Visible to the public Efficient Video Encryption Using Lightweight Cryptography Algorithm

TitleEfficient Video Encryption Using Lightweight Cryptography Algorithm
Publication TypeConference Paper
Year of Publication2018
AuthorsHussain, Syed Saiq, Sohail Ibrahim, Muhammad, Mir, Syed Zain, Yasin, Sajid, Majeed, Muhammad Kashif, Ghani, Azfar
Conference Name2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)
ISBN Number978-1-5386-8249-4
KeywordsCipher, Ciphers, composability, conventional encryption methods, Correlation, correlation methods, cryptography, Cyber physical system, cyber physical systems, efficient encryption, efficient video encryption, Encryption, encryption algorithm, Entropy, highly complex encryption process, Histograms, Internet of Things, IoT environment, KHAZAD cipher, lightweight cryptography algorithm, lightweight encryption methods, low computation cost, low powered battery operated devices, natural redundancy, neighbouring pixels, pubcrawl, resilience, Resiliency, Secure Force (SF), secure IoT, Secure IoT (SIT), small battery operated devices, spatio-temporal correlation, Spatiotemporal phenomena, video data, video signal processing
Abstract

The natural redundancy in video data due to its spatio-temporal correlation of neighbouring pixels require highly complex encryption process to successfully cipher the data. Conventional encryption methods are based on lengthy keys and higher number of rounds which are inefficient for low powered, small battery operated devices. Motivated by the success of lightweight encryption methods specially designed for IoT environment, herein an efficient method for video encryption is proposed. The proposed technique is based on a recently proposed encryption algorithm named Secure IoT (SIT), which utilizes P and Q functions of the KHAZAD cipher to achieve high encryption at low computation cost. Extensive simulations are performed to evaluate the efficacy of the proposed method and results are compared with Secure Force (SF-64) cipher. Under all conditions the proposed method achieved significantly improved results.

URLhttps://ieeexplore.ieee.org/document/8643317
DOI10.1109/ICEEST.2018.8643317
Citation Keyhussain_efficient_2018