Publicado

2020-04-01

Composite cellular automata based encryption method applied to surveillance videos

Método de encriptación basado en autómatas celulares compuestos aplicado a videos de vigilancia

DOI:

https://doi.org/10.15446/dyna.v87n213.81859

Palabras clave:

cryptosystem, reversible composite cellular automata, video encryption, region of interest encryption (en)
criptosistema, autómatas celulares compuestos reversibles, cifrado de videos, cifrado de regiones de interés (es)

Autores/as

This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas. In this paper, a symmetric encryption method for surveillance videos is presented, based on reversible composite cellular automata developed for this purpose. This method takes advantage of reversible cellular automata and elementary rule 30 properties, for efficient regions of interest encryption in surveillance video frames, obtaining an algorithm which experimental results of security and performance are consistent with those reported in current literature. In addition, it allows decryption without loss of information through a fixed size key for each video frame.

Este trabajo se enmarca en el proyecto de investigación “Modelos de Encriptación Basados En Atractores Caóticos” institucionalizado en el Centro de Investigaciones y Desarrollo Científico de la Universidad Distrital Francisco José de Caldas. En este documento, se presenta un método de encriptación simétrico para videos de vigilancia a partir de autómatas celulares compuestos reversibles desarrollados para este propósito. Este método aprovecha las propiedades de los autómatas celulares reversibles y de la regla elemental 30, para el cifrado eficiente de regiones de interés en fotogramas de videos de vigilancia, obteniendo un algoritmo cuyos resultados experimentales de seguridad y desempeño son consistentes de acuerdo con los reportados en la literatura actual. Además, permite el descifrado sin pérdida de información mediante una llave de tamaño fijo por cada fotograma de video.

Referencias

Pan, H., Lei, Y. and Jian, C., Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1), pp. 1-10, 2018. DOI: 10.1186/s13640-018-0386-3

Dongare, A.S., Alvi, A.S. and Tarbani, N.M., An efficient technique for image encryption and decryption for secured multimedia application. International Research Journal of Engineering and Technology (IRJET), 4(4), pp. 3186-3190, 2017.

Zhang, X. and Wang, X., Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access, 6, pp. 70025-70034, 2018. DOI: 10.1109/ACCESS.2018.2879844

Chai, X., Fu, X., Gan, Z., Lu, Y. and Chen, Y., A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 166, pp. 44-62, 2019. DOI: 10.1016/j.sigpro.2018.09.029

Naseri, M., Abdolmaleky, M., Laref, A., Parandin, F., Celik, T., Farouk, A., Mahamadi, M. and Jalanian, H., A new cryptography algorithm for quantum images. Optik 155, pp. 44-62, 2019. DOI: 10.1016/j.ijleo.2016.09.123

Yang, Y-G., Tian, J., Lei, H., Zhou, Y. and Shi, W., Novel quantum image encryption using one-dimensional quantum cellular automata. Information Sciences, 345, pp. 257-270, 2016. DOI: 10.1016/j.ins.2016.01.078

Chen, B., Yu, M., Tian, Y., Li, L., Wang, D. and Sun, X., Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process, 12(12), pp. 2238-2249, 2018. DOI: 10.1049/iet-ipr.2018.5440

Sneha, P.S., Sankar, S. and Kumar, A.S., A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. Journal of Ambient Intelligence and Humanized Computing (2019), pp 1-20, 2019. DOI: 10.1007/s12652-019-01385-0

Attaullah, A.J. and Shah, T., Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimedia Tools and Applications (2019), pp. 1-20, 2019. DOI: 10.1007/s11042-019-07981-8

Wang, X., Zhu, X. and Zhang, Y., An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, pp. 23733-23746, 2018. DOI: 10.1109/ACCESS.2018.2805847

Bakhshandeh, A. and Eslami, Z., An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics and Lasers in Engineering, 51(6), pp. 665-673, 2013. DOI: 10.1016/j.optlaseng.2013.01.001

Wang, X. and Luan, D., A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(11), pp. 3075-3085, 2013. DOI: 10.1016/j.cnsns.2013.04.008

Zhang, X., Seo, S. and Wang, C., A lightweight encryption method for privacy protection in surveillance videos. IEEE Access, 6, pp. 18074-18087. DOI: 10.1109/ACCESS.2018.2820724

Zhang, X., Zhang, H. and Xu, C., Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Transactions on Internet and Information Systems, 10(7), pp. 3397-3413, 2016. DOI: 10.3837/tiis.2016.07.029

Wang, Y., Zhao, Yi., Zhou, Q. and Lin, Z., Image encryption using partitioned cellular automata. Neurocomputing, 275, pp. 1318-1332, 2018. DOI: 10.1016/j.neucom.2017.09.068

Li, K., Sun, M., Li, L. and Chen J., Image encryption algorithms based on non-uniform second-order reversible cellular automata with balanced rules. In: Huang, D.S., Bevilacqua, V., Premaratne, P. and Gupta, P., eds. Intelligent computing theories and application, ICIC 2017, part of Lecture Notes in Computer Science. Springer, Cham, Liverpool, UK, 2017. pp. 445-455. DOI: 10.1007/978-3-319-63309-1_41

Zhang, X., Wang, C., Zhong, S. and Yao, Q., Image encryption scheme based on balanced two-dimensional cellular automata. Mathematical Problems in Engineering (2013), pp. 1-10, 2013. DOI: 10.1155/2013/562768

George, S.N., Augustine, N. and Pattathil, D.P., Audio security through compressive sampling and cellular automata. Multimedia Tools and Applications, 74(23), pp. 10393-10417, 2015. DOI: 10.1007/s11042-014-2172-2

Orúe, A., Contribución al estudio del criptoanálisis y diseño de los criptosistemas caóticos, Tesis Dr., Escuela Técnica Superior de Ingenieros de Telecomunicación (ETSIT), Universidad Politécnica de Madrid (UPM), España, 2013, 260 P.

Kari, J., Theory of cellular automata: a survey. Theoretical Computer Science, 334(1-3), pp. 3-33, 2005. DOI: 10.1016/j.tcs.2004.11.021

Bilotta, E. and Pantano, P., Cellular Automata and Complex Systems: Methods for Modeling Biological Phenomena. IGI Global, 2010.

Deutsch, A. and Dormann, S., Cellular Automaton Modeling of Biological Pattern Formation: Characterization, Applications and Analysis. Birkhäuser Boston, 2005.

Auer S., Bliem A., Engel D., Uhl A. and Unterweger A., Bitstream-based JPEG encryption in real-time. International Journal of Digital Crime and Forensics, 5(3), pp. 1-14, 2013. DOI: 10.4018/jdcf.2013070101

Mateu, O., Análisis y detección de objetos de primer plano en secuencias de video, Proyecto final de carrera, Universitat Politècnica de Catalunya, Escola Tècnica Superior d'Enginyeria de Telecomunicació de Barcelona, 2009, 67 P.

Negri, P. and Garayalde, D., Pedestrian tracking using probability fields and a movement feature space. DYNA 84(200), pp. 217-227, 2017. DOI: 10.15446/dyna.v84n200.57028

Sun, X., Wu, P. and Hoi, S., Face detection using deep learning: an improved faster RCNN approach. Neurocomputing, 299, pp. 42-50, 2018. DOI: 10.1016/j.neucom.2018.03.030

Zhou, X., Yao, C., Wen, H., Wang, Y., Zhou, S., He, W. and Liang, J., EAST: an efficient and accurate scene text detector. Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, 2017, pp. 2642-2651. DOI: 10.1109/CVPR.2017.283.

Wolfram, S., A new kind of science. Wolfram Media, Champaign, IL, 2002 [accessed August 1st, 2019]. Available at: https://www.wolframscience.com/nks.

Stallings, W., Cryptography and network security: principles and practice. 7th ed., Pearson Education, 2017.

Shannon, C., Communication theory of secrecy systems. Bell System Technical Journal, 28(4), pp. 656-715, 1949. DOI: 10.1002/j.1538-7305.1949.tb00928.x

Devaney, R.L., An Introduction to Chaotic Dynamical Systems. 2nd ed., Addison-Wesley, 1989.

Cattaneo, G., Formenti, E., Margara, L. and Mauri, G., On the dynamical behavior of chaotic cellular automata. Theoretical Computer Science, 217(1), pp. 31-51, 1999. DOI: 10.1016/S0304-3975(98)00149-2

Coleman, I., Finite-width elementary cellular automata. Senior Project Archive, Whitman College, WA, 2011.

Gage, D., Laub, E. and McGarry, B., Cellular automata: is rule 30 random?. Proceedings of the Midwest NKS Conference, Indiana University, 2005.

Hamming, R.W., Error detecting and error correcting codes. The Bell System Technical Journal, 29(2), 1950. DOI: 10.1002/j.1538-7305.1950.tb00463.x

Wu, Y., Noonan, J.P. and Agaian, S., NPCR and UACI randomness tests for image encryption. Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), pp. 31-38, 2011.

Cómo citar

IEEE

[1]
L. M. Cortés Martinez, L. D. Alvarado Nieto, y E. I. Amaya Barrera, «Composite cellular automata based encryption method applied to surveillance videos», DYNA, vol. 87, n.º 213, pp. 212–221, abr. 2020.

ACM

[1]
Cortés Martinez, L.M., Alvarado Nieto, L.D. y Amaya Barrera, E.I. 2020. Composite cellular automata based encryption method applied to surveillance videos. DYNA. 87, 213 (abr. 2020), 212–221. DOI:https://doi.org/10.15446/dyna.v87n213.81859.

ACS

(1)
Cortés Martinez, L. M.; Alvarado Nieto, L. D.; Amaya Barrera, E. I. Composite cellular automata based encryption method applied to surveillance videos. DYNA 2020, 87, 212-221.

APA

Cortés Martinez, L. M., Alvarado Nieto, L. D. & Amaya Barrera, E. I. (2020). Composite cellular automata based encryption method applied to surveillance videos. DYNA, 87(213), 212–221. https://doi.org/10.15446/dyna.v87n213.81859

ABNT

CORTÉS MARTINEZ, L. M.; ALVARADO NIETO, L. D.; AMAYA BARRERA, E. I. Composite cellular automata based encryption method applied to surveillance videos. DYNA, [S. l.], v. 87, n. 213, p. 212–221, 2020. DOI: 10.15446/dyna.v87n213.81859. Disponível em: https://revistas.unal.edu.co/index.php/dyna/article/view/81859. Acesso em: 22 mar. 2026.

Chicago

Cortés Martinez, Luis Miguel, Luz Deicy Alvarado Nieto, y Edilma Isabel Amaya Barrera. 2020. «Composite cellular automata based encryption method applied to surveillance videos». DYNA 87 (213):212-21. https://doi.org/10.15446/dyna.v87n213.81859.

Harvard

Cortés Martinez, L. M., Alvarado Nieto, L. D. y Amaya Barrera, E. I. (2020) «Composite cellular automata based encryption method applied to surveillance videos», DYNA, 87(213), pp. 212–221. doi: 10.15446/dyna.v87n213.81859.

MLA

Cortés Martinez, L. M., L. D. Alvarado Nieto, y E. I. Amaya Barrera. «Composite cellular automata based encryption method applied to surveillance videos». DYNA, vol. 87, n.º 213, abril de 2020, pp. 212-21, doi:10.15446/dyna.v87n213.81859.

Turabian

Cortés Martinez, Luis Miguel, Luz Deicy Alvarado Nieto, y Edilma Isabel Amaya Barrera. «Composite cellular automata based encryption method applied to surveillance videos». DYNA 87, no. 213 (abril 1, 2020): 212–221. Accedido marzo 22, 2026. https://revistas.unal.edu.co/index.php/dyna/article/view/81859.

Vancouver

1.
Cortés Martinez LM, Alvarado Nieto LD, Amaya Barrera EI. Composite cellular automata based encryption method applied to surveillance videos. DYNA [Internet]. 1 de abril de 2020 [citado 22 de marzo de 2026];87(213):212-21. Disponible en: https://revistas.unal.edu.co/index.php/dyna/article/view/81859

Descargar cita

CrossRef Cited-by

CrossRef citations2

1. Tetiana Pylypiuk, Olena Smalko, Oleksiy Koval. (2022). Research of Prospective Encoding Methods for Multimedia Content Protection. 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT). , p.28. https://doi.org/10.1109/ATIT58178.2022.10024229.

2. Marlon Arias-Cárdenas, Deicy Alvarado-Nieto, Isabel Amaya-Barrera. (2024). Steganographic Cryptosystem Based on the Use of Chaos Theory and Cellular Automata. TecnoLógicas, 27(61), p.e3132. https://doi.org/10.22430/22565337.3132.

Dimensions

PlumX

Visitas a la página del resumen del artículo

944

Descargas

Los datos de descargas todavía no están disponibles.