scrambling and pixel-level permutation employing a customized Josephus problem and a column and row shifting technique. Diffusion is then achieved through a custom Josephus problem-oriented RNA operation combined with basic RNA operations and cipher block chaining (CBC). Based on the results, we found that the customized Josephus problem-based permutation performed more efficiently than traditional methods, whereas the column and row shifting permutation was more robust. By eliminating key sequence coding and item-to-item operations, the proposed RNA operation reduces computational overhead. This video encryption scheme is proven to be effective and resilient at securing video data transmitted over the VLC channel, and it constitutes a significant advancement in areas such as surveillance, medical imaging, and military communication requiring robust secured video data.
... Expanding the critical space makes it more resistant to brute-force attacks. The article by [39] integrated the ChaCha20 stream cipher and a hybrid chaotic map to secure video data. The technique reduces computation time and data required, enhancing the encryption efficiency. ...
... Robust security, not fully assessed for all attacks [37] Stream cipher 3D logistic map combined with network-centric encryption Efficient encryption/decryption for images [38] Stream cipher TD-ERCS and non-linear chaotic algorithm Shorter duration, real-time audiovisual applications [39] Stream cipher ChaCha20 with a hybrid chaotic map Reduced computation time, efficient for video data [44] Block cipher Highly optimized encryption and lightweight encryption algorithm block ciphers with feisty structures. ...
... The core of a discrete chaos-based pseudo-random number generator is usually a chaotic map (or mapping) in the form of the finite-difference equation. Many implementations of encryption schemes based on chaotic maps are known from literature (Elkamchouchi et al. 2020;Maolood et al. 2022;Sethi et al. 2022; Kanso et al. 2022;Alghamdi et al. 2022). There are two key methods commonly used in image encryption algorithms -confusion and diffusion. ...
Article
Full-text available
The security of sensitive data is a crucial issue in the information age. While the existing encryption protocols cannot always guarantee the required level of security due to the rapidly increasing computational capability of attackers, developing new cryptographically strong encryption techniques is of great importance in modern computer science. One of the advanced approaches in the field of cryptography is chaos-based encryption. In this study, we propose an efficient algorithm for arbitrary multimedia data encryption using the novel finite-difference scheme with adaptive symmetry based on the Gingerbreadman chaotic map. In the experimental part of the study, we use several analysis techniques to prove the presence of chaos in the dynamics of the reported discrete map and investigate the dependence between system dynamics and symmetry coefficient. Parametric chaotic sets and the largest Lyapunov exponent plots are given to evaluate the dynamics of the investigated finite-difference model. NIST statistical tests were applied to assess the properties of the developed pseudo-random numbers generator, and correlation analysis was performed to evaluate the secrecy of the encrypted image. It is experimentally shown, that varying the symmetry coefficient can significantly increase the keyspace for the encryption algorithm based on the symmetric Gingerbreadman map. The results of this study can be used to develop encryption software, including secure text messengers or stream data ciphers.
... Chaotic maps find applications in various domains of information security, including stream ciphers [21,22], block ciphers [23,24], hashing [25,26], steganography, and digital watermarking [27][28][29][30]. Consequently, a wide range of chaotic maps is available for generating pseudo-random numbers, with the logistic map being a popular choice among researchers due to its extensive exploration. ...
Article
Full-text available
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numbers, including issues related to speed, randomness, lack of statistical properties, and lack of uniformity. Therefore, this paper introduces an efficient pseudo-random number generator, called State-Based Tent-Map (SBTM), based on a modified Tent-Map, which addresses this and other limitations by providing highly robust sequences suitable for cryptographic applications. The proposed generator is specifically designed to generate sequences with exceptional statistical properties and a high degree of security. It utilizes a modified 1D chaotic Tent-Map with enhanced attributes to produce the chaotic sequences. Rigorous randomness testing using the Dieharder test suite confirmed the promising results of the generated keystream bits. The comprehensive evaluation demonstrated that approximately 97.4% of the tests passed successfully, providing further evidence of the SBTM’s capability to produce sequences with sufficient randomness and statistical properties.
... The sender encrypts the plaintext using key 'K' and transmits the resulting ciphertext to the receiver. Subsequently, the receiver decrypts the cipher data using the identical key 'K', restoring it to its original form [7,8]. Maintaining the secrecy of the key is crucial, ensuring its exclusive exchange through a secure channel between the sender and the receiver [9]. There are many symmetric encryption algorithms, such as: ...
Article
Full-text available
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust enough to safeguard resource-constrained environments. This paper presents a new method of making long symmetric keys for lightweight algorithms. A pre-trained convolutional neural network (CNN) model called visual geometry group 16 (VGG16) is used to take features from two images, turn them into binary strings, make the two strings equal by cutting them down to the length of the shorter string, and then use XOR to make a symmetric key from the binary strings from the two images. The key length depends on the number of features in the two images. Compared to other lightweight algorithms, we found that this method greatly decreases the time required to generate a symmetric key and improves defense against brute force attacks by creating exceptionally long keys. The method successfully passed all 15 tests when evaluated using the NIST SP 800-22 statistical test suite and all Basic Five Statistical Tests. To the best of our knowledge, this is the first research to explore the generation of a symmetric encryption key using a pre-trained VGG16 model.
... The differential branch number (DBN) of an S-Box [20] is defined as ...
Article
Full-text available
In lightweight cryptography, the absence of an S-Box in some algorithms like speck, Tiny Encryption Algorithm, or the presence of a fixed S-Box in others like Advanced Encryption Standard can make them more vulnerable to attacks. This study introduces an innovative method for creating a dynamic 6-bit S-Box (8 × 8) in octal format. The generating process of S-Box passes through two phases. The first is the number initialization phase. This phase involves generating sequence numbers 1, sequence numbers 2, and sequence numbers 3 depending on X i , Y i , and Z i values generated using the 3D Hindmarsh Rose model. The second is the S-Box construction phase. This phase involves building S-Box values depending on sequence numbers 1, sequence numbers 2, and sequence numbers 3, which resulted from the number initialization phase. The effectiveness of the proposed S-Box was evaluated through various criteria, including the bijective property, balanced, fixed points, opposite fixed points, completeness criteria, avalanche criteria, and strict avalanche criteria. It was observed that S-Box achieved a linear and differential branch number of 3, non-linearity of 24, differential uniformity of 4, and algebraic degree of 3. In addition, reducing the number of linear and nonlinear operations makes it suitable for lightweight algorithms. The architecture of the proposed S-Box demonstrates robustness, with a total of 1.98 × 10 87 possible S-Boxes against algebraic attacks. Moreover, the construction of the S-Box and its inverse take only 14.3542 milliseconds, making it suitable for use in many lightweight block ciphers. The new S-Box is the first to exhibit these characteristics.
Article
In this paper, a high‐performance and area‐efficient hardware structure of the ChaCha20 stream cipher is presented. The most complex operation in the ChaCha20 stream cipher is addition modulo 2 ³² . The addition is used in the round function computations and the addition of the last round result and initial state. We use the proposed sparse parallel prefix adder for the implementation of addition modulo 2 ³² , which has a low critical path delay. In the proposed structure, to reduce area consumption, we use resource sharing with minimum hardware. To increase throughput and speed, the four registers are used with two main tasks including the storing intermediate results of the round function and the break critical path delay for the pipeline of the structure. Also, based on the used registers in the structure, the computations of the last clock cycle of the previous round function and the first clock cycle from the next round function are computed concurrently. Implementation results such as delay, computation time, area, and throughput of the proposed structure in 180 nm CMOS technology and FPGA implementation on the device Xilinx Virtex‐7 XC7VX485T are achieved. The achieved results show that the design has better hardware and timing properties compared with other works.
Article
Full-text available
Protection of video content has become a vital part of communication and the multimedia world. Cryptographic techniques are used to complete a particular safety and security level, stability and discretion to avoid unauthorized accessibility. In this paper, a colour video encryption/decryption method is recommended based on hybrid chaotic maps. A Video scrambling is to split the file into several I-frames, then shuffle the frames and confuse and diffuse the frame content. Hence, based on the proposed technique, a quick video encryption/decryption formula is recommended. In this algorithm, the confusion and diffusion procedures are integrated to get a secure and efficient approach. The proposed method changes the video pixel settings efficiently, and also the contents of the frame alternatives are put on rush the pixel worths simultaneously. The simulation and evaluation results show that this algorithm has high robustness and security, low elapsed time, and the ability to resist analytical attacks, differential, brute-force, known-plaintext, as well as chosen-plaintext attacks.
Article
Full-text available
Modeling network traffic is an endeavor actively carried on since early digital communications, supporting a number of practical applications, that range from network planning and provisioning to security. Accordingly, many theoretical and empirical approaches have been proposed in this long-standing research, most notably, Machine Learning (ML) ones. Indeed, recent interest from network equipment vendors is sparking around the evaluation of solid information-theoretical modeling approaches complementary to ML ones, especially applied to new network traffic profiles stemming from the massive diffusion of mobile apps. To cater to these needs, we analyze mobile-app traffic available in the public dataset MIRAGE-2019 adopting two related modeling approaches based on the well-known methodological toolset of Markov models (namely, Markov Chains and Hidden Markov Models). We propose a novel heuristic to reconstruct application-layer messages in the common case of encrypted traffic. We discuss and experimentally evaluate the suitability of the provided modeling approaches for different tasks: characterization of network traffic (at different granularities, such as application, application category, and application version), and prediction of network traffic at both packet and message level. We also compare the results with several ML approaches, showing performance comparable to a state-of-theart ML predictor (Random Forest Regressor). Also, with this work we provide a viable and theoretically sound traffic-analysis toolset to help improving ML evaluation (and possibly its design), and a sensible and interpretable baseline.
Article
Full-text available
Chaos-based encryption has shown an increasingly important and dominant role in modern multimedia cryptography compared with traditional algorithms. This work proposes novel chaotic-based multimedia encryption schemes utilizing 2D alteration models for high secure data transmission. A novel perturbation-based data encryption for both confusion and diffusion rounds is proposed. Our chaotification structure is hybrid, in which multiple maps are combined combines for media encryption. Blended chaotic maps are used to generate the control parameters for the permutation (shuffling) and diffusion (substitution) structures. The proposed schemes not only maintain great encryption quality reproduced by chaotic, but also possess other advantages, including key sensitivity and low residual clarity. Extensive security and differential analyses documented that the proposed schemes are efficient for secure multimedia transmission as well as the encrypted media possesses resistance to attacks. Additionally, statistical evaluations using well-known metrics for specific media types, show that proposed encryption schemes can acquire low residual intelligibility with excessive nice recovered statistics. Finally, the advantages of the proposed schemes have been highlighted by comparing it against different state-of-the-art algorithms from literature. The comparative performance results documented that our schemes are extra efficacious than their data-specific counterpart methods.
Article
Full-text available
In this paper, a novel framework is presented for chaotic image encryption. The proposed method is based on integrating multiple chaotic maps (e.g., Logistic, Tent, Quadratic, Cubic and Bernoulli maps) to generate more robust chaotic maps, in order to increase the security and privacy needed by applying variable keys. The latter are generated by computing sine square logistic map and are then applied to generate the chaotic maps employed in our framework. For this we have done many experiments to achieve the best period for each chaotic map in which it performed the best encryption. Here, we combine a multiple chaotic maps to get a new map that works well when X [0, 1]. Given our use more of a chaotic map in the encryption process, it was necessary to find a way to choose the best of those chaotic maps for encryption. This selection, is done with the lowest value for the correlation factor, because the smaller value of correlation has an impression of good encryption. That because we have noticed a clear difference in the influence of one of these maps on some pictures from the others. Numerical results on various gray images showed the robustness of the proposed method to encrypt and decrypt the images based on the evaluation using different performance analysis. We compared our methods against other well-known approaches, e.g., Circular mapping, S-boxes and S-box with Arnold Transform. Our pipeline outperforms those methods Moreover and our results from documented that the proposed scheme has an excellent security level with every low correlation coefficients and good information Entropy.
Article
Full-text available
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, performance of these low powered devices, as well as security is of utmost importance. Managing security and performance is a balancing act. Achieving this balance will always continue to be a challenge. This research presents two main contributions to this area. The first contribution is a framework to measure cryptographic performance of IoT devices. The areas of measurement are power consumption, time cost, energy cost, random access memory (RAM) usage and flash usage. The second contribution is an insightful comparison of the performance of the ATmega328, STM32F103C8T6 and ESP8266 low powered microcontroller devices. Experiments were conducted on these devices running various cryptographic operations. The measured operations are from three encryption algorithms: Advanced Encryption Standard (AES), ChaCha and Acorn. The proposed methods from this research are real-world in nature rather than simulated, and can be used by others wishing to conduct their own IoT performance testing. The results show that the ATmega328 has the lowest overall power consumption. The ESP8266 was generally the fastest performing device. ChaCha outperformed AES in both time cost and energy cost. Both algorithms outperformed Acorn in these metrics. The STM32F103C8T6 device displayed the best overall energy cost, while still performing well in terms of time. The results from the experiments conducted in this study can be used by network designers, developers and others to make appropriate decisions in IoT deployments with regards to balancing performance and security.
Article
Full-text available
The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information. We propose an encryption scheme that can protect video information with higher security by combining the video coding algorithm with encryption algorithm. The H.264/AVC encoding algorithm encodes the video into multiple slices, and the slices are independent of each other. With this feature, we encrypt each slice while using the cipher feedback (CFB) mode of the advanced encryption standard (AES) with the dynamic key. The key is generated by the pseudo-random number generator (PRNG) and updated in real time. The encryption scheme goes through three phases: constructing plaintext, encrypting plaintext, and replacing the original bitstream. In our scheme, we encrypt the code stream after encoding, so it does not affect the coding efficiency. The purpose of the CFB mode while using the AES encryption algorithm is to maintain the exact same bit rate and produce a format compatible bitstream. This paper proposes a new four-dimensional (4-D) hyperchaotic algorithm to protect data privacy in order to further improve the security of video encryption. Symmetric encryption requires that the same key is used for encryption and decoding. In this paper, the symmetry method is used to protect the privacy of video data due to the large amount of video encrypted data. In the experiment, we evaluated the proposed algorithm while using different reference video sequences containing motion, texture, and objects.
Article
Full-text available
Most image encryption algorithms encrypt the whole image, but only part of the data is important in the image. In this paper, we propose a multidimensional chaotic image encryption algorithm based on the region of interest (ROI). The histogram of oriented gradients (HOG) feature extraction and support vector machine (SVM) are used to separate the region of interest from the whole image. Then, the region of interest pixels is messed up by using the improved Henon sequence, Joseph sequence and the region of interest pixels are diffused by using the unified chaotic sequence to hide the sensitive information in the image, so as to achieve the purpose of private protection. Furthermore, the improved logistic sequence is used to hide the edge information of the target image to achieve the tradeoff between the secrecy of information and the complexity of encryption. A series of analyses are carried out including key space analysis, key sensitivity analysis, statistical analysis, information entropy analysis, analysis of the fixed-point obscuration analysis, quality analysis and image decryption for our encryption algorithm. Through experiments and comparisons, the proposed algorithm has good performance in encrypting image and coping with various invasions. The image encryption algorithm based on ROI has a good performance of security, moreover through the main encryption of ROI can effectively shorten the encryption time, so as to achieve the compromise of security and computational complexity.
Article
Full-text available
This paper aims to present a parallel implementation based color image encryption using non -linear chaotic system. The adopted chaotic system was suggested and approved in our previous work [1] which generates key streams with chaotic behavior. In this paper, pixel level permutation algorithm based on chaotic map generation is investigated and analyzed. The encryption–decryption schemes are achieved in parallel and composed of three main phases: chaotic keys generation, pixel-level permutation and bit-level diffusion phase. Both permutation and diffusion processes are achieved according to the chaotic keys. The parallel implementation of the proposed image encryption system is realized and inspired with parallel computing library offered by Matlab 2018, which equips highly performance than the pipeline ones and would be helpful to utilize in image encryption/decryption for real time application. Security and statistical analysis in addition to the main differential attacks analysis are specified to evaluate the performance of the proposed image encryption algorithm with parallel implementation. From the experimental results, the output image of the encryption task shows a higher randomness of the encrypted image which can be effectively resistant to attacker. Furthermore, the run time of encryption process is faster than other research works.
Chapter
Chaos-based cryptography has become in an interesting research topic in secure communications during last years, since chaos is strongly related with cryptography to design fast and secure cryptosystems for bulk and correlated data such as digital images. On the other hand, improve randomness of chaotic stream is desirable to enhance the security of the encryption, since such stream is used as main source for diffusion and confusion process in a cryptosystem. In this chapter, we introduce a chaotic encryption algorithm by using two pseudorandomly enhanced logistic maps (PELM) for color RGB image privacy. Experimental results with computer simulations at MATLAB are realized to validate the effectiveness, security, and performance of proposed scheme. Based on results, the propose RGB image cryptosystem is secure and speed to be used in applications such as in biometric systems, telemedicine, or satelital image in military affairs.