A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm
Main Article Content
Abstract
Text encryption in video is a vital tool in many industries where protecting sensitive information is of highest concern. Algorithms and automated detection methods commonly struggle to locate hidden text in video frames. This resistance increases the security of the concealed information because it is challenging for uninvited parties to detect the presence of encrypted text. This research suggests a novel method for text encryption inside video utilizing the Salsa20 encryption algorithm and Harris Corner Detection. The goal of this study is to increase the secrecy and security of textual information that is embedded in video content. First step is locateing important corners or spots inside the video frames, the Harris Corner Detection method is first used. These corners act as strong feature points that can be used to incorporate text. Without degrading the video's overall visual quality, the Harris Corner Detection method aids in precisely localizing the places where text may be concealed. Second, the encryption key is generated using the Salsa20 encryption technique. Salsa20 is a popular stream cipher that offers reliable encryption and effective operation. The embedded text is converted into a cipher text by XOR it with the encryption key before embedding it in the video, guaranteeing its confidentiality and protecting it from unauthorized access. Comparing the suggested method to current text encryption methods reveals a number of advantages. The Harris Corner Detection technique integrates text into video frames so that it blends in less noticeably, making it more difficult for adversaries to identify the existence of hidden information. Salsa20's use further guarantees the encrypted text's high level of security and protection, defending it against potential attacks. The proposed system is evaluated using MSE, PSNR, correlation, NPCR, UACI and entropy, these evaluation metrics provide excellent results.
Received 31/05/2023,
Revised 27/10/2023,
Accepted 29/10/2023,
Published Online First 25/12/2023
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
Sudhakar putheti, K. Anupriya, G. Harshitha, K. Saritha, K. Kamal Kethura. A Persistent Approach For Secure Text Transmission Utilizing Video Cryptography. Int J Creat Res Thoughts. 2018 March; 6(1): 558-562. https://ijcrt.org/papers/IJCRT1803173.pdf
Ali Y H, Ressan H A. Image Encryption Using Block Cipher Based Serpent Algorithm. Eng Technol J. 2016; 34(2) Part (B) Scientific: 278-286. https://www.uotechnology.edu.iq/dep-cs/mypdf/research/2015/r36.pdf
Wahab H B A, Mahdi S I. Speech Encryption Based on Wavelet Transformation and Chaotic Map. Eng Technol J. 2016; 34(5) Part (B) Scientific: 721-729. https://www.uotechnology.edu.iq/tec_magaz/2016/volum342016/No.05.B.2016/[12]Text.pdf.
Wu Y. Research on feature point extraction and matching machine learning method based on light field imaging. Neural Comput Appl. 2019; 31(12): 8157-8169. https://dx.doi.org/10.1007/s00521-018-3962-7
Shakir H R, George L E, Tuma G K. Partial Encryption for Colored Images Based on Face Detection. Int J Adv Res Comput Sci Soft Eng. 2015; 5(8): 25–35. https://www.researchgate.net/publication/281321758_Partial_Encryption_for_Colored_Images_Based_on_Face_Detection
Alsaedi EM, Farhan A kadhim. Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption. Baghdad Sci. J. 2023 Feb; 20(1): 0206. https://doi.org/10.21123/bsj.2022.6550.
Salim KG, Al-alak SMK, Jawad MJ. Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES. Baghdad Sci J. 2021 Jun;18(2): 0417. https://doi.org/10.21123/bsj.2021.18.2.0417 .
Fadhil Abbas Fadhil, Mohamed Ali, Nikolai Safiullin. The study on usage of table functions instead of basic operators inside encryption algorithm.Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology. 2022; p. 320-323, https://dx.doi.org/10.1109/USBEREIT56278.2022.9923412.
Natiq H, Al-Saidi NMG, Obaiys S J, Mahdi M N, Farhan A K. Image Encryption Based on Local Fractional Derivative Complex Logistic Map. Symmetry. 2022; 14(9): 1874. https://doi.org/10.3390/sym14091874
Hussien F T A, Rahma A M S , Wahab H B A. A Block Cipher Algorithm Based on Magic Square for Secure E-bank Systems. CMC Jr. 2022; 73(1): 1329–1346. https://dx.doi.org/10.32604/cmc.2022.027582.
Hussien F T A, Rahma A M S , Wahab H B A. A Secure E-commerce Environment Using Multi-agent System. Intell Autom Soft Comput. 2022; 34(1): 499–514. https://dx.doi.org/10.32604/iasc.2022.025091.
Abdulmohsin H A, Abdul wahab H B A, Abdul hossen A M J. A new proposed statistical feature extraction method in speech emotion recognition. Comput Electr Eng. 2021; 93: 107172. https://doi.org/10.1016/j.compeleceng.2021.107172.
Kareem S M , Rahma A M S.New method for improving add round key in the advanced encryption standard algorithm. Info Sec Jr. 2021; 30(6): 371–383. https://doi.org/10.1080/19393555.2020.1859654.
Ibrahem M K , Hamood L. A. Video Encryption Based on Chaotic System and Stream Cipher. Iraqi J Inf Commun Technol. 2018; 1(2): 33-40. https://doi.org/10.31987/ijict.1.2.19.
Nidaa F Hassan, Rusul N Abbas. Proposed Video Watermarking Algorithm Based On Edges Or Corner Regions . Eng Technol J. 2018; 36(01 Part B):25- 32.
Firas A Abdullatif, Alaa A Abdullatif, Amna al-Saffar. Hiding Techniques For Dynamic Encryption Text Based On Corner Point. IOP Conf Series: J Phys Conf Ser 1003. 2018; 012027: 1-10. https://dx.doi.org/10.1088/1742-6596/1003/1/012027
Sharif Shah Newaj Bhuiyan, Othman O Khalifa. Efficient 3D stereo vision stabilization for multi-camera viewpoints. Bull Electr Eng Inform 2019; 8(3): 882-889. https://dx.doi.org/10.11591/eei.v8i3.1518
Revanna C R. Keshavamurthy C . A new partial image encryption method for document images using variance based quad tree decomposition. Int J Electr Comput Eng. 2020; 10(1): 786–800. http://doi.org/10.11591/ijece.v10i1.pp786-800
Cheng S, Wang L, Ao N, Han Q. A Selective Video Encryption Scheme Based on Coding Characteristics,” Symmetry (Basel)., 2020;12(3): 32. https://dx.doi.org/10.3390/sym12030332.
Abdulmunem IA, Harba ES, Harba HS. Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks. Baghdad Sci J. 2021 Dec; 18(4): 1317. http://dx.doi.org/10.21123/bsj.2021.18.4.1317
Alawi A R, Hassan N F. A proposal video encryption using light stream algorithm. Eng Technol J. 2021; 39(01 Part B): 184-196. https://dx.doi.org/10.30684/ETJ.V39I1B.1689
Khudair ET, Naser EF, Mazher AN. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy. Baghdad Sci. J. 2022 Dec.; 19(6): 1378. https://doi.org/10.21123/bsj.2022.6398 .
Javier S´anchez, Nelson Monz´on, Agust´ın Salgado. An Analysis and Implementation of the Harris Corner Detector. Image Processing On line 2018; 8(2018): 305-328. https://doi.org/10.5201/ipol.2018.229.
Mazher A N, Waleed J, Maolood A T. Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review. Journal of Al-Qadisiyah for Computer Science and Mathematics. 2021; 13(2): 11-22. https://doi.org/10.29304/jqcm.2021.13.2.788.
Malladar R, Kunte R S. Selective Video Encryption Based on Entropy Measure. Integrated Intelligent Computing, Communication and Security, Springer, 2019, 603—612 p. https://dx.doi.org/10.1007/978-981-10-8797-4_61.
Jolfaei A, Mirghadri A. Survey: Image Encryption Using Salsa20. Int J Comput Sci. 2010; 7(5): 213–220. https://www.researchgate.net/publication/265651103_Survey_Image_Encryption_Using_Salsa20.
Ali N H M , Rahma A S, Jamil A S.Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n). Iraqi J Sci. 2015; 56(4B): 3240–3245. https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/9431.
Ramasamy P, Ranganathan V, Kadry S, Damaševičius R, Blažauskas T. An image encryption scheme based on block scrambling modified zigzag transformation and key generation using enhanced logistic - Tent map. Entropy. 2019; 1 (7): 656. https://doi.org/10.3390/e21070656.
Wu Yue. Research on feature point extraction and matching machine learning method based on light field imaging. Neural Com Appl. 2019; 31(12): 8157-8169. https://dx.doi.org/101007/s00521-018-3962-7 .
Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi. Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption. Int J Interact Mob Technol. 2023; 17(10): 193–211. https://doi.org/10.3991/ijim.v17i10.38787