Skip to main content
Log in

A secure system for digital video applications using an intelligent crypto model

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The rapid growth and widespread usage of the Internet increased digital multimedia communication through numerous applications. It created the risk of data stealing and misuse. The applications such as YouTube work based on video content, so a security system is needed to protect the video data from unauthorized access. The existing video security-based approaches face problems like high execution time, low confidentiality, etc., therefore, proposed a novel Deep Neural Based Twofish (DNBT) framework to secure the video content in digital video applications. The digital videos are initially collected from the UVG dataset and inserted into the proposed framework. The inserted data is preprocessed for noise removal, and the hash 1 value is calculated. Then the videos are split into several frames. These separated video frames are subjected to the encryption procedure to encrypt using the generated key. Additionally, hash 2 is calculated on the encrypted data and compared to the hash 1 value to verify the user. Following validation, the shared key decrypts the data to restore it to its original state for validated user access. Additionally, the computed results of the proposed model are related to the flourishing replica based on video security to know the efficiency. The proposed DNBT gained a confidential rate of 95.52% with a short execution time of 100 ms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Al-Sanjary O, Sulong G, Ismael Al-sanjary O (2015) Detection of video forgery: A review of literature. J Theor Appl Inf Technol 74(2):207–220

    Google Scholar 

  2. Ambadekar SP, Jain J, Khanapuri J (2019) Digital image watermarking through encryption and DWT for copyright protection. In Recent trends in signal and image processing, Springer, Singapore, pp 187–195. https://doi.org/10.1007/978-981-10-8863-6_19

  3. Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034–205050. https://doi.org/10.1109/ACCESS.2020.3036916

    Article  Google Scholar 

  4. Chimanna MA, Khot SR (2013) Digital video watermarking techniques for secure multimedia creation and delivery. Int J Eng Res 3(2):839844

  5. Chowdhary CL, Patel PV, Kathrotia KJ, Attique M, Perumal K, Ijaz MF (2020) Analytical study of hybrid techniques for image encryption and decryption. Sensors 20(18):5162. https://doi.org/10.3390/s20185162

    Article  Google Scholar 

  6. Darshana Hooda PS, Dcrust M (2014) Remote Reference Passing Framework for Video Encryption. Int J Comput Sci Commun 5(2):138–147

    Google Scholar 

  7. Desiato D, Tortora G (2018) A Methodology for GDPR Compliant Data Processing. SEBD.

  8. Elkamchouchi H, Salama WM, Abouelseoud Y (2020) New video encryption schemes based on chaotic maps. IET Image Process 14(2):397–406. https://doi.org/10.1049/iet-ipr.2018.5250

    Article  Google Scholar 

  9. Elshamy AM, Abdelghany MA, Alhamad AQ, Hamed HF, Kelash HM, Hussein AI (2017) Secure implementation for video streams based on fully and permutation encryption techniques. In 2017 International Conference on Computer and Applications (ICCA). IEEE, pp 50–55. https://doi.org/10.1109/COMAPP.2017.8079738

  10. Garba A, Dwivedi AD, Kamal M, Srivastava G, Tariq M, Hasan MA, Chen Z (2021) A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw Appl 14(5):2665–80. https://doi.org/10.1007/s12083-020-01023-z

    Article  Google Scholar 

  11. Ghimire S, Choi JY, Lee B (2019) Using blockchain for improved video integrity verification. IEEE Trans Multimedia 22(1):108–121. https://doi.org/10.1109/TMM.2019.2925961

    Article  Google Scholar 

  12. Himeur Y, Boukabou A (2018) A robust and secure keyframe based video watermarking system using chaotic encryption. Multimed Tools Appl 77(7):8603–8627. https://doi.org/10.1007/s11042-017-4754-2

    Article  Google Scholar 

  13. Jafari Barani M, Ayubi P, Yousefi Valandar M, Yosefnezhad Irani B (2020) A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed Tools Appl 79(3):2127–2159. https://doi.org/10.1007/s11042-019-08225-5

    Article  Google Scholar 

  14. Jallouli M, Sayahi I, Mabrouk AB (2022) Robust crypto-watermarking approach based on spherical harmonics and AES algorithm for 3D mesh safe transmission. Multimed Tools Appl 81:38543–38567. https://doi.org/10.1007/s11042-022-13113-6

    Article  Google Scholar 

  15. Jayapandian N (2021) Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm. Wirel Pers Commun 120(3):2427–2447. https://doi.org/10.1007/s11277-021-08562-5

    Article  Google Scholar 

  16. Kareem SM, Rahma AM (2020) A novel approach for the development of the Twofish algorithm based on multi-level key space. J Inf Secur Appl 50:102410. https://doi.org/10.1016/j.jisa.2019.102410

    Article  Google Scholar 

  17. Khadam U, Iqbal MM, Azam MA, Khalid S, Rho S, Chilamkurti N (2019) Digital watermarking technique for text document protection using data mining analysis. IEEE Access 7:64955–64965. https://doi.org/10.1109/ACCESS.2019.2916674

    Article  Google Scholar 

  18. Khan PW, Byun Y (2020) A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy 22(2):175. https://doi.org/10.3390/e22020175

    Article  MathSciNet  Google Scholar 

  19. Kshetri N (2017) Can blockchain strengthen the Internet of things? IT professional 19(4):68–72. https://doi.org/10.1109/MITP.2017.3051335

    Article  Google Scholar 

  20. Kumar R, Tripathi R, Marchang N, Srivastava G, Gadekallu TR, Xiong NN (2021) A secured distributed detection system based on IPFS and blockchain for industrial image and video data security. J Parallel Distrib Comput 152:128–143. https://doi.org/10.1016/j.jpdc.2021.02.022

    Article  Google Scholar 

  21. Li Y, Li Z, Ma M, Wang M (2020) Generation of grid multi-wing chaotic attractors and its application in video secure communication system. Multimed Tools Appl 79(39):29161–29177. https://doi.org/10.1007/s11042-020-09448-7

    Article  Google Scholar 

  22. Liu H, Crespo RG, Martínez OS (2020) Enhancing privacy and data security across healthcare applications using blockchain and distributed ledger concepts. Healthcare 8(3):243. https://doi.org/10.3390/healthcare8030243

    Article  Google Scholar 

  23. Liu Q, Safavi-Naini R, Sheppard NP (2003) Digital rights management for content distribution. In Conferences in Research and Practice in Information Technology Series 34:49-58

  24. Malladar R, Sanjeev Kunte R (2019) Selective Video Encryption Based on Entropy Measure. Integrated Intelligent Computing, Communication and Security, Springer, Singapore, pp 603–612. https://doi.org/10.1007/978-981-10-8797-4_61

  25. Maolood AT, Gbashi EK, Mahmood ES (2022) Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map. Int J Electr Comput Eng 12(5):2088–8708. https://doi.org/10.11591/ijece.v12i5

    Article  Google Scholar 

  26. Mohanta BK, Jena D, Panda SS, Sobhanayak S (2019) Blockchain technology: A survey on applications and security privacy challenges. Internet of Things 8:100107. https://doi.org/10.1016/j.iot.2019.100107

    Article  Google Scholar 

  27. Prakash VR (2019) An enhanced coding algorithm for efficient video coding. J Inst Electron Comput 1(1):28–38. https://doi.org/10.33969/JIEC.2019.11004

    Article  MathSciNet  Google Scholar 

  28. Ravi H, Subramanyam AV, Gupta G, Kumar BA (2014) Compression noise based video forgery detection. 2014 IEEE International Conferences on Image Processing. IEEE. https://doi.org/10.1109/ICIP.2014.7026083

  29. Ren Z, Cong K, Aerts T, de Jonge B, Morais A, Erkin Z (2018)A scale-out blockchain for value transfer with spontaneous sharding. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE. https://doi.org/10.1109/CVCBT.2018.00006

  30. Sayahi I, Elkefi A, Amar CB (2019) Crypto-watermarking system for safe transmission of 3D multiresolution meshes. Multimed Tools Appl 78:13877–13903. https://doi.org/10.1007/s11042-018-6721-y

    Article  Google Scholar 

  31. Sharma S, Kumar K (2018) GUESS: genetic uses in video encryption with secret sharing. In Proceedings of 2nd international conference on computer vision & image processing, Springer, Singapore, pp 51–62. https://doi.org/10.1007/978-981-10-7895-8_5

  32. Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28. https://doi.org/10.1080/02533839.2018.1537807

    Article  Google Scholar 

  33. Xu R, Zhang L, Zhao H, Peng Y (2017) Design of network media's digital rights management scheme based on blockchain technology. In 2017 IEEE 13th international symposium on autonomous decentralized system (ISADS). IEEE, pp 128–133. https://doi.org/10.1109/ISADS.2017.21

  34. Yeh KH, Lo NW, Wan CK (2018) A robust NFC-based personalized IPTV service system. Multimed Tools Appl 77:5129–5148. https://doi.org/10.1007/s11042-017-4380-z

    Article  Google Scholar 

  35. Zhang J, Zhong S, Wang T, Chao HC, Wang J (2020) Blockchain-based systems and applications: a survey. J Internet Technol 21(1):1–4

    Google Scholar 

  36. Zhao H, Liu Y, Wang Y, Huang Y (2020) Hiding Data into Blockchain-based Digital Video for Security Protection. In 2020 3rd International Conference on Smart BlockChain (SmartBlock). IEEE, pp 23–28. https://doi.org/10.1109/SmartBlock52591.2020.00012

Download references

Author information

Authors and Affiliations

Authors

Contributions

All the authors have contributed equally to the work.

Corresponding author

Correspondence to Vinit Kumar.

Ethics declarations

Ethical approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed consent

For this type of analysis formal consent is not needed.

Disclosure of Potential Conflict of Interest

The authors declare that they have no potential conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, V., Mali, S.S., Rajender, G. et al. A secure system for digital video applications using an intelligent crypto model. Multimed Tools Appl 83, 16395–16415 (2024). https://doi.org/10.1007/s11042-023-16223-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16223-x

Keywords