PRIVACY PRESERVATION OF VIDEOS USING NEUTROSOPHIC LOGIC BASED SELECTIVE ENCRYPTION

Having great photos and video phone, but what happens when you decide to buy a new phone or your storage becomes too full to take any more, back it all on the cloud. It’s no secret that videos are a valuable way of communicating information. With attention spans dropping and the need to get larger amounts of information across in a shorter period of time, a well-placed video can take your presentation to the next level these presentations need to be up to date and available wherever you are, back it all on the cloud. Better collaboration and communication through the use of cloud as cloud allows users to access the latest versions of any multimedia data (text, video, images, audio, etc), so they can stay on top changes, which can help businesses to better manage their work flow, regardless of geographical location or spread. Multimedia data like videos stored on cloud are vulnerable to various types of threats like known plain text attach, threat to data, denial of service, etc. To overcome these problems videos need to be encrypted before it gets stored on cloud. Encrypting whole video is a time consuming task, to get rid of time complexity videos can be encrypted using selective encryption many researchers in the state of art have proposed techniques for selective image encryption. In this paper, a frame work is proposed for selective encryption of videos in two stages. The first stage is, Region of interest (ROI) identification performed based on Neutrosophic Logic, watershed image segmentation method. Second Stage is ROI encryption which is performed using the proposed Decision Based Encryption (DBE) Algorithm. The proposed frame work is fast, robust, highly scalable and accurate to meet the need of current internet bandwidth and speed.

[1]  Gang Liu,et al.  A Selective Video Encryption Scheme for MPEG Compression Standard , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[2]  Safwan El Assad,et al.  Efficient Image Encryption and Authentication Scheme Based on Chaotic Sequences , 2013, SECURWARE 2013.

[3]  Amr H. Hussein,et al.  Efficient selective image encryption , 2016, Multimedia Tools and Applications.

[4]  Tao Xiang,et al.  Outsourcing chaotic selective image encryption to the cloud with steganography , 2015, Digit. Signal Process..

[5]  David Ripley,et al.  Paraconsistent Logic , 2015, J. Philos. Log..

[6]  Bruno Whittle Dialetheism, logical consequence and hierarchy , 2004 .

[7]  Jinsheng Sun,et al.  A chaotic stream cipher and the usage in video protection , 2007 .

[8]  Stefan Katzenbeisser,et al.  Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Madhukar Budagavi,et al.  High Throughput CABAC Entropy Coding in HEVC , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Ming Zhang,et al.  A neutrosophic approach to image segmentation based on watershed method , 2010, Signal Process..

[11]  Rik Van de Walle,et al.  Encryption for High Efficiency Video Coding with video adaptation capabilities , 2013, 2013 IEEE International Conference on Consumer Electronics (ICCE).

[12]  Zafar Shahid,et al.  Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.

[13]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[14]  Robert LIN,et al.  NOTE ON FUZZY SETS , 2014 .

[15]  Mickaël Raulet,et al.  Real time SHVC decoder: Implementation and complexity analysis , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[16]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[17]  Florentin Smarandache Neutrosophic Logic - A Generalization of the Intuitionistic Fuzzy Logic , 2003, EUSFLAT Conf..

[18]  Ljupco Kocarev,et al.  Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[19]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[20]  Olivier Déforges,et al.  Real-time selective video encryption based on the chaos system in scalable HEVC extension , 2017, Signal Process. Image Commun..

[21]  Xingyuan Wang,et al.  Cryptanalysis of an image encryption algorithm using Chebyshev generator , 2014, Digit. Signal Process..

[22]  Sayyada Fahmeeda Sultana,et al.  Video Encryption Algorithm and Key Management using Perfect Shuffle , 2017 .

[23]  Krassimir T. Atanassov,et al.  Intuitionistic fuzzy sets , 1986 .

[24]  Florentin Smarandache,et al.  A unifying field in logics : neutrosophic logic : neutrosophy, neutrosophic set, neutrosophic probability , 2020 .