![]() One method to accomplish this is encryption. īefore sending, certain private videos need to be secured. It can enhance the video compression efficiency, allowing for greater flexibility in storing and transferring videos when compared to Moving Picture Experts Groups. H.264/AVC advanced video coding is a popular format for coded video and one of the most recent video compression standards. For instance, only authorized parties can access multimedia content for video-on-demand, Internet television, video telephony, video conferencing, and military applications. Security of multimedia data has grown in importance in information communication and transmission due to the quick development of computer and Internet technology. This positive outcome indicates that the plan can be successfully implemented for secure video communication applications. Comparatively to other methods, the suggested algorithm is resistant to clipping, salt and pepper noise, speckle noise rotation assaults, and clipping. The information entropy, histogram, neighboring pixel correlation and sensitivity analysis, number of pixels changing regions (NPCR), and unified mean change intensity are used to thoroughly evaluate the recommended method's capacity to improve performance and security (UACI). The keystream closely resembles simple frames because the pixels in the permuted frame indicate which of the two even symmetric chaos maps is replicated each time for the following byte. ![]() ![]() The diffusion technique employs both linearly symmetric chaos maps and distorted tent maps to create key streams. The permutation procedure moves every frame pixel's position using a P-box created by permuting a linearly symmetric chaotic sequence. In this paper, a brand-new video scrambling technique based on two chaotic linearly symmetric maps and one chaotic tent map that has been twisted is suggested. To secure digital video, video encryption is frequently utilized. The massive growth and use of digital multimedia through computer networks, including video and images, have increased the demand for protecting this digital data. ![]()
0 Comments
Leave a Reply. |