Call for Paper - December 2018 Edition
IJCA solicits original research papers for the December 2018 Edition. Last date of manuscript submission is November 20, 2018. Read More

Dual-Layer Video Encryption using RSA Algorithm

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 116 - Number 1
Year of Publication: 2015
Aman Chadha
Sushmit Mallik
Ankit Chadha
Ravdeep Johar
M. Mani Roja

Aman Chadha, Sushmit Mallik, Ankit Chadha, Ravdeep Johar and Mani M Roja. Article: Dual-Layer Video Encryption using RSA Algorithm. International Journal of Computer Applications 116(1):33-40, April 2015. Full text available. BibTeX

	author = {Aman Chadha and Sushmit Mallik and Ankit Chadha and Ravdeep Johar and M. Mani Roja},
	title = {Article: Dual-Layer Video Encryption using RSA Algorithm},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {116},
	number = {1},
	pages = {33-40},
	month = {April},
	note = {Full text available}


This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.


  • D. Kahn, "Cryptography Goes Public", IEEE Communications Magazine, Vol. 18, 19–28, 1980.
  • G. Kessler, "An overview of cryptography", (The Art of Cryptography),[online]1998,http://www. garykessler. net/library/crypto. html#intro, (Accessed: 8 February 2015).
  • G. White, "All-in-One Security+ Certification Exam Guide", McGraw-Hill, 2003.
  • S. Harris, "SICCP Exam Guide", McGraw-Hill, 2007.
  • W. Stallings, "Network Security Essentials: Applications and Standards", Pearson Education, 2007.
  • W. Baker, "Introduction to the analysis of the Data Encryption Standard (DES)", Aegean Park Press, Vol. 55, 1991.
  • N. Kofahi, T. Al-Somani, K. Al-Zamil, "Performance evaluation of three encryption/decryption algorithms", IEEE 46th Midwest Symposium on Circuits and Systems. Vol. 2, 790-793, 2003.
  • M. Abomhara, Omar Zakaria, Othman O. Khalifa, "An Overview of Video Encryption Techniques", International Journal of Computer Theory and Engineering. Vol. 2, 103-110, 2010.
  • W. Diffie and M. E. Hellman, "New Directions in Cryptography", IEEE Trans. on Info. Theory, Vol. 22, 644-654, 1976.
  • D. Gall, "MPEG: a video compression standard for multimedia applications", Magazine Communications of the ACM - Special issue on digital multimedia systems, Vol. 4, 46-58, 1991.
  • Ostermann, J. , Bormans, J. , List, P. , Marpe, D. , Narroschke, M. , Pereira, F. , Stockhammer, T. , Wedi, T. , "Video coding with H. 264/AVC: tools, performance, and complexity", IEEE Circuits and System Magazine. Vol. 4, 7-28, 2004.
  • S. Aly, "A light-weight encrypting for real time video transmission", CTI Symposium Conference, DePaul University, Chicago, USA, 2003.
  • S. Lian, "Multimedia Content Encryption: Techniques and Applications", Auerbach Publication, 2008.
  • C. P. Wu, C. C. J. Kuo, "Design of integrated multimedia compression and encryption systems", IEEE Trans. Multimedia. Vol. 7, 828-839, 2005.
  • A. Slagell, "Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm", [online] 2004, http://eprint. iacr. org/2004/011. Pdf (Accessed: 8 February 2015).
  • L. Tang, "For encrypting and decrypting MPEG video data efficiently", Proceedings of The Fourth ACM Intl. Multimedia Conference, Boston, MA, 219-230, 1996.
  • L. Qiao and K. Nahrstedt, "A new algorithm for MPEG video encryption, Proceedings of The First International Conference on Imaging Science, Systems, and Technology", Las Vegas, Nevada, 21-29, 1997.
  • C. Shi and B. Bhargava, "A Fast MPEG Video Encryption Algorithm", Proceedings of the 6th International Multimedia Conference, Bristol, UK, 81-88, 1998.
  • C. Shi, S. Y. Wang and B. Bhargava, "MPEG Video Encryption in Real-Time Using Secret key Cryptography", International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV, 1999.
  • T. Seidel, D. Socek and M. Sramka, "Cryptanalysis of Video Encryption Algorithms", Tatra Mountains Mathematical Publications, Vol. 29, 1-9, 2004.
  • Y. Negi, "A Survey on Video Encryption Techniques", International Journal of Emerging Technology and Advanced Engineering, Vol. 3, 234-237, 2013.
  • B. Bhargava and C. Shi, "An Efficient MPEG Video Encryption Algorithm", IEEE Proceedings of the 17th Symposium on Reliable Distributed Systems, 381-386, 1998.
  • G. Spanos and T. Maples, "Performance study of selective encryption scheme for the security of networked real-time video", Proceedings of the 4th International Conference on Computer and Communications, Las Vegas, NV, 2-10, 1995.
  • T. Maples and G. Spanos, "Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications", Conference on Computers and Communications, 72-78, 1996.
  • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, Vol. 21, 120-126, 1998.
  • L. Trevisan, "CS276 Lecture 5: Encryption Using Pseudorandom Functions", (in theory), [online] 2009, https://lucatrevisan. wordpress. com/2009/02/13/cs276-lecture-5-encryption-using-pseudorandom-functions/ (Accessed: 8 February 2015).
  • A. Chadha, D. Jyoti, M. Mani Roja, "Text-Independent Speaker Recognition for Low SNR Environments with Encryption", International Journal of Computer Applications, Vol. 31, 43-50, 2012.