Proceedings of 2nd International Conference on Computer Vision & Image Processing pp 51-62 | Cite as
GUESS: Genetic Uses in Video Encryption with Secret Sharing
Abstract
Nowadays, video security systems are essential for supervision everywhere, for example video conference, WhatsApp, ATM, airport, railway station, and other crowded places. In multi-view video systems, various cameras are producing a huge amount of video content which makes it difficult for fast browsing and securing the information. Due to advancement in networking, digital cameras, and media, interactive sites, the importance of privacy and security is rapidly increasing. Hence, nowadays the security of digital videos become an emerging research area in the multimedia domain; especially when the communication happens over the Internet. Cryptography is an essential practice to protect the information in this digital world. Standard encryption techniques like AES/DES are not optimal and efficient in case of videos. Therefore, a technique is immediately required, which can provide the security to video content. In this paper, we address the video security-related issues and their solutions. An optimized version of the genetic algorithm is employed to solve the aforementioned issues through modeling the simplified version of genetic processes. It is used to generate a frame sequence such that the correlation between any two frames is minimized. The frame sequence determines the randomization in order of frames of a video. The proposed method is not only fast but also more accurate to enhance the efficiency of an encryption process.
Keywords
Video encryption Genetic algorithm Secret sharingReferences
- 1.K., Krishan, et al. “Eratosthenes sieve based key-frame extraction technique for event summarization in videos.” MTAP (2017), pp. 1–22.Google Scholar
- 2.Kelahmetoglu, et al., Efficient utility of WhatsApp: from computer screen to the surgeon’s hand to determine maxillofacial traumas, JCS, 26, 4, (2015), pp. 1437.Google Scholar
- 3.G. A. Spanos, et al., Performance Study of a Selective Encryption Scheme for the Security of Networked Real-Time Video, ICCCN, (1995), pp. 2–10.Google Scholar
- 4.K., Kumar, et al., Equal Partition based Clustering approach for Event Summarization in Videos, SITIS’16, 2016, pp. 119–126.Google Scholar
- 5.K., Sridhar, et al., System method and article of manufacture with integrated video conferencing billing in a communication system architecture, U.S. Patent No. 5,867,494. (1999).Google Scholar
- 6.M., Sari, What Up with WhatsApp, TABJ, (2014), pp. 28.Google Scholar
- 7.A., Mohamed, et al., An overview of video encryption techniques, IJCTE, 2, 1, (2010), pp. 103–110.Google Scholar
- 8.W., Chung, et al., Fast encryption methods for audiovisual data confidentiality, ITISOP, 2001.Google Scholar
- 9.C., Shi, et al., A fast MPEG video encryption algorithm, ACM ICM’98.Google Scholar
- 10.M., Gough, Video conferencing over IP: Configure, secure, and troubleshoot, Elsevier, (2006).Google Scholar
- 11.A. Senior et al., Enabling video privacy through computer vision, IEEE Security & Privacy, 3, 3, (2005), pp. 50-57.Google Scholar
- 12.W. Zhang, S. S. Cheung and Minghua Chen, Hiding privacy information in video surveillance system, IEEE ICIP, (2005), pp. 868–871.Google Scholar
- 13.G.R. Blakley, Safeguarding Cryptographic Keys, Proc. Am. Federation of Information Processing Soc, 48, (1979), pp. 313-317.Google Scholar
- 14.A. Shamir, How to Share a Secret, Comm. ACM, 22, 11, (1979), pp. 612–613.Google Scholar
- 15.S. J., Gustavus, Symmetric and asymmetric encryption, ACM Computing Surveys (CSUR) 11, 4, (1979), pp. 305-330.Google Scholar
- 16.L., Wei, Using genetic algorithm for network intrusion detection, Proceedings of the United States Department of Energy Cyber Security Group, 1, (2004), pp. 1–8.Google Scholar
- 17.A. Kumar, N. Rajpal, Application of Genetic Algorithm in the Field of Steganography, Journal of Information Technology, 2, 1, (2004), pp. 12-15.Google Scholar
- 18.A. Kumar, et al., New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms, NCC’05, IIT Kharagpur (2005) pp. 579–583.Google Scholar
- 19.A. Soni, et al., Key Gen. Using Genetic Algorithm for Image Encryption, (2013).Google Scholar
- 20.L., Qiao, et al., A new algorithm for MPEG video encryption, ICISST, 1997.Google Scholar
- 21.A. Tragha, et al., ICIGA: Improved Cryptography Inspired by Genetic Algorithms, ICHIT’06, (2006).Google Scholar
- 22.S. Wang, et al., A secure steganography method based on genetic algorithm, JIHMSP, 1, 1, (2010), pp. 28–35.Google Scholar
- 23.Hasso, et al., Steganography in Video Files, IJCSI, 13, 1, (2016), pp. 32.Google Scholar
- 24.K. Krishan, et al., Event BAGGING: A novel event summarization approach in multi-view surveillance videos, IEEE IESC’17, 2017.Google Scholar
- 25.K. Kumar, et al., “SOMES: An efficient SOM technique for Event Summarization in multi-view surveillance videos,” Springer ICACNI’17, 2017.Google Scholar