Publicado
Composite cellular automata based encryption method applied to surveillance videos
Método de encriptación basado en autómatas celulares compuestos aplicado a videos de vigilancia
DOI:
https://doi.org/10.15446/dyna.v87n213.81859Palabras clave:
cryptosystem, reversible composite cellular automata, video encryption, region of interest encryption (en)criptosistema, autómatas celulares compuestos reversibles, cifrado de videos, cifrado de regiones de interés (es)
Descargas
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas. In this paper, a symmetric encryption method for surveillance videos is presented, based on reversible composite cellular automata developed for this purpose. This method takes advantage of reversible cellular automata and elementary rule 30 properties, for efficient regions of interest encryption in surveillance video frames, obtaining an algorithm which experimental results of security and performance are consistent with those reported in current literature. In addition, it allows decryption without loss of information through a fixed size key for each video frame.
Este trabajo se enmarca en el proyecto de investigación “Modelos de Encriptación Basados En Atractores Caóticos” institucionalizado en el Centro de Investigaciones y Desarrollo Científico de la Universidad Distrital Francisco José de Caldas. En este documento, se presenta un método de encriptación simétrico para videos de vigilancia a partir de autómatas celulares compuestos reversibles desarrollados para este propósito. Este método aprovecha las propiedades de los autómatas celulares reversibles y de la regla elemental 30, para el cifrado eficiente de regiones de interés en fotogramas de videos de vigilancia, obteniendo un algoritmo cuyos resultados experimentales de seguridad y desempeño son consistentes de acuerdo con los reportados en la literatura actual. Además, permite el descifrado sin pérdida de información mediante una llave de tamaño fijo por cada fotograma de video.
Referencias
Pan, H., Lei, Y. and Jian, C., Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1), pp. 1-10, 2018. DOI: 10.1186/s13640-018-0386-3
Dongare, A.S., Alvi, A.S. and Tarbani, N.M., An efficient technique for image encryption and decryption for secured multimedia application. International Research Journal of Engineering and Technology (IRJET), 4(4), pp. 3186-3190, 2017.
Zhang, X. and Wang, X., Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access, 6, pp. 70025-70034, 2018. DOI: 10.1109/ACCESS.2018.2879844
Chai, X., Fu, X., Gan, Z., Lu, Y. and Chen, Y., A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 166, pp. 44-62, 2019. DOI: 10.1016/j.sigpro.2018.09.029
Naseri, M., Abdolmaleky, M., Laref, A., Parandin, F., Celik, T., Farouk, A., Mahamadi, M. and Jalanian, H., A new cryptography algorithm for quantum images. Optik 155, pp. 44-62, 2019. DOI: 10.1016/j.ijleo.2016.09.123
Yang, Y-G., Tian, J., Lei, H., Zhou, Y. and Shi, W., Novel quantum image encryption using one-dimensional quantum cellular automata. Information Sciences, 345, pp. 257-270, 2016. DOI: 10.1016/j.ins.2016.01.078
Chen, B., Yu, M., Tian, Y., Li, L., Wang, D. and Sun, X., Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process, 12(12), pp. 2238-2249, 2018. DOI: 10.1049/iet-ipr.2018.5440
Sneha, P.S., Sankar, S. and Kumar, A.S., A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. Journal of Ambient Intelligence and Humanized Computing (2019), pp 1-20, 2019. DOI: 10.1007/s12652-019-01385-0
Attaullah, A.J. and Shah, T., Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimedia Tools and Applications (2019), pp. 1-20, 2019. DOI: 10.1007/s11042-019-07981-8
Wang, X., Zhu, X. and Zhang, Y., An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, pp. 23733-23746, 2018. DOI: 10.1109/ACCESS.2018.2805847
Bakhshandeh, A. and Eslami, Z., An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics and Lasers in Engineering, 51(6), pp. 665-673, 2013. DOI: 10.1016/j.optlaseng.2013.01.001
Wang, X. and Luan, D., A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(11), pp. 3075-3085, 2013. DOI: 10.1016/j.cnsns.2013.04.008
Zhang, X., Seo, S. and Wang, C., A lightweight encryption method for privacy protection in surveillance videos. IEEE Access, 6, pp. 18074-18087. DOI: 10.1109/ACCESS.2018.2820724
Zhang, X., Zhang, H. and Xu, C., Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Transactions on Internet and Information Systems, 10(7), pp. 3397-3413, 2016. DOI: 10.3837/tiis.2016.07.029
Wang, Y., Zhao, Yi., Zhou, Q. and Lin, Z., Image encryption using partitioned cellular automata. Neurocomputing, 275, pp. 1318-1332, 2018. DOI: 10.1016/j.neucom.2017.09.068
Li, K., Sun, M., Li, L. and Chen J., Image encryption algorithms based on non-uniform second-order reversible cellular automata with balanced rules. In: Huang, D.S., Bevilacqua, V., Premaratne, P. and Gupta, P., eds. Intelligent computing theories and application, ICIC 2017, part of Lecture Notes in Computer Science. Springer, Cham, Liverpool, UK, 2017. pp. 445-455. DOI: 10.1007/978-3-319-63309-1_41
Zhang, X., Wang, C., Zhong, S. and Yao, Q., Image encryption scheme based on balanced two-dimensional cellular automata. Mathematical Problems in Engineering (2013), pp. 1-10, 2013. DOI: 10.1155/2013/562768
George, S.N., Augustine, N. and Pattathil, D.P., Audio security through compressive sampling and cellular automata. Multimedia Tools and Applications, 74(23), pp. 10393-10417, 2015. DOI: 10.1007/s11042-014-2172-2
Orúe, A., Contribución al estudio del criptoanálisis y diseño de los criptosistemas caóticos, Tesis Dr., Escuela Técnica Superior de Ingenieros de Telecomunicación (ETSIT), Universidad Politécnica de Madrid (UPM), España, 2013, 260 P.
Kari, J., Theory of cellular automata: a survey. Theoretical Computer Science, 334(1-3), pp. 3-33, 2005. DOI: 10.1016/j.tcs.2004.11.021
Bilotta, E. and Pantano, P., Cellular Automata and Complex Systems: Methods for Modeling Biological Phenomena. IGI Global, 2010.
Deutsch, A. and Dormann, S., Cellular Automaton Modeling of Biological Pattern Formation: Characterization, Applications and Analysis. Birkhäuser Boston, 2005.
Auer S., Bliem A., Engel D., Uhl A. and Unterweger A., Bitstream-based JPEG encryption in real-time. International Journal of Digital Crime and Forensics, 5(3), pp. 1-14, 2013. DOI: 10.4018/jdcf.2013070101
Mateu, O., Análisis y detección de objetos de primer plano en secuencias de video, Proyecto final de carrera, Universitat Politècnica de Catalunya, Escola Tècnica Superior d'Enginyeria de Telecomunicació de Barcelona, 2009, 67 P.
Negri, P. and Garayalde, D., Pedestrian tracking using probability fields and a movement feature space. DYNA 84(200), pp. 217-227, 2017. DOI: 10.15446/dyna.v84n200.57028
Sun, X., Wu, P. and Hoi, S., Face detection using deep learning: an improved faster RCNN approach. Neurocomputing, 299, pp. 42-50, 2018. DOI: 10.1016/j.neucom.2018.03.030
Zhou, X., Yao, C., Wen, H., Wang, Y., Zhou, S., He, W. and Liang, J., EAST: an efficient and accurate scene text detector. Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, 2017, pp. 2642-2651. DOI: 10.1109/CVPR.2017.283.
Wolfram, S., A new kind of science. Wolfram Media, Champaign, IL, 2002 [accessed August 1st, 2019]. Available at: https://www.wolframscience.com/nks.
Stallings, W., Cryptography and network security: principles and practice. 7th ed., Pearson Education, 2017.
Shannon, C., Communication theory of secrecy systems. Bell System Technical Journal, 28(4), pp. 656-715, 1949. DOI: 10.1002/j.1538-7305.1949.tb00928.x
Devaney, R.L., An Introduction to Chaotic Dynamical Systems. 2nd ed., Addison-Wesley, 1989.
Cattaneo, G., Formenti, E., Margara, L. and Mauri, G., On the dynamical behavior of chaotic cellular automata. Theoretical Computer Science, 217(1), pp. 31-51, 1999. DOI: 10.1016/S0304-3975(98)00149-2
Coleman, I., Finite-width elementary cellular automata. Senior Project Archive, Whitman College, WA, 2011.
Gage, D., Laub, E. and McGarry, B., Cellular automata: is rule 30 random?. Proceedings of the Midwest NKS Conference, Indiana University, 2005.
Hamming, R.W., Error detecting and error correcting codes. The Bell System Technical Journal, 29(2), 1950. DOI: 10.1002/j.1538-7305.1950.tb00463.x
Wu, Y., Noonan, J.P. and Agaian, S., NPCR and UACI randomness tests for image encryption. Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), pp. 31-38, 2011.
Cómo citar
IEEE
ACM
ACS
APA
ABNT
Chicago
Harvard
MLA
Turabian
Vancouver
Descargar cita
CrossRef Cited-by
1. Tetiana Pylypiuk, Olena Smalko, Oleksiy Koval. (2022). Research of Prospective Encoding Methods for Multimedia Content Protection. 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT). , p.28. https://doi.org/10.1109/ATIT58178.2022.10024229.
2. Marlon Arias-Cárdenas, Deicy Alvarado-Nieto, Isabel Amaya-Barrera. (2024). Steganographic Cryptosystem Based on the Use of Chaos Theory and Cellular Automata. TecnoLógicas, 27(61), p.e3132. https://doi.org/10.22430/22565337.3132.
Dimensions
PlumX
Visitas a la página del resumen del artículo
Descargas
Licencia
Derechos de autor 2020 DYNA

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-SinDerivadas 4.0.
El autor o autores de un artículo aceptado para publicación en cualquiera de las revistas editadas por la facultad de Minas cederán la totalidad de los derechos patrimoniales a la Universidad Nacional de Colombia de manera gratuita, dentro de los cuáles se incluyen: el derecho a editar, publicar, reproducir y distribuir tanto en medios impresos como digitales, además de incluir en artículo en índices internacionales y/o bases de datos, de igual manera, se faculta a la editorial para utilizar las imágenes, tablas y/o cualquier material gráfico presentado en el artículo para el diseño de carátulas o posters de la misma revista.




