CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Dual-Layer Video Encryption using RSA Algorithm

by Aman Chadha, Sushmit Mallik, Ankit Chadha, Ravdeep Johar, M. Mani Roja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 1
Year of Publication: 2015
Authors: Aman Chadha, Sushmit Mallik, Ankit Chadha, Ravdeep Johar, M. Mani Roja

Aman Chadha, Sushmit Mallik, Ankit Chadha, Ravdeep Johar, M. Mani Roja . Dual-Layer Video Encryption using RSA Algorithm. International Journal of Computer Applications. 116, 1 ( April 2015), 33-40. DOI=10.5120/20302-2341

@article{ 10.5120/20302-2341,
author = { Aman Chadha, Sushmit Mallik, Ankit Chadha, Ravdeep Johar, M. Mani Roja },
title = { Dual-Layer Video Encryption using RSA Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 1 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 33-40 },
numpages = {9},
url = { },
doi = { 10.5120/20302-2341 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:55:54.781171+05:30
%A Aman Chadha
%A Sushmit Mallik
%A Ankit Chadha
%A Ravdeep Johar
%A M. Mani Roja
%T Dual-Layer Video Encryption using RSA Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 1
%P 33-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.

  1. D. Kahn, "Cryptography Goes Public", IEEE Communications Magazine, Vol. 18, 19–28, 1980.
  2. G. Kessler, "An overview of cryptography", (The Art of Cryptography),[online]1998,http://www. garykessler. net/library/crypto. html#intro, (Accessed: 8 February 2015).
  3. G. White, "All-in-One Security+ Certification Exam Guide", McGraw-Hill, 2003.
  4. S. Harris, "SICCP Exam Guide", McGraw-Hill, 2007.
  5. W. Stallings, "Network Security Essentials: Applications and Standards", Pearson Education, 2007.
  6. W. Baker, "Introduction to the analysis of the Data Encryption Standard (DES)", Aegean Park Press, Vol. 55, 1991.
  7. N. Kofahi, T. Al-Somani, K. Al-Zamil, "Performance evaluation of three encryption/decryption algorithms", IEEE 46th Midwest Symposium on Circuits and Systems. Vol. 2, 790-793, 2003.
  8. M. Abomhara, Omar Zakaria, Othman O. Khalifa, "An Overview of Video Encryption Techniques", International Journal of Computer Theory and Engineering. Vol. 2, 103-110, 2010.
  9. W. Diffie and M. E. Hellman, "New Directions in Cryptography", IEEE Trans. on Info. Theory, Vol. 22, 644-654, 1976.
  10. D. Gall, "MPEG: a video compression standard for multimedia applications", Magazine Communications of the ACM - Special issue on digital multimedia systems, Vol. 4, 46-58, 1991.
  11. Ostermann, J. , Bormans, J. , List, P. , Marpe, D. , Narroschke, M. , Pereira, F. , Stockhammer, T. , Wedi, T. , "Video coding with H. 264/AVC: tools, performance, and complexity", IEEE Circuits and System Magazine. Vol. 4, 7-28, 2004.
  12. S. Aly, "A light-weight encrypting for real time video transmission", CTI Symposium Conference, DePaul University, Chicago, USA, 2003.
  13. S. Lian, "Multimedia Content Encryption: Techniques and Applications", Auerbach Publication, 2008.
  14. C. P. Wu, C. C. J. Kuo, "Design of integrated multimedia compression and encryption systems", IEEE Trans. Multimedia. Vol. 7, 828-839, 2005.
  15. A. Slagell, "Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm", [online] 2004, http://eprint. iacr. org/2004/011. Pdf (Accessed: 8 February 2015).
  16. L. Tang, "For encrypting and decrypting MPEG video data efficiently", Proceedings of The Fourth ACM Intl. Multimedia Conference, Boston, MA, 219-230, 1996.
  17. L. Qiao and K. Nahrstedt, "A new algorithm for MPEG video encryption, Proceedings of The First International Conference on Imaging Science, Systems, and Technology", Las Vegas, Nevada, 21-29, 1997.
  18. C. Shi and B. Bhargava, "A Fast MPEG Video Encryption Algorithm", Proceedings of the 6th International Multimedia Conference, Bristol, UK, 81-88, 1998.
  19. C. Shi, S. Y. Wang and B. Bhargava, "MPEG Video Encryption in Real-Time Using Secret key Cryptography", International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV, 1999.
  20. T. Seidel, D. Socek and M. Sramka, "Cryptanalysis of Video Encryption Algorithms", Tatra Mountains Mathematical Publications, Vol. 29, 1-9, 2004.
  21. Y. Negi, "A Survey on Video Encryption Techniques", International Journal of Emerging Technology and Advanced Engineering, Vol. 3, 234-237, 2013.
  22. B. Bhargava and C. Shi, "An Efficient MPEG Video Encryption Algorithm", IEEE Proceedings of the 17th Symposium on Reliable Distributed Systems, 381-386, 1998.
  23. G. Spanos and T. Maples, "Performance study of selective encryption scheme for the security of networked real-time video", Proceedings of the 4th International Conference on Computer and Communications, Las Vegas, NV, 2-10, 1995.
  24. T. Maples and G. Spanos, "Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications", Conference on Computers and Communications, 72-78, 1996.
  25. R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, Vol. 21, 120-126, 1998.
  26. L. Trevisan, "CS276 Lecture 5: Encryption Using Pseudorandom Functions", (in theory), [online] 2009, https://lucatrevisan. wordpress. com/2009/02/13/cs276-lecture-5-encryption-using-pseudorandom-functions/ (Accessed: 8 February 2015).
  27. A. Chadha, D. Jyoti, M. Mani Roja, "Text-Independent Speaker Recognition for Low SNR Environments with Encryption", International Journal of Computer Applications, Vol. 31, 43-50, 2012.
Index Terms

Computer Science
Information Sciences


encryption video encryption RSA pseudo noise