Performances Study of a New Chaos-based Video Encryption Algorithm

© 2022 by IJCTT Journal
Volume-70 Issue-6
Year of Publication : 2022
Authors : Tianandrasana Romeo RAJAONARISON, Paul Auguste RANDRIAMITANTSOA
DOI :  10.14445/22312803/IJCTT-V70I6P104

How to Cite?

Tianandrasana Romeo RAJAONARISON, Paul Auguste RANDRIAMITANTSOA, "Performances Study of a New Chaos-based Video Encryption Algorithm," International Journal of Computer Trends and Technology, vol. 70, no. 6, pp. 30-43, 2022. Crossref,

The principle of chaos encryption consists of adding a chaotic signal to the message to be transmitted. the transmitter sends to a receiver this chaotic signal where the message is drowned. Knowing the characteristics of the initial chaotic signal lets the receiver know how to extract the message from the received signal. in this paper, we propose a new chaos-based video encryption method and study its performance. the approach of Chaos-based video encryption is implemented in Matlab to encrypt AVI format videos. Choosing an algorithm based on chaos allows us to improve the time/robustness ratio by making the best use of chaotic sequences. the results of tests and evaluations show the performances of our systems. Among these results, we obtained PSNR values up to 8.14, NPCR values around 99.99%, and entropy values up to 7.99.

Attractor, Chaos, Confusion, Encryption, Video.


[1] G.D. Eddine, “Logistic Function and Chaotic Standard for the Encryption of Satellite Images,” Mentouri University of Constantine, 2010.
[2] Al Nahian, S., “Hosen, Z. and Ahmed, P. “An Elementary Study of Chaotic Behaviors in 1-D Maps,” Journal of Applied Mathematics and Physics, 2019 .
[3] L. Laurent., “ Chaos Cryptography Using Nonlinear Delay Dynamics,” University of Franche-Comté, 2002 .
[4] M. Madani, Y. Bentoutou, “Encryption of Medical Images Based on Chaotic Maps, University of Sidi-Bel-Abbes,” 2015 .
[5] M. Nsreddine, “Clifford Attractor-Based Encryption,” Abou Bekr Belkaid University, 2017 .
[6] A.S. Nassim, “Chaos-Based Cryptography and Image Encryption,” University of Applied Sciences Lucbeck Germany, 2012 .PDCA12- 70 Datasheet,Optospeedsa, Mezzovico, Switzerland.
[7] Junqin Zhao, Weichuang Guo, and Ruisong Ye, “A Chaos-Based Image Encryption Scheme Using Permutation-Substitution Architecture,” International Journal of Computer Trends and Technology IJCTT , 2014 .
[8] S. Ahadpour, Y. Sandra, “A Chaos-Based Image Encryption Scheme Using Chaotic Coupled Map Lattices,” University of Mohaghegh Ardabili, Iran, 2012 .
[9] G. A. Sathishkumar, K.B. Bagan, N. Sriraam, “Image Encryption Based on Diffusion and Multiple Chaotic Maps ,” International Journal of Network Security & Its Applications IJNSA , 2011 .
[10] S. Abdullah, Z. Hosen, P. Ahmed, “Elementary Study of Chaotic,” Journal of Applied Mathematics and Physics, Vol. 7, No. 5, 2019 .
[11] S. Li, G. Chen, X. Zheng, “Chaos-Based Encryption for Digital Image and Video,” Multimedia Encryption and Authentication Techniques and Applications, CRC Press, 2006 .
[12] I. Yasser, M.A. Mohamed, A. S. Samra, F. Khalifa, “A Chaotic Based Encryption/Decryption Framework for Secure Multimedia Communications, Entropy,” 2020 . Www.Mdpi.Com/Journal/Entropy.
[13] M.Alawida,, A. Samsudin, J.S Teh, Alkhawaldeh, R.S. “A New Hybrid Digital Chaotic System with Applications in Image Encryption. Signal Process, “, Vol. 160 , Pp. 45–58, 2019.
[14] S. Su, Y. Su, M. Xu, “Comparisons of Firefly Algorithm with Chaotic Maps. Comput. Model, ” New Technol. Vol. 18, Pp.326–332, 2014.
[15] R. Enayatifar, “Image Encryption Via Logistic Map Function and Heap Tree,” Int. J. Phys. Sci, Vol.6 , Pp.221–228, 2011.
[16] E. Chen, L.Q. Min, D.D. Han, “A Chaotic System with One Line Equilibria and Image Encryption with Avalanche Effects,” in Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science-EEEIS2015, Pp.737–754, 2015.
[17] J.Q. Kadhim, M.K. Alazawi, “ Speech Scrambling Employing Lorenz Fractional Order Chaotic System,” J. Eng. Sustain. Dev, Vol. 17 Pp. 195–211, 2013.
[18] S.F. Yousif, “Speech Encryption Based on Zaslavsky Map,” J. Eng. Appl. Sci, Vol. 14 , Pp.6392–6399, 2019.
[19] J. Wu, X. Liao, B. Yang, “Image Encryption Using 2D Hénon-Sine Map and DNA Approach. Signal Process,” Vol. 153 , Pp.11–23, 2018.
[20] S. Dhall, S.K. Pal, K. Sharma, “A Chaos-Based Probabilistic Block Cipher for Image Encryption,” Journal of King Saud University, Pp. 1533-1543, 2018.
[21] I. Yasser, F. Khalifa, M.A. Mohamed, A.S. Samrah, “A New Image Encryption Scheme Based on Hybrid Chaotic Maps,” Complexity, 2020
[22] Z. Su, S. Lian, G. Zhang, J. Jiang, “Chaos-Based Video Encryption Algorithms,” Chaos-Based Cryptography, SCI 354, Pp. 205–226, 2011.
[23] S. Lian, “Efficient Image or Video Encryption Based on Spatiotemporal Chaos System,” Chaos, Solitons and Fractals , Vol.40, Pp. 2509– 2519, 2009.
[24] L. Kocarev, Z. Galias, S. Lian, “Intelligent Computing Based on Chaos,” Springer, Heidelberg, 2009.
[25] S. Lian, J. Sun, G. Liu, Z. Wang, “Efficient Video Encryption Scheme Based on Advanced Video Coding,” Multimed. Tools Appl, Pp. 75– 89, 2008.