Abstract
Nowadays, video security systems are essential for supervision everywhere, for example video conference, WhatsApp, ATM, airport, railway station, and other crowded places. In multi-view video systems, various cameras are producing a huge amount of video content which makes it difficult for fast browsing and securing the information. Due to advancement in networking, digital cameras, and media, interactive sites, the importance of privacy and security is rapidly increasing. Hence, nowadays the security of digital videos become an emerging research area in the multimedia domain; especially when the communication happens over the Internet. Cryptography is an essential practice to protect the information in this digital world. Standard encryption techniques like AES/DES are not optimal and efficient in case of videos. Therefore, a technique is immediately required, which can provide the security to video content. In this paper, we address the video security-related issues and their solutions. An optimized version of the genetic algorithm is employed to solve the aforementioned issues through modeling the simplified version of genetic processes. It is used to generate a frame sequence such that the correlation between any two frames is minimized. The frame sequence determines the randomization in order of frames of a video. The proposed method is not only fast but also more accurate to enhance the efficiency of an encryption process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K., Krishan, et al. “Eratosthenes sieve based key-frame extraction technique for event summarization in videos.” MTAP (2017), pp. 1–22.
Kelahmetoglu, et al., Efficient utility of WhatsApp: from computer screen to the surgeon’s hand to determine maxillofacial traumas, JCS, 26, 4, (2015), pp. 1437.
G. A. Spanos, et al., Performance Study of a Selective Encryption Scheme for the Security of Networked Real-Time Video, ICCCN, (1995), pp. 2–10.
K., Kumar, et al., Equal Partition based Clustering approach for Event Summarization in Videos, SITIS’16, 2016, pp. 119–126.
K., Sridhar, et al., System method and article of manufacture with integrated video conferencing billing in a communication system architecture, U.S. Patent No. 5,867,494. (1999).
M., Sari, What Up with WhatsApp, TABJ, (2014), pp. 28.
A., Mohamed, et al., An overview of video encryption techniques, IJCTE, 2, 1, (2010), pp. 103–110.
W., Chung, et al., Fast encryption methods for audiovisual data confidentiality, ITISOP, 2001.
C., Shi, et al., A fast MPEG video encryption algorithm, ACM ICM’98.
M., Gough, Video conferencing over IP: Configure, secure, and troubleshoot, Elsevier, (2006).
A. Senior et al., Enabling video privacy through computer vision, IEEE Security & Privacy, 3, 3, (2005), pp. 50-57.
W. Zhang, S. S. Cheung and Minghua Chen, Hiding privacy information in video surveillance system, IEEE ICIP, (2005), pp. 868–871.
G.R. Blakley, Safeguarding Cryptographic Keys, Proc. Am. Federation of Information Processing Soc, 48, (1979), pp. 313-317.
A. Shamir, How to Share a Secret, Comm. ACM, 22, 11, (1979), pp. 612–613.
S. J., Gustavus, Symmetric and asymmetric encryption, ACM Computing Surveys (CSUR) 11, 4, (1979), pp. 305-330.
L., Wei, Using genetic algorithm for network intrusion detection, Proceedings of the United States Department of Energy Cyber Security Group, 1, (2004), pp. 1–8.
A. Kumar, N. Rajpal, Application of Genetic Algorithm in the Field of Steganography, Journal of Information Technology, 2, 1, (2004), pp. 12-15.
A. Kumar, et al., New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms, NCC’05, IIT Kharagpur (2005) pp. 579–583.
A. Soni, et al., Key Gen. Using Genetic Algorithm for Image Encryption, (2013).
L., Qiao, et al., A new algorithm for MPEG video encryption, ICISST, 1997.
A. Tragha, et al., ICIGA: Improved Cryptography Inspired by Genetic Algorithms, ICHIT’06, (2006).
S. Wang, et al., A secure steganography method based on genetic algorithm, JIHMSP, 1, 1, (2010), pp. 28–35.
Hasso, et al., Steganography in Video Files, IJCSI, 13, 1, (2016), pp. 32.
K. Krishan, et al., Event BAGGING: A novel event summarization approach in multi-view surveillance videos, IEEE IESC’17, 2017.
K. Kumar, et al., “SOMES: An efficient SOM technique for Event Summarization in multi-view surveillance videos,” Springer ICACNI’17, 2017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S., Kumar, K. (2018). GUESS: Genetic Uses in Video Encryption with Secret Sharing. In: Chaudhuri, B., Kankanhalli, M., Raman, B. (eds) Proceedings of 2nd International Conference on Computer Vision & Image Processing . Advances in Intelligent Systems and Computing, vol 703. Springer, Singapore. https://doi.org/10.1007/978-981-10-7895-8_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-7895-8_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7894-1
Online ISBN: 978-981-10-7895-8
eBook Packages: EngineeringEngineering (R0)