Analysing Video Encryption IoT using Chaos Algorithm
With the rapid growth of digital communication and multimedia usage, ensuring a high level of security has become a critical concern in the communication and storage of videos and large volumes of information. Video encoding is one of the primary approaches used to ensure the confidentiality and int...
Saved in:
| Published in | 2025 7th International Conference on Inventive Material Science and Applications (ICIMA) pp. 1217 - 1223 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
28.05.2025
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/ICIMA64861.2025.11074237 |
Cover
| Summary: | With the rapid growth of digital communication and multimedia usage, ensuring a high level of security has become a critical concern in the communication and storage of videos and large volumes of information. Video encoding is one of the primary approaches used to ensure the confidentiality and integrity of multimedia data. Modern cryptography offers essential techniques for securing data at the source and protecting multimedia content from unauthorized access. Recent advancements in video encoding technologies have led to the development of various methods aimed at safeguarding visual information from attackers and unauthorized access. This paper presents a survey of different video encoding techniques, offering researchers insights into effective strategies for securing multimedia data. A novel noise-resilient encoding framework is proposed to provide a higher level of security for visual content transmitted across networks. An improved cyclic transformation process is utilized, incorporating pixel-level security features. A key-based switching mechanism is designed with iterative processes involving confusion and diffusion phases. This enhances the overall security compared to traditional chaos-based encoding methods. The proposed system effectively obfuscates pixel intensity values and adapts to changes in bit rates, thereby improving resistance to web-based attacks and reducing unauthorized third-party access. |
|---|---|
| DOI: | 10.1109/ICIMA64861.2025.11074237 |