Skip to main content

A novel Cosine-Cosine chaotic map-based video encryption scheme

Abstract

The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encryption prevents unauthorized access to the transmitted data over unreliable channels. The well-known features of chaos theory such as random behaviour, unpredictability, and initial parameters dependency facilitate its use in cryptography. Many security issues are faced by chaos-based cryptosystems because of their less complexity. Hence, a new Cosine-Cosine chaotic map characterized by intricate chaotic behaviour is designed in the current study. Additionally, we formulate an original video encryption scheme employing this Cosine-Cosine chaotic map. The encryption process involves five steps, beginning with the segmentation of the original video into frames based on its frame rate. In the second phase, a 384 bits pseudorandom key is generated that is further divided into three subkeys of 128 bits each. The novel Cosine-Cosine chaotic map-based sequence is generated. In the fourth step, red, green, and blue components are encrypted using the pseudorandom key and the chaotic sequence. In the last step, we combine encrypted frames to get cipher video. The security analysis validates that the proposed encryption protects against eavesdropping.

Introduction

With the swift advancements in communication technology, an enormous volume of image and video data is now exchanged through a multitude of applications, including webinars, video conferencing, meetings, online classes, and social media platforms, all facilitated over the Internet. Information security and privacy are the primary concern to avoid unauthorized access to the shared data on these platforms. There are many techniques available to protect the data from the invaders such as watermarking [1], steganography [2], and cryptography [3,4,5]. Encryption is considered as finest method to protect video in cryptography. It transfers the video data in an unrecognizable format and protects it from eavesdropping.

The inherent presence of substantial correlation and redundancy among pixels in both video and image data render traditional encryption methods unsuitable for securing such content. Classical techniques not only demand more time but also exhibit slower processing speeds. Consequently, researchers have increasingly turned to chaotic theory [6,7,8,9] as an alternative for video encryption. Chaotic maps, known for producing diverse effects even with minute alterations in initial conditions, have become a focal point in encryption strategies. Primarily, chaos-based encryption approaches involve permutation and diffusion techniques. Permutation means scrambling the data. However, diffusion is the substitution of data [10,11,12].

Chaotic maps are categorized into two types, i.e., single and multi-dimensions [13,14,15,16]. A logistic map is a single dimension’s chaotic function. Logistic map [17,18,19] is the most common and simplest among all the chaotic maps. The mathematical equation of logistic map is as follows:

$${L}_{n+1}=\mu \times {L}_{n} \times \left(1-{L}_{n}\right)$$
(1)

Here, \(\mu\) represents the control parameter, and its values lie between 0 and 4. Sine map [20, 21] is a one-dimensional chaotic map that contains only one control parameter and generates using the sine function. Mathematically, the sine map can be represented by Eq. (2).

$${S}_{n+1}=\alpha \times Sin\left(\pi \times {S}_{n}\right)$$
(2)

Where \(\alpha\) is the control parameter in range (0, 1) [19,20,21]. The tent map with \(u\) as control parameter can be represented mathematically by Eq. (3).

$${X}_{N+1}=\left\{\begin{array}{c}u\times {X}_{N}, { X}_{N}<0.5\\ u\times (1-{X}_{N}),{ X}_{N}>0.5\end{array}\right\}$$
(3)

where \(u\) is the control value of the chaos map and its value is lies between 0 and 1.

Some existing one-dimensional chaotic maps have less complexity, a low level of unpredictability, and a narrow and discontinuous chaotic range with a stable window. Due to these reasons, such maps are not suitable to build strong cryptosystems. Therefore, in this current investigation, a new one-dimensional Cosine-Cosine chaotic map is defined. The map demonstrates high complexity in its chaotic behaviour and offers enhanced unpredictability over a broader and continuous chaotic range, thereby eliminating the stable window problem. Additionally, we employ the Cosine-Cosine chaotic map to formulate a video encryption strategy. The resultant video encryption scheme ensures both security and resilience against diverse types of attacks.

Related work

A number of chaotic maps have been created by researchers [22,23,24,25,26]. Kumar and Dua [27] used two different chaotic maps to encrypt audio using DNA encoding and dynamic diffusion. Erkan et al. [28] used the Schaffer function to introduce a two-dimensional hyperchaotic system. The map was used to design an image encryption scheme. Mansoor and Parah [29] used logistic map and tent to introduce a hybrid adaptive image encryption scheme. The author also integrates DNA computing into the scheme. The experiments validate the security provided by the approach.

Various video and image encryption algorithms based on chaotic maps has been developed in recent years [30,31,32,33,34,35,36]. Maolood et al. [37] proposed encryption algorithm using two chaotic maps for video encryption. The ChaCha20 algorithm has been used in the encryption process. An extensive security analysis has been done by the author to validate the performance of the encryption strategy. Tabash and Izhrauddin [38] used the logistic map to encrypt real-time video stream.

Xu et al. [39] introduced an encryption strategy to encrypt H.264 compressed video stream. The encrypt scheme completely disordered the video data and transformed that into an unrecognizable form. Dua et al. [7] proposed a video encryption method using cosine transformed intertwining logistic map. The input video was divided into several frames in the first stage based on the video’s duration and frames per second (FPS) value. To provide extra randomness during the encryption process, each frame was rotated 90° counterclockwise. In the last, frames were jumbled using a key.

Chiaraluce et al. [40] designed a novel video encryption strategy. XOR operation was used to encrypt the video data. Qin et al. [41] suggested a multimedia information end-to-end encryption approach that introduced several security mechanisms, such as selective encryption and selective integrity protection. This technique includes major activities such startup authentication and key distribution.

Hafsa et al. [42] developed the diffusion and confusion-based video encryption approach. The Henon chaotic map is used to provide randomness. The chaotic map initial conditions were created using the SHA-3 hash algorithm.

Motivated by these works, we propose a new Cosine-Cosine chaotic map. We further apply the Cosine-Cosine chaotic map to introduce a video encryption scheme. The encryption method mainly takes five steps to produce cipher. The video is converted into frames in the first phase based on the frame rate of the video. We generate a pseudorandom key of 384 bits in the second step. The pseudorandom key is further divided into three sub-keys of 128 bits each. The third phase generates a chaotic sequence. The fourth stage involves dispersing the pixel values in every colour channel of the frame using both the pseudorandom key and the chaotic sequence. In the end, all encrypted frames are merged to form cipher video. The scheme’s security is validated using several matrices.

The primary contributions and innovations of this study are as follows:

  1. 1.

    The work designed a new Cosine-Cosine chaotic map, demonstrating complex and unpredictable behaviour. Its chaotic characteristics have been validated through various metrics. The obtained results have been subsequently compared with those of established chaotic maps.

  2. 2.

    The created Cosine-Cosine chaotic map has been employed to formulate an innovative video encryption scheme. This strategy utilizes the chaotic values generated by the Cosine-Cosine chaotic map, in conjunction with a 128-bit pseudorandom key, to encrypt every colour component of the frame.

  3. 3.

    A novel diffusion procedure based on pseudorandom key, value generated using Cosine-Cosine chaotic map, XOR, and modulus operators has been introduced.

  4. 4.

    The proposed video encryption scheme’s security has been assessed through diverse parameters, encompassing NPCR (number of pixel change rate), entropy, MSE (mean square error), correlation coefficient, PSNR (peak signal-to-noise ratio), and its resilience against differential and histogram attacks.

The paper is structured into distinct sections as outlined below: the “Cosine-Cosine chaotic map” section delves into the novel Cosine-Cosine chaotic map. The “Proposed encryption scheme” section introduces the proposed encryption technique, while the “Results” section details the experimental setup and evaluates the results. Lastly, the “Discussion” section concludes the study.

Cosine-Cosine chaotic map

A newly introduced chaotic map, termed the Cosine-Cosine map, exhibits remarkably chaotic behaviour. The definition of the proposed Cosine-Cosine map is provided in Eq. (4).

$${X}_{n+1} = |cos(\pi \times r\times cos(\pi (r+3\times {X}_{n}\times {X}_{n}))*(r+3\times {X}_{n}\times {X}_{n})|$$
(4)

where \(r\epsilon \left[3, 7\right]\) and \({x}_{n},r\) represent the initial state and control parameter respectively.

Performance evaluation of Cosine-Cosine map

The Cosine-Cosine chaotic map exhibits good chaotic properties. These properties are analysed by various metrics.

Bifurcation diagram

In an effective chaotic map, these values should exhibit a uniform distribution across the entire range, with no gaps or stable windows in between [43]. Figure 1 displays the bifurcation diagram for several existing maps and the newly proposed Cosine-Cosine chaotic map. Notably, the proposed Cosine-Cosine chaotic map showcases a uniform and continuous bifurcation diagram within the range of 3 to 7.

Fig. 1
figure 1

Bifurcation diagram. a Logistic map. b Tent map. c Sine map. d Proposed Cosine-Cosine map

Lyapunov exponent

The calculations of the maximal Lyapunov exponent give the best indications of predictability. The Lyapunov exponent of a chaotic map should be positive. The Lyapunov exponent of some existing maps and the proposed Cosine-Cosine map is given in Fig. 2. Figure 2d provides positive Lyapunov exponent of Cosine-Cosine chaotic map.

Fig. 2
figure 2

Lyapunov exponent. a Logistic map. b Tent map. c Sine map. d Proposed Cosine-Cosine map

Proposed encryption scheme

Figure 3 depicts the proposed encryption algorithm. The novel Cosine-Cosine chaotic map and a pseudorandom key are responsible to change original frame into cipher frame. The decryption process follows the reverse order of these steps to retrieve the original video.

Fig. 3
figure 3

Proposed video encryption algorithm

Encryption

The proposed method for encrypting videos involves a series of steps employing the novel Cosine-Cosine chaotic map. The process is outlined below:

  1. 1.

    Divide the original video into frames and determine the number of frames \(n\) using the formula \(n = FPS\) × video length in seconds, where FPS represents frames per second.

  2. 2.

    Generate a 128-bit pseudorandom key.

  3. 3.

    Create a chaotic sequence using the Cosine-Cosine chaotic map specified in Eq. (4).

  4. 4.

    Apply operations on the pseudorandom key and the generated chaotic sequence to change frame pixels.

  5. 5.

    Unite all the cipher frames to construct the encrypted video.

Function 1 represents the pseudocode to encrypt each frame. Function 1 is called in a loop to encrypt the complete video. The following subsections explain the encryption steps in detail.

Pseudorandom key generation

A pseudorandom key of 384 bit is divided into three sub-keys \(\{key 1, key 2, key 3\}\) of 128 bit each to encrypt the three-colour channels (red, green, and blue) of the plain frame. Figure 4 depicts the same.

Fig. 4
figure 4

Distribution of pseudorandom key

The 128-bit \(key\) and initial value \(X\) are used to generate a pseudorandom key using the following equation for each colour component.

$$Pseudokey=Rightshift(X,d)\ OR\ Leftshift(X,d)$$
(5)

Here, the result of the logical OR operation is true if either or both of the input conditions are true and \(d=\) count of the number of one’s in the following equation:

$$temp=Key{\oplus}X$$
(6)

The symbol \(\oplus\) typically represents the bitwise XOR (exclusive OR) operation. Here, the bitwise XOR compares corresponding bits of \(Key\) and \(X\) and produces a result of 1 for each bit where the operands differ. If the corresponding bits are the same, the result is 0.

Chaotic sequence generation

The novel Cosine-Cosine chaotic map Eq. (4) has been used in the encryption process. The randomness and unpredictable nature of a chaotic map generates secure cryptosystems. In the proposed scheme, the random value generated by the Cosine-Cosine map in each iteration helps to change the pixels of the input frame.

Diffusion using pseudorandom key and chaotic sequence

We use a 128-bit pseudorandom key, the generated chaotic sequence, XOR, and modulus (% or mod) operator to diffuse the pixels of each colour component in a frame. The following equation is used to modify the pixels of the video frame.

$$cipherframe\left[row\right]\left[column\right]\left[i\right]=mod(((Plainframe[row] [column][ i]) XOR (Pseudokey \% 256)) XOR( {x}_{0}*X\%256)),256)$$
(7)

where \(cipherframe\left[row\right]\left[col\right]\left[i\right]\), \(Plainframe[row] [col][ i]\) is the cipher, plain frame with row, column index, and \({i}^{th}\) colour component. \(Pseudokey\) \(X\) is the pseudorandom key and initial value for each colour channel, and \({x}_{0}\) represents the chaotic value generated during each iteration. The bitwise XOR compares corresponding bits of \((Pseudokey \% 256)\) and \(plainframe[row] [col][ i]\) and produces a result of 1 for each bit where the operands differ. If the corresponding bits are the same, the result is 0. The output of this intermediate result is again XORed with \(( {x}_{0}\times X\%256)),256)\).

figure a

Decryption

Figure 5 illustrates the decryption mechanism. The subsequent steps are used to decrypt the video.

  1. 1

    The encrypted video is converted into encrypted frames.

  2. 2

    Randomly generate a 128-bit key for each colour component of the frame.

  3. 3

    Iterate the Cosine-Cosine chaotic map to produce a chaotic sequence employed during encryption.

  4. 4

    Reverse the diffusion process by applying the same pseudorandom key and chaotic sequence to regenerate the original frame.

  5. 5

    Finally, concatenate all decrypted frames to reconstruct the original video

Fig. 5
figure 5

Proposed video decryption method

Function 2 represents the pseudocode to decrypt a single video frame. Similarly, all the frames are encrypted by repeatedly calling Function 2.

figure b

Results

The experimental setup and performance evaluation of the introduced method are described in this section.

Experimental

To assess the effectiveness of our proposed approach, we utilized four video streams: Rhino.mp4, Train.mp4, Flamingo.mp4, and VipTrain.mp4 [44]. The implementation of our video encryption method was carried on a Windows 10 system equipped with an Intel Core i5 2370-M processor, 8 GB of RAM, and a 1-TB hard disk.

Security analysis

Various security parameters such as NPCR (number of pixel change rate), entropy, MSE (mean square error), correlation coefficient, PSNR (peak signal-to-noise ratio), and resistant against differential and histogram attacks are analysed in this section.

Entropy

Entropy serves as a metric for assessing the degree of randomness within an image. An entropy value of 8 signifies the utmost level of randomness [5]. The entropy of an encrypted frame is represented mathematically by Eq. (8):

$$E\left(i\right)= {\sum }_{j=0}^{G-1}p\left({i}_{j}\right) \frac{1}{p\left({i}_{j}\right)}$$
(8)

In the provided equation, \(p\left({i}_{j}\right)\) represents the probability of the occurrence of a symbol \({i}_{j}\). Here, \(G = {2}^{k}\), and \(k = 8\) for a grayscale image or a frame. The entropy values of our test videos are documented in Table 1. Additionally, the entropy values for various frames of the rhino video are detailed in Table 2. The values validate the randomness property inherent in our proposed encryption scheme.

Table 1 Security analysis of the first frame of video
Table 2 Encryption analysis of rhino video

Correlation coefficient

The correlation coefficient (CC) gives the relation between two pixels within a video frame, ranging from −1 to 1, where 0 is considered optimal [45, 46]. The CC can be computed using Eq. (9).

$${c}_{i,j}= \frac{cov\left(i,j\right)}{\sqrt{A\left(i\right)}\sqrt{B\left(j\right)}}$$
(9)

where,

$$cov\left(i,j\right)= \frac{1}{M}{\sum }_{k=1}^{M}\left({x}_{k}-B\left(x\right)\right)\left({y}_{k}-B\left(y\right)\right)$$
(10)
$$A\left(x\right)=\frac{1}{M}{\sum }_{k=1}^{M}{\left({x}_{k}-B\left(x\right)\right)}^{2}$$
(11)
$$B\left(x\right)= \frac{1}{M}{\sum }_{k=1}^{M}{x}_{k}$$
(12)

In this context, the CC between adjacent pixels \(i, j\),\(M\) is contingent on the number of selected pixels. The CC values for the first video frame of the sample videos are detailed in Table 1. Specifically, for the VipTrain video frame, the CC in the diagonal direction is recorded as −0.0007, indicating a low correlation between pixels. Furthermore, Table 2 presents the CC values for various frames of the Rhino video.

PSNR

Peak signal-to-noise ratio (PSNR) computes the change in the quality of a video frame after encryption. To evaluate PSNR, we refer to the original frame as the signal and errors as noise produced due to encryption. For a good quality-decrypted video frame, the value of PSNR should be high.

$$PSNR=10 {log}_{10}\left(\frac{{MAX}_{I}^{2}}{MSE}\right)$$
(13)

where \({MAX}_{I}\) represents the maximum value a pixel can have in a video frame or an image. MSE stands for mean square error. For an 8-bit representation of pixels in a frame, the value of \({MAX}_{I}\) is 255. The PSNR value for the first frame of our sample videos is outlined in Table 1. Additionally, Table 2 provides the PSNR values for various frames of Rhino.mp4.

Differential attack

The resistance against differential attack can be analysed by using metrics NPCR and UACI, which stands for unified averaged change intensity, which are metrics designed to quantify the alterations that take place in a pixel when a single pixel is modified [47, 48]. It mainly emphasizes the pixels that change after an attack. Equations (14)–(16) give the mathematical formula to evaluate NPCR. The NPCR should be nearly equal to 100 for a good encryption algorithm.

$$NPCR=\frac{100}{A\times B} \sum\nolimits_{m=1}^{A}\sum\nolimits_{n=1}^{B}U\left(m,n\right)$$
(14)

where \(U\left(m,n\right)\) is defined as follows:

$$U\left(m,n\right) =\left\{\begin{array}{c}0, c1\left(m,n\right)\ne c2\left(m,n\right)\\ 1, otherwise\end{array}\right.$$
(15)

UACI, on the other hand, computes the average intensity of the changes that occur between two cipher images or video frame (UACI) [49, 50], and the formula for the same is as follows:

$$UACI=\frac{1}{A\times B}\sum\nolimits_{m=1}^{A}{\sum\nolimits }_{n=1}^{B}\frac{{|E}_{1}\left(m,n\right)-{E}_{2}\left(m,n\right)|}{255}\times 100\%$$
(16)

where \(E\left(m,n\right)\) represents the pixel value located in the \({m}^{th}\) row and \({n}^{th}\) column of \(E\) and where \(E1\) and \(E2\) denote the encrypted images. The UACI and NPCR values for various frames of Rhino.mp4 are documented in Table 2. The UACI and NPCR for the first frame of our test video samples are listed in Table 1, indicating a significant alteration in pixel values within the encrypted frame. In the Flamingo video frame, the UACI is 0.501, signifying a minimal difference between neighbouring pixels.

Histogram analysis of rhino video

A uniform histogram pattern indicates a robust encryption method that poses a significant challenge to decryption attempts [51,52,53,54]. The analysis in Table 3 illustrates the histograms of five randomly selected frames from the Rhino video. Notably, all the encrypted frames demonstrate a uniform distribution, indicating the efficacy of the proposed approach in handling statistical attacks.

Table 3 Histogram analysis of rhino video

Keyspace analysis

An unauthorized party systematically tests all conceivable combinations of the secret key in an effort to gain access to confidential information. In the proposed scheme, each frame is encrypted using a 384-bit pseudorandom key. As a result, an attacker would be required to explore \({2}^{384}\) combinations to breach a single encrypted video frame. If the video consists of \(n\) frames, the attacker would need to test \(n\times {2}^{384}\) combinations to compromise the entire video.

Comparison analysis with different schemes

An encryption method is considered as good if it encrypts the data without any security risk. The size of the frames is a key aspect in determining how time-consuming the suggested strategy is. In comparison to smaller pictures, images with larger dimensions require longer encryption and decryption time. We have compared the results obtained on Rhino.mp4 with the other existing method in Table 4. The value of parameters obtained by our method is more favourable than the other approaches. Moreover, the Cosine-Cosine chaotic map designed in our work has wider chaotic range and more intricate and random features with no stable window problem. The robustness of any encryption scheme depends on the intricate nature of the chaotic map. Consequently, we assert that our encryption scheme offers substantial safeguard against various attacks, surpassing the effectiveness of other existing methods.

Table 4 Comparison with the existing approaches

Discussion

The research introduces a newly devised chaotic map termed the Cosine-Cosine chaotic map. The chaotic nature of this map has been substantiated through both the bifurcation diagram and the Lyapunov exponent. The bifurcation analysis of the proposed map reveals a more extensive and uniformly distributed range [3, 7] as compared to other chaotic maps. The consistently positive Lyapunov exponent across the range [3, 7] affirms the randomness and intricate behaviour characteristic of the chaotic map. The study further explores the utilization of this novel map in formulating a video encryption strategy. The calculated average entropy value, representing the randomness in the pixels of the video frame, is 7.99683. This entropy value approximates the ideal value of 8, indicating a high degree of randomness. The value of CC is reduced to −0.0007 in the cipher frame that secures it from statistical attacks. The calculated average PSNR value (as shown in Table 1) is 38.00642, suggesting that the encryption scheme introduces randomness, rendering the content indistinguishable from noise. The average NPCR and UACI values (also in Table 1) are 99.63625 and 50, respectively, demonstrating the scheme’s resistance to differential attacks.

A comparative assessment with other existing methods (as detailed in Table 4) substantiates that our proposed scheme surpasses the performance of alternative methods.

Conclusion

In this study, we introduced a new chaotic map named the Cosine-Cosine chaotic map. Using this map, we presented a video encryption scheme. The scheme involves the generation of a unique pseudorandom key and chaotic sequence using the Cosine-Cosine map to encrypt video frames. The resulting chaotic sequence and pseudorandom key alters the pixel values. The analysis of results demonstrates that the proposed video encryption technique is resilient against diverse attacks.

Availability of data and materials

Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

Abbreviations

DNA:

Deoxyribonucleic acid

CC:

Correlation coefficient

UACI:

Unified average change intensity

NPCR:

Number of pixel change rate

PSNR:

Peak signal-to-noise ratio

SHA-3:

Secure Hash Algorithm 3

XOR:

Exclusively OR

FPS:

Frames per second

CCH:

Correlation coefficient horizontally

CCV:

Correlation coefficient vertically

CCD:

Correlation coefficient diagonally

MSE:

Mean square error

References

  1. Liu Q, Yang S, Liu J, Xiong P, Zhou M (2020) A discrete wavelet transform and singular value decomposition-based digital video watermark method. Appl Math Model 85:273–293

    Article  MathSciNet  Google Scholar 

  2. Paul G, Davidson I, Mukherjee I, Ravi SS (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76:7445–7471

    Article  Google Scholar 

  3. Yasser I, Mohamed MA, Samra AS, Khalifa F (2020) A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22(11):1253

    Article  ADS  MathSciNet  PubMed  PubMed Central  Google Scholar 

  4. Wang R, Du P, Zhong W, Han H, Sun H (2020) Analyses and encryption implementation of a new chaotic system based on semi tensor product. Complexity 2020:1–13

    ADS  Google Scholar 

  5. Elrefaey A, Sarhan A, El-Shennawy NM (2021) Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU. J Real-Time Image Process. 18(6):1897–1906

    Article  Google Scholar 

  6. Asgari-Chenaghlu M, Balafar M-A, Feizi-Derakhshi M-R (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Processing 157:1–13

    Article  Google Scholar 

  7. Dua M, Makhija D, Manasa PYL, Mishra P (2022) 3D chaotic map-cosine transformation based approach to video encryption and decryption. Open Comput Sci 12(1):37–56

    Article  Google Scholar 

  8. Patro K, Acharya B, Nath V (2019) Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps. Microsyst Technol 25(12):4593–4607

    Article  Google Scholar 

  9. Pankaj S, Dua M (2021) A novel ToCC map and two-level scrambling-based medical image encryption technique. Netw Model Anal Health Inform Bioinform 10(1):48. https://doi.org/10.1007/s13721-021-00324-4

    Article  Google Scholar 

  10. Kumar A, Dua M (2021) Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multimed Tools Appl 80(18):27785–27805. https://doi.org/10.1007/s11042-021-10970-5

    Article  Google Scholar 

  11. Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik (Stuttg) 127(19):7431–7438. https://doi.org/10.1016/j.ijleo.2016.05.073

    Article  ADS  Google Scholar 

  12. Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimensional Systems and Signal Processing. 30(4):1637–1657. https://doi.org/10.1007/s11045-018-0622-0

    Article  Google Scholar 

  13. Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Optics Laser Technology 160:109033

    Article  CAS  Google Scholar 

  14. Aslam MN, Belazi A, Kharbech S, Talha M, Xiang W (2019) Fourth order MCA and chaos-based image encryption scheme. IEEE Access 7:66395–66409

    Article  Google Scholar 

  15. Guesmi R, Farah MAB (2021) A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tools Appl 80(2):1925–1944. https://doi.org/10.1007/s11042-020-09672-1

    Article  Google Scholar 

  16. Nkandeu YK, Tiedeu A, Abanda Y, Pone JRM (2022) Image encryption using the logistic map coupled to a self-synchronizing streaming. Multimed Tools Appl 81(12):17131–17154

    Article  Google Scholar 

  17. Rupa C, Harshita M, Srivastava G, Gadekallu TR, Maddikunta PKR (2022) Securing multimedia using a deep learning based chaotic logistic map. EEE J Biomed Health Inform 27(3):1154–1162

    Article  Google Scholar 

  18. Song X-H, Wang H-Q, Venegas-Andraca SE, Abd El-Latif AA (2020) Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Physica A Statistical Mechanics and its Applications. 537:122660

    Article  MathSciNet  Google Scholar 

  19. Panwar K, Purwar RK, Srivastava G (2021) A fast encryption scheme suitable for video surveillance applications using SHA-256 hash function and 1D sine–sine chaotic map. International Journal of Image and Graphics 21(02):2150022

    Article  Google Scholar 

  20. J. Sethi, J. Bhaumik, and A. S. Chowdhury, “Chaos-based uncompressed frame level video encryption,” in Proceedings of the Seventh International Conference on Mathematics and Computing : ICMC -2021, Springer Singapore 2022, pp. 201–217.

  21. B. D. Parameshachari and H. T. Panduranga, “Medical image encryption using SCAN technique and chaotic tent map system,” in Recent Advances in Artificial Intelligence and Data Engineering, Springer, 2022, pp. 181–193.

  22. B. Liu, X. Li, H. Yu, and J. Lv, “A light chaotic encryption algorithm for real-time video encryption,” in 4th EAI International Conference on Robotic Sensor Networks, 2022, pp. 111–118.

  23. Adhikari S, Karforma S (2021) A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence. Int J Inform Technol 13(4):1463–1471

    Google Scholar 

  24. Yang F, An X (2022) A new discrete chaotic map application in image encryption algorithm. Physica Scripta 97(3):35202

    Article  Google Scholar 

  25. Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dynamics 78(4):2975–2984. https://doi.org/10.1007/s11071-014-1639-z

    Article  MathSciNet  Google Scholar 

  26. Dua M, Wesanekar A, Gupta V, Bhola M, Dua S (2020) Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. Ambient Intelligence and Humanized Computing 11:3771–3786

    Article  Google Scholar 

  27. Kumar A, Dua M (2023) (2023), “Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding.” Applied Acoustics 203:109196

    Article  Google Scholar 

  28. Erkan U, Toktas A, Lai Q (2023) 2D hyperchaotic system based on Schaffer function for image encryption. Expert Systems with Applications 213:119076

    Article  Google Scholar 

  29. Mansoor S, Parah SA (2023) HAIE: a hybrid adaptive image encryption algorithm using chaos and DNA computing. Multimed Tools Appl 82(1–28):2023

    Google Scholar 

  30. Suri S, Vijay R (2019) A synchronous intertwining logistic map-DNA approach for color image encryption. Ambient Intell Human Comput 10(6):2277–2290

    Article  Google Scholar 

  31. Bouteghrine B, Tanougast C, Sadoudi S (2021) Novel image encryption algorithm based on new 3-d chaos map. Multimed Tools Appl 80:1–23

    Article  Google Scholar 

  32. J. Sethi, J. Bhaumik, and A. S. Chowdhury, “Fast and secure video encryption using divide-and-conquer and logistic tent infinite collapse chaotic map,” in International Conference on Computer Vision and Image Processing, 2022, pp. 151–163.

  33. Benrhouma O, Alkhodre AB, AlZahrani A, Namoun A, Bhat WA (2022) Using singular value decomposition and chaotic maps for selective encryption of video feeds in smart traffic management. Appl Sci 12(8):3917

    Article  CAS  Google Scholar 

  34. Shanableh T (2022) HEVC video encryption with high capacity message embedding by altering picture reference indices and motion vectors. IEEE Access 10:22320–22329

    Article  Google Scholar 

  35. Ma H, Ma Y, Zhang W, Zhao X, Chu P (2022) Development of video encryption scheme based on quantum controlled dense coding using GHZ state for smart home scenario. Wireless Person Commun 123(1):295–309

    Article  Google Scholar 

  36. Al-Hazaimeh OM, Abu-Ein AA, Al-Nawashi MM, Gharaibeh NY (2022) Chaotic based multimedia encryption: a survey for network and Internet security. Bulletin of Electrical Engineering and Informatics 11(4):2151–2159

    Article  Google Scholar 

  37. Maolood AT, Gbashi EK, Mahmood ES (2022) Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map. Int J Electric Comput Eng 12(5):2088–8708

    Google Scholar 

  38. Tabash FK, Izharuddin M (2019) Efficient encryption technique for H.264/AVC videos based on CABAC and logistic map. Multimed Tools Appl 78(6):7365–7379. https://doi.org/10.1007/s11042-018-6494-3

    Article  Google Scholar 

  39. Xu H, Tong X, Wang Z, Zhang M, Liu Y, Ma J (2020) Robust video encryption for h. 264 compressed bitstream based on cross-coupled chaotic cipher. Multimed Syst 26(4):363–381

    Article  Google Scholar 

  40. Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A new chaotic algorithm for video encryption. IEEE Transactions on Consumer Electronics 48(4):838–844

    Article  Google Scholar 

  41. Qin L, Zhang G, You L (2022) Application of CSK encryption algorithm in video synergic command systems. Journal of Organizational and End User Computing (JOEUC) 34(2):1–18

    Google Scholar 

  42. Hafsa A, Fradi M, Sghaier A, Malek J, Machhout M (2022) Real-time video security system using chaos-improved advanced encryption standard (IAES). Multimed Tools Appl 81(2):2275–2298

    Article  Google Scholar 

  43. Dua M, Makhija D, Manasa PYL, Mishra P (2022) D chaotic map-cosine transformation based approach to video encryption and decryption. Open Comput Sci 12(1):37–56

    Article  Google Scholar 

  44. Dua M, Kumar A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inform Technol 14(3):1627–1641

    Google Scholar 

  45. Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52(3):2556–2585

    Article  Google Scholar 

  46. Dua M, Suthar A, Garg A, Garg V (2021) An ILM-cosine transform-based improved approach to image encryption. Complex Intell Syst 7(1):327–343

    Article  Google Scholar 

  47. Jaroli P, Bisht A, Dua M, Dua S (2018) A color image encryption using four dimensional differential equations and Arnold chaotic map. Proceedings of the International Conference on Inventive Research in Computing Applications, ICIRCA 2018:869–876. https://doi.org/10.1109/ICIRCA.2018.8597310

    Article  Google Scholar 

  48. Bisht A, Dua M, Dua S (2018) A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. Ambient Intelligence and Humanized Computing 10(9):3519–3531. https://doi.org/10.1007/s12652-018-1072-0

    Article  Google Scholar 

  49. P. Deshmukh and V. Kolhe, “Modified AES based algorithm for MPEG video encryption,” in International Conference on Information Communication and Embedded Systems (ICICES2014), 2014, pp. 1–5.

  50. D. Ganeshkumar, A. Suresh, and K. Manigandan, “A new one round video encryption scheme based on 1D chaotic maps,” in 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), 2019, pp. 439–444.

  51. Wen D, Jiao W, Li X, Wan X, Zhou Y, Don X, Han W (2023) The EEG signals encryption algorithm with K-sine-transform-based coupling chaotic system. Inform Sci 622:962–984

    Article  Google Scholar 

  52. S. Gao, R. Wu, X. Wang, J. Liu, Q. Li, & X. Tang, X. “EFR-CSTP: encryption for face recognition based on the chaos and semi-tensor product theory. Inform Sci. 2023;621:766-781.

  53. Dhingra D, Dua M (2023) Medical video encryption using novel 2D cosine- sine map and dynamic DNA coding. Med Biol Eng Comput 62:1–19

    Google Scholar 

  54. Dhingra D, Dua M. A chaos-based novel approach to video encryption using dynamic S-box. Multimed Tools Appl. 83:1-31.

Download references

Acknowledgements

Not applicable.

Funding

The work did not receive any funding from any resource.

Author information

Authors and Affiliations

Authors

Contributions

Ms. S designed the proposed scheme, Dr. MD implemented and analysed the work, Dr. SD performed the result analysis, and Ms. DD was a major contributor in writing the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Deepti Dhingra.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumari, S., Dua, M., Dua, S. et al. A novel Cosine-Cosine chaotic map-based video encryption scheme. J. Eng. Appl. Sci. 71, 36 (2024). https://doi.org/10.1186/s44147-024-00376-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s44147-024-00376-z

Keywords