{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:29:07Z","timestamp":1767421747434,"version":"3.48.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003009","name":"Science, Technology & Innovation Funding Authority","doi-asserted-by":"crossref","award":["45631"],"award-info":[{"award-number":["45631"]}],"id":[{"id":"10.13039\/501100003009","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11760-025-05022-6","type":"journal-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T06:53:34Z","timestamp":1766991214000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A real-time video encryption system using chaos"],"prefix":"10.1007","volume":"19","author":[{"given":"Sherif H.","family":"AbdElHaleem","sequence":"first","affiliation":[]},{"given":"Salwa K.","family":"Abd-El-Hafiz","sequence":"additional","affiliation":[]},{"given":"Ahmed G.","family":"Radwan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,29]]},"reference":[{"key":"5022_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470989418","volume-title":"The H.264 advanced video compression standard","author":"IE Richardson","year":"2010","unstructured":"Richardson, I.E.: The H.264 advanced video compression standard, 2nd edn. John Wiley and Sons, New Jersey (2010)","edition":"2"},{"key":"5022_CR2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0570","author":"SK Abd-El-Hafiz","year":"2014","unstructured":"Abd-El-Hafiz, S.K., Radwan, A.G., Abdel Haleem, S.H., Barakat, M.L.: A fractal-based image encryption system. IET Image Process. (2014). https:\/\/doi.org\/10.1049\/iet-ipr.2013.0570","journal-title":"IET Image Process."},{"key":"5022_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.04.023","author":"SK Abd-El-Hafiz","year":"2016","unstructured":"Abd-El-Hafiz, S.K., Abdelhaleem, S.H., Radwan, A.G.: Novel permutation measures for image encryption algorithms. Opt. Lasers Eng. (2016). https:\/\/doi.org\/10.1016\/j.optlaseng.2016.04.023","journal-title":"Opt. Lasers Eng."},{"issue":"5","key":"5022_CR4","first-page":"341","volume":"2","author":"N Keshaveni","year":"2009","unstructured":"Keshaveni, N., Ramachandran, S., Kargal, G.: Implementation of context adaptive variable length coder for H. 264 video encoder, FULL pap. Int. J. Recent Trends Eng 2(5), 341 (2009)","journal-title":"Int. J. Recent Trends Eng"},{"key":"5022_CR5","unstructured":"Bjontegaard, G.: Context-adaptive VLC (CVLC) coding of coefficients (2002)"},{"key":"5022_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815173","author":"D Marpe","year":"2003","unstructured":"Marpe, D., Schwarz, H., Wiegand, T.: Context-based adaptive binary arithmetic coding in the H.264\/AVC video compression standard. IEEE Trans. Circuits Syst. Video Technol. (2003). https:\/\/doi.org\/10.1109\/TCSVT.2003.815173","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"5022_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-019-0228-9","author":"S Velliangiri","year":"2019","unstructured":"Velliangiri, S.: Improved security in multimedia video surveillance using 2D discrete wavelet transforms and encryption framework. 3D Res. (2019). https:\/\/doi.org\/10.1007\/s13319-019-0228-9","journal-title":"3D Res."},{"key":"5022_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09200-1","author":"X Li","year":"2020","unstructured":"Li, X., Yu, H., Zhang, H., Jin, X., Sun, H., Liu, J.: Video encryption based on hyperchaotic system. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-09200-1","journal-title":"Multimed. Tools Appl."},{"key":"5022_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-022-02711-y","author":"KM Hosny","year":"2023","unstructured":"Hosny, K.M., Zaki, M.A., Lashin, N.A., Hamza, H.M.: Fast colored video encryption using block scrambling and multi-key generation. Vis. Comput. (2023). https:\/\/doi.org\/10.1007\/s00371-022-02711-y","journal-title":"Vis. Comput."},{"issue":"5","key":"5022_CR10","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11554-024-01547-0","volume":"21","author":"EA Aldakheel","year":"2024","unstructured":"Aldakheel, E.A., Khafaga, D.S., Zaki, M.A., Lashin, N.A., Hamza, H.M., Hosny, K.M.: Fast encryption of color medical videos for Internet of Medical Things. J. Real-Time Image Process. 21(5), 175 (2024). https:\/\/doi.org\/10.1007\/s11554-024-01547-0","journal-title":"J. Real-Time Image Process."},{"issue":"1","key":"5022_CR11","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1007\/s11760-023-02767-w","volume":"18","author":"Q Sheng","year":"2024","unstructured":"Sheng, Q., et al.: A fast selective encryption scheme for H.264\/AVC video with syntax-preserving and zero bit rate expansion. Signal Image Video Process. 18(1), 975\u2013989 (2024). https:\/\/doi.org\/10.1007\/s11760-023-02767-w","journal-title":"Signal Image Video Process."},{"issue":"5","key":"5022_CR12","doi-asserted-by":"publisher","first-page":"13369","DOI":"10.1007\/s11042-023-15448-010.1007\/s11042-023-15448-0","volume":"83","author":"W Jin","year":"2024","unstructured":"Jin, W., Jiandong, L., Haoqiang, X.: H.264\/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model. Multimed. Tools Appl. 83(5), 13369 (2024). https:\/\/doi.org\/10.1007\/s11042-023-15448-010.1007\/s11042-023-15448-0","journal-title":"Multimed. Tools Appl."},{"issue":"16","key":"5022_CR13","doi-asserted-by":"publisher","first-page":"21863","DOI":"10.1007\/s11071-025-11281-2","volume":"113","author":"X Liu","year":"2025","unstructured":"Liu, X., Ye, Q., Liu, W., Chen, Y., Zhou, Q., Kou, G.: A selective encryption scheme for HEVC videos based on 3D enhanced coupling chaotic system. Nonlinear Dyn. 113(16), 21863\u201321887 (2025). https:\/\/doi.org\/10.1007\/s11071-025-11281-2","journal-title":"Nonlinear Dyn."},{"key":"5022_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223355","author":"MA El-Mowafy","year":"2022","unstructured":"El-Mowafy, M.A., Gharghory, S.M., Abo-Elsoud, M.A., Obayya, M., Fath Allah, M.I.: Chaos based encryption technique for compressed H264\/AVC videos. IEEE Access (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3223355","journal-title":"IEEE Access"},{"key":"5022_CR15","doi-asserted-by":"publisher","unstructured":"Malladar, R.S., Sanjeev Kunte, R.: Selective video encryption using Chaos for H.264 videos applicable to Video on Demand (VoD) (2020) https:\/\/doi.org\/10.1109\/ICCES48766.2020.09137861","DOI":"10.1109\/ICCES48766.2020.09137861"},{"key":"5022_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7253-9","author":"Y Song","year":"2019","unstructured":"Song, Y., Zhu, Z., Zhang, W., Yu, H.: Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264\/Advanced Video Coding. Multimed. Tools Appl. (2019). https:\/\/doi.org\/10.1007\/s11042-019-7253-9","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"5022_CR17","doi-asserted-by":"publisher","first-page":"39","DOI":"10.11591\/ijict.v7i1.pp39-48","volume":"7","author":"FK Tabash","year":"2018","unstructured":"Tabash, F.K., Izharuddin, M.: Efficient encryption technique for H.264\/AVC videos based on CABAC and logistic map. Int J Informatics Commun Technol(IJ-ICT) 7(1), 39 (2018). https:\/\/doi.org\/10.11591\/ijict.v7i1.pp39-48","journal-title":"Int J Informatics Commun Technol(IJ-ICT)"},{"key":"5022_CR18","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2018.095686","author":"Y Cao","year":"2018","unstructured":"Cao, Y., Gong, W., Bai, S.: A flexible visual quality control algorithm for perceptual video encryption based on h.264. Int. J. Wireless Mobile Comput. (2018). https:\/\/doi.org\/10.1504\/IJWMC.2018.095686","journal-title":"Int. J. Wireless Mobile Comput."},{"key":"5022_CR19","doi-asserted-by":"publisher","DOI":"10.1049\/IET-IPR.2017.0022","author":"N Khlif","year":"2018","unstructured":"Khlif, N., Masmoudi, A., Kammoun, F., Masmoudi, N.: Secure chaotic dual encryption scheme for H.264\/AVC video conferencing protection. IET Image Process. (2018). https:\/\/doi.org\/10.1049\/IET-IPR.2017.0022","journal-title":"IET Image Process."},{"key":"5022_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3563-5","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Yu, S., Chen, P., L\u00fc, J., He, J., Lin, Z.: Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption. Nonlinear Dyn. (2017). https:\/\/doi.org\/10.1007\/s11071-017-3563-5","journal-title":"Nonlinear Dyn."},{"key":"5022_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09654-3","author":"N Dolati","year":"2021","unstructured":"Dolati, N., Beheshti, A., Azadegan, H.: A selective encryption for H.264\/AVC videos based on scrambling. Multimed. Tools Appl. (2021). https:\/\/doi.org\/10.1007\/s11042-020-09654-3","journal-title":"Multimed. Tools Appl."},{"key":"5022_CR22","doi-asserted-by":"crossref","unstructured":"Malladar, R.S., Sanjeev Kunte, R.: A lightweight selective video encryption using motion vectors and IPMs for H.264 Codec, In: Lecture notes on data engineering and communications technologies, 38 (2020)","DOI":"10.1007\/978-3-030-34080-3_67"},{"key":"5022_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2511879","author":"B Boyadjis","year":"2017","unstructured":"Boyadjis, B., Bergeron, C., Pesquet-Popescu, B., Dufaux, F.: Extended selective encryption of H.264\/AVC (CABAC)-and HEVC-encoded video streams. IEEE Trans. Circuits Syst. Video Technol. (2017). https:\/\/doi.org\/10.1109\/TCSVT.2015.2511879","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"5022_CR24","doi-asserted-by":"publisher","unstructured":"Gerhardt, C., Aichroth, P., Mann, S.: Selective face encryption in H.264 encoded videos in 2017 IEEE Visual Communications and Image Processing, VCIP 2017, 2018, vol. 2018-Janua, (2018). https:\/\/doi.org\/10.1109\/VCIP.2017.8305040","DOI":"10.1109\/VCIP.2017.8305040"},{"key":"5022_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3710-x","author":"F Peng","year":"2017","unstructured":"Peng, F., Gong, X., Long, M., Sun, X.: A selective encryption scheme for protecting H.264\/AVC video in multimedia social network. Multimed. Tools Appl. (2017). https:\/\/doi.org\/10.1007\/s11042-016-3710-x","journal-title":"Multimed. Tools Appl."},{"key":"5022_CR26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0492","author":"X Ding","year":"2017","unstructured":"Ding, X., Deng, Y., Yang, G., Song, Y., He, D., Sun, X.: Design of new scan orders for perceptual encryption of H.264\/AVC videos. IET Inf. Secur. (2017). https:\/\/doi.org\/10.1049\/iet-ifs.2015.0492","journal-title":"IET Inf. Secur."},{"key":"5022_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.02.017","author":"MN Asghar","year":"2017","unstructured":"Asghar, M.N., Kousar, R., Majid, H., Fleury, M.: Transparent encryption with scalable video communication: lower-latency, CABAC-based schemes. J. Vis. Commun. Image Represent. (2017). https:\/\/doi.org\/10.1016\/j.jvcir.2017.02.017","journal-title":"J. Vis. Commun. Image Represent."},{"key":"5022_CR28","doi-asserted-by":"publisher","DOI":"10.3390\/s150407953","author":"Y Chung","year":"2015","unstructured":"Chung, Y., Lee, S., Jeon, T., Park, D.: Fast video encryption using the H.264 error propagation property for smart mobile devices. Sensors (2015). https:\/\/doi.org\/10.3390\/s150407953","journal-title":"Sensors"},{"key":"5022_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2160-6","author":"MN Asghar","year":"2015","unstructured":"Asghar, M.N., Ghanbari, M., Fleury, M., Reed, M.J.: Sufficient encryption based on entropy coding syntax elements of H.264\/SVC. Multimed. Tools Appl. (2015). https:\/\/doi.org\/10.1007\/s11042-014-2160-6","journal-title":"Multimed. Tools Appl."},{"key":"5022_CR30","doi-asserted-by":"publisher","DOI":"10.3390\/e23111431","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., et al.: Design and arm-based implementation of bitstream-oriented chaotic encryption scheme for H.264\/AVC video. Entropy (2021). https:\/\/doi.org\/10.3390\/e23111431","journal-title":"Entropy"},{"key":"5022_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/sym12030332","author":"S Cheng","year":"2020","unstructured":"Cheng, S., Wang, L., Ao, N., Han, Q.: A selective video encryption scheme based on coding characteristics. Symmetry (2020). https:\/\/doi.org\/10.3390\/sym12030332","journal-title":"Symmetry"},{"key":"5022_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.115994","author":"J He","year":"2020","unstructured":"He, J., Xu, Y., Luo, W., Tang, S., Huang, J.: A novel selective encryption scheme for H.264\/AVC video with improved visual security. Signal Process. Image Commun. (2020). https:\/\/doi.org\/10.1016\/j.image.2020.115994","journal-title":"Signal Process. Image Commun."},{"key":"5022_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00648-7","author":"H Xu","year":"2020","unstructured":"Xu, H., Tong, X., Wang, Z., Zhang, M., Liu, Y., Ma, J.: Robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipher. Multimedia Syst. (2020). https:\/\/doi.org\/10.1007\/s00530-020-00648-7","journal-title":"Multimedia Syst."},{"key":"5022_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997725","author":"C Xu","year":"2020","unstructured":"Xu, C., Ren, W., Yu, L., Zhu, T., Choo, K.K.R.: A hierarchical encryption and key management scheme for layered access control on H.264\/SVC bitstream in the internet of things. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2997725","journal-title":"IEEE Internet Things J."},{"key":"5022_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/s19051228","author":"A Shifa","year":"2019","unstructured":"Shifa, A., Asghar, M.N., Noor, S., Gohar, N., Fleury, M.: Lightweight cipher for H.264 videos in the internet of multimedia things with encryption space ratio diagnostics. Sensors (2019). https:\/\/doi.org\/10.3390\/s19051228","journal-title":"Sensors"},{"key":"5022_CR36","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0349","author":"H Shen","year":"2014","unstructured":"Shen, H., Zhuo, L., Zhao, Y.: An efficient motion reference structure based selective encryption algorithm for H.264 videos. IET Inf. Secur. (2014). https:\/\/doi.org\/10.1049\/iet-ifs.2012.0349","journal-title":"IET Inf. Secur."},{"issue":"4","key":"5022_CR37","doi-asserted-by":"publisher","first-page":"819861","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 819861 (2004). https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans. Image Process."},{"key":"5022_CR38","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-22r1a","volume-title":"SP 800\u201322 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"LE Bassham","year":"2010","unstructured":"Bassham, L.E., et al.: SP 800\u201322 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology, Gaithersburg, MD (2010)"},{"key":"5022_CR39","unstructured":"Xiph.Org Foundation. https:\/\/media.xiph.org\/video\/derf\/"},{"key":"5022_CR40","unstructured":"H.264\/AVC reference JM 19.0 software. [Online]. Available: https:\/\/iphome.hhi.de\/suehring\/tml\/download\/"},{"key":"5022_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2015.07.002","author":"AG Radwan","year":"2016","unstructured":"Radwan, A.G., AbdElHaleem, S.H., Abd-El-Hafiz, S.K.: Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J. Adv. Res. (2016). https:\/\/doi.org\/10.1016\/j.jare.2015.07.002","journal-title":"J. Adv. Res."},{"key":"5022_CR42","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-17045-x","author":"SH AbdElHaleem","year":"2022","unstructured":"AbdElHaleem, S.H., Abd-El-Hafiz, S.K., Radwan, A.G.: A generalized framework for elliptic curves based PRNG and its utilization in image encryption. Sci. Rep. (2022). https:\/\/doi.org\/10.1038\/s41598-022-17045-x","journal-title":"Sci. Rep."},{"key":"5022_CR43","doi-asserted-by":"publisher","first-page":"115697","DOI":"10.1109\/ACCESS.2024.3445277","volume":"12","author":"SH AbdELHaleem","year":"2024","unstructured":"AbdELHaleem, S.H., Abd-El-Hafiz, S.K., Radwan, A.G.: Analysis and guidelines for different designs of pseudo random number generators. IEEE Access 12, 115697\u2013115715 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3445277","journal-title":"IEEE Access"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-05022-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-05022-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-05022-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:23:44Z","timestamp":1767421424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-05022-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":43,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5022"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-05022-6","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"16 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1460"}}