{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T03:07:35Z","timestamp":1778814455038,"version":"3.51.4"},"reference-count":44,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,24]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Data security is vital for multimedia communication. A number of cryptographic algorithms have been developed for the secure transmission of text and image data. Very few contributions have been made in the area of video encryption because of the large input data size and time constraints. However, due to the massive increase in digital media transfer within networks, the security of video data has become one of the most important features of network reliability. Block encryption techniques and 1D-chaotic maps have been previously used for the process of video encryption. Although the results obtained by using 1D-chaotic maps were quite satisfactory, the approach had many limitations as these maps have less dynamic behavior. To overcome these drawbacks, this article proposes an Intertwining Logistic Map (ILM)-Cosine transformation-based video encryption technique. The first step involved segmenting the input video into multiple frames based on the frames per second (FPS) value and the length of the video. Next, each frame was selected, and the correlation among the pixels was reduced by a process called permutation\/scrambling. In addition, each frame was rotated by 90\u00b0 in the anticlockwise direction to induce more randomness into the encryption process. Furthermore, by using an approach called the random order substitution technique, changes were made in each of the images, row-wise and column-wise. Finally, all the encrypted frames were jumbled according to a frame selection key and were joined to generate an encrypted video, which was the output delivered to the user. The efficiency of this method was tested based on the state of various parameters like Entropy, Unified Average Change in Intensity (UACI), and correlation coefficient (CC). The presented approach also decrypts the encrypted video, and the decryption quality was checked using parameters such as mean square error (MSE) and peak signal-to-noise ratio (PSNR).<\/jats:p>","DOI":"10.1515\/comp-2020-0225","type":"journal-article","created":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T17:40:16Z","timestamp":1645897216000},"page":"37-56","source":"Crossref","is-referenced-by-count":41,"title":["3D chaotic map-cosine transformation based approach to video encryption and decryption"],"prefix":"10.1515","volume":"12","author":[{"given":"Mohit","family":"Dua","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, National Institute of Technology , Kurukshetra , Haryana 136119 , India"}]},{"given":"Drishti","family":"Makhija","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, National Institute of Technology , Kurukshetra , Haryana 136119 , India"}]},{"given":"Pilla Yamini Lakshmi","family":"Manasa","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, National Institute of Technology , Kurukshetra , Haryana 136119 , India"}]},{"given":"Prashant","family":"Mishra","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, National Institute of Technology , Kurukshetra , Haryana 136119 , India"}]}],"member":"374","published-online":{"date-parts":[[2022,2,24]]},"reference":[{"key":"2022081707553248404_j_comp-2020-0225_ref_001","unstructured":"M. Agrawal and P. Mishra, \u201cA comparative survey on symmetric key encryption techniques,\u201d Int. J. Computer Sci. Eng., vol. 4, no. 5. p. 877, 2012."},{"key":"2022081707553248404_j_comp-2020-0225_ref_002","unstructured":"A. Lindahl, M. Girish, and C. Duvivier, U.S. Patent Application No. 11\/247,955, 2007."},{"key":"2022081707553248404_j_comp-2020-0225_ref_003","doi-asserted-by":"crossref","unstructured":"S. Lian, Multimedia content encryption: techniques and applications, CRC press, 2008.","DOI":"10.1201\/9781420065282"},{"key":"2022081707553248404_j_comp-2020-0225_ref_004","unstructured":"L. Qiao and K. Nahrstedt, \u201cA new algorithm for MPEG video encryption,\u201d Proc. of First International Conference on Imaging Science System and Technology, 1997, July, pp. 21\u201329."},{"key":"2022081707553248404_j_comp-2020-0225_ref_005","doi-asserted-by":"crossref","unstructured":"C. Shi and B. Bhargava, \u201cA fast MPEG video encryption algorithm,\u201d Proceedings of the sixth ACM international conference on Multimedia, 1998, September, pp. 81\u201388.","DOI":"10.1145\/290747.290758"},{"key":"2022081707553248404_j_comp-2020-0225_ref_006","unstructured":"C. Shi and B. Bhargava, \u201cAn efficient MPEG video encryption algorithm,\u201d Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No. 98CB36281), IEEE, 1998, October, pp. 381\u2013386."},{"key":"2022081707553248404_j_comp-2020-0225_ref_007","doi-asserted-by":"crossref","unstructured":"B. Bhargava, C. Shi, and S. Y. Wang, \u201cMPEG video encryption algorithms,\u201d Multimed. Tools Appl., vol. 24, no. 1. pp. 57\u201379, 2004.","DOI":"10.1023\/B:MTAP.0000033983.62130.00"},{"key":"2022081707553248404_j_comp-2020-0225_ref_008","doi-asserted-by":"crossref","unstructured":"S. S. Maniccam and N. G. Bourbakis, \u201cImage and video encryption using SCAN patterns,\u201d Pattern Recognit., vol. 37, no. 4. pp. 725\u2013737, 2004.","DOI":"10.1016\/j.patcog.2003.08.011"},{"key":"2022081707553248404_j_comp-2020-0225_ref_009","doi-asserted-by":"crossref","unstructured":"S. Li, G. Chen, and X. Zheng, \u201cChaos-based encryption for digital image and video,\u201d Multimedia Encryption and Authentication Techniques and Applications, 2006, p. 129.","DOI":"10.1201\/9781420013450-4"},{"key":"2022081707553248404_j_comp-2020-0225_ref_010","doi-asserted-by":"crossref","unstructured":"C. N. Raju, G. Umadevi, K. Srinathan, and C. V. Jawahar, \u201cFast and secure real-time video encryption,\u201d 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing, Bhubaneswar, India: IEEE, 2008, December, pp. 257\u2013264.","DOI":"10.1109\/ICVGIP.2008.100"},{"key":"2022081707553248404_j_comp-2020-0225_ref_011","doi-asserted-by":"crossref","unstructured":"S. Lian, \u201cEfficient image or video encryption based on spatiotemporal chaos system,\u201d Chaos, Solitons & Fractals, vol. 40, no. 5. pp. 2509\u20132519, 2009.","DOI":"10.1016\/j.chaos.2007.10.054"},{"key":"2022081707553248404_j_comp-2020-0225_ref_012","doi-asserted-by":"crossref","unstructured":"P. Deshmukh and V. Kolhe, \u201cModified AES based algorithm for MPEG video encryption,\u201d International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India: IEEE, 2014, February, pp. 1\u20135.","DOI":"10.1109\/ICICES.2014.7033928"},{"key":"2022081707553248404_j_comp-2020-0225_ref_013","doi-asserted-by":"crossref","unstructured":"M. Altaf, A. Ahmad, F. A. Khan, Z. Uddin, and X. Yang, \u201cComputationally efficient selective video encryption with chaos based block cipher,\u201d Multimed. Tools Appl., vol. 77, no. 21. pp. 27981\u201327995, 2018.","DOI":"10.1007\/s11042-018-6022-5"},{"key":"2022081707553248404_j_comp-2020-0225_ref_014","doi-asserted-by":"crossref","unstructured":"F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni, and M. Reginelli, \u201cA new chaotic algorithm for video encryption,\u201d IEEE Trans. Consum. Electron., vol. 48, no. 4. pp. 838\u2013844, 2002.","DOI":"10.1109\/TCE.2003.1196410"},{"key":"2022081707553248404_j_comp-2020-0225_ref_015","unstructured":"Y. Li, L. Liang, Z. Su, and J. Jiang, \u201cA new video encryption algorithm for H. 264,\u201d In 2005 5th International Conference on Information Communications & Signal Processing, Bangkok: IEEE, 2005 December, pp. 1121\u20131124."},{"key":"2022081707553248404_j_comp-2020-0225_ref_016","doi-asserted-by":"crossref","unstructured":"C. N. Raju, G. Umadevi, K. Srinathan, and C. V. Jawahar, \u201cFast and Secure Real-Time Video Encryption,\u201d 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing, Bhubaneswar: IEEE, 2008, pp. 257\u2013264.","DOI":"10.1109\/ICVGIP.2008.100"},{"key":"2022081707553248404_j_comp-2020-0225_ref_017","doi-asserted-by":"crossref","unstructured":"D. M. Dumbere and N. J. Janwe, \u201cVideo encryption using AES algorithm,\u201d Second International Conference on Current Trends In Engineering and Technology - ICCTET 2014, Coimbatore: IEEE, 2014, pp. 332\u2013337.","DOI":"10.1109\/ICCTET.2014.6966311"},{"key":"2022081707553248404_j_comp-2020-0225_ref_018","doi-asserted-by":"crossref","unstructured":"M. Preishuber, T. H\u00fctter, S. Katzenbeisser, and A. Uhl, \u201cDepreciating motivation and empirical security analysis of chaos-based image and video encryption,\u201d IEEE Trans. Inf. Forensics Security, vol. 13, no. 9. pp. 2137\u20132150, 2018.","DOI":"10.1109\/TIFS.2018.2812080"},{"key":"2022081707553248404_j_comp-2020-0225_ref_019","doi-asserted-by":"crossref","unstructured":"W. Wen, R. Tu and K. Wei, \u201cVideo frames encryption based on DNA sequences and chaos,\u201d Eleventh International Conference on Digital Image Processing (ICDIP 2019), vol. 11179, International Society for Optics and Photonics, 2019, August, p. 111792T.","DOI":"10.1117\/12.2540057"},{"key":"2022081707553248404_j_comp-2020-0225_ref_020","doi-asserted-by":"crossref","unstructured":"R. Ranjith kumar, D. Ganeshkumar, A. Suresh, and K. Manigandan, \u201cA new one Round video encryption scheme based on 1D chaotic maps,\u201d 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India: IEEE, 2019, pp. 439\u2013444.","DOI":"10.1109\/ICACCS.2019.8728443"},{"key":"2022081707553248404_j_comp-2020-0225_ref_021","doi-asserted-by":"crossref","unstructured":"G. Ye and X. Huang, \u201cAn efficient symmetric image encryption algorithm based on an intertwining logistic map,\u201d Neurocomputing, vol. 251, pp. 45\u201353, 2017.","DOI":"10.1016\/j.neucom.2017.04.016"},{"key":"2022081707553248404_j_comp-2020-0225_ref_022","doi-asserted-by":"crossref","unstructured":"Z. Hua, F. Jin, B. Xu, and H. Huang, \u201c2D Logistic-Sine-coupling map for image encryption,\u201d Signal. Process., vol. 149, pp. 148\u2013161, 2018.","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"2022081707553248404_j_comp-2020-0225_ref_023","doi-asserted-by":"crossref","unstructured":"Z. Hua, Y. Zhou, and H. Huang, \u201cCosine-transform-based chaotic system for image encryption,\u201d Inf. Sci., vol. 480, pp. 403\u2013419, 2019.","DOI":"10.1016\/j.ins.2018.12.048"},{"key":"2022081707553248404_j_comp-2020-0225_ref_024","doi-asserted-by":"crossref","unstructured":"M. R. Guevara and L. Glass, \u201cPhase locking, period doubling bifurcations and chaos in a mathematical model of a periodically driven oscillator: A theory for the entrainment of biological oscillators and the generation of cardiac dysrhythmias,\u201d J. Math. Biol., vol. 14, no. 1. pp. 1\u201323, 1982.","DOI":"10.1007\/BF02154750"},{"key":"2022081707553248404_j_comp-2020-0225_ref_025","doi-asserted-by":"crossref","unstructured":"X. Lu, D. Clements-Croome, and M. Viljanen, \u201cIntegration of chaos theory and mathematical models in building simulation: part I: Literature review,\u201d Autom. Constr., vol. 19, no. 4. pp. 447\u2013451, 2010.","DOI":"10.1016\/j.autcon.2010.01.002"},{"key":"2022081707553248404_j_comp-2020-0225_ref_026","doi-asserted-by":"crossref","unstructured":"K. Mischaikow and M. Mrozek, \u201cChaos in the Lorenz equations: a computer-assisted proof,\u201d Bull. Am. Math. Soc., vol. 32, no. 1. pp. 66\u201372, 1995.","DOI":"10.1090\/S0273-0979-1995-00558-6"},{"key":"2022081707553248404_j_comp-2020-0225_ref_027","doi-asserted-by":"crossref","unstructured":"J. Fridrich, \u201cImage encryption based on chaotic maps,\u201d 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 2, Orlando, FL, USA: IEEE, 1997, October, pp. 1105\u20131110.","DOI":"10.1109\/ICSMC.1997.638097"},{"key":"2022081707553248404_j_comp-2020-0225_ref_028","doi-asserted-by":"crossref","unstructured":"S. C. Phatak and S. S. Rao, \u201cLogistic map: A possible random-number generator,\u201d Phys. Rev. E, vol. 51, no. 4. p. 3670, 1995.","DOI":"10.1103\/PhysRevE.51.3670"},{"key":"2022081707553248404_j_comp-2020-0225_ref_029","doi-asserted-by":"crossref","unstructured":"J. Fridrich, \u201cSymmetric ciphers based on two-dimensional chaotic maps,\u201d Int. J. Bifurc. chaos, vol. 8, no. 6. pp. 1259\u20131284, 1998.","DOI":"10.1142\/S021812749800098X"},{"key":"2022081707553248404_j_comp-2020-0225_ref_030","unstructured":"P. N. Khade and M. Narnaware, \u201c3D chaotic functions for image encryption,\u201d Int. J. Computer Sci. Issues (IJCSI), vol. 9, no. 3. p. 323, 2012."},{"key":"2022081707553248404_j_comp-2020-0225_ref_031","doi-asserted-by":"crossref","unstructured":"M. Kumar, S. Kumar, R. Budhiraja, M. K. Das, and S. Singh, \u201cIntertwining logistic map and Cellular Automata based color image encryption model,\u201d 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India: IEEE, 2016, March, pp. 618\u2013623.","DOI":"10.1109\/ICCTICT.2016.7514653"},{"key":"2022081707553248404_j_comp-2020-0225_ref_032","doi-asserted-by":"crossref","unstructured":"R. M. Lin and T. Y. Ng, \u201cSecure image encryption based on an ideal new nonlinear discrete dynamical system,\u201d Math. Probl. Eng., p. 2018, 2018.","DOI":"10.1155\/2018\/6797386"},{"key":"2022081707553248404_j_comp-2020-0225_ref_033","doi-asserted-by":"crossref","unstructured":"X. Wang and D. Xu, \u201cImage encryption using genetic operators and intertwining logistic map,\u201d Nonlinear Dyn., vol. 78, no. 4. pp. 2975\u20132984, 2014.","DOI":"10.1007\/s11071-014-1639-z"},{"key":"2022081707553248404_j_comp-2020-0225_ref_034","doi-asserted-by":"crossref","unstructured":"B. K. Nancharla and M. Dua, \u201cAn image encryption using intertwining logistic map and enhanced logistic map,\u201d 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India: IEEE, 2020, June, pp. 1309\u20131314.","DOI":"10.1109\/ICCES48766.2020.9138102"},{"key":"2022081707553248404_j_comp-2020-0225_ref_035","doi-asserted-by":"crossref","unstructured":"M. Dua, A. Suthar, A. Garg, and V. Garg, \u201cAn ILM-cosine transform-based improved approach to image encryption,\u201d Complex. & Intell. Syst., pp. 1\u201317, 2020.","DOI":"10.1007\/s40747-020-00201-z"},{"key":"2022081707553248404_j_comp-2020-0225_ref_036","doi-asserted-by":"crossref","unstructured":"H. Gilbert and H. Handschuh, \u201cSecurity analysis of SHA-256 and sisters,\u201d International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, Springer, 2003, August, pp. 175\u2013193.","DOI":"10.1007\/978-3-540-24654-1_13"},{"key":"2022081707553248404_j_comp-2020-0225_ref_037","doi-asserted-by":"crossref","unstructured":"S. Gueron, S. Johnson, and J. Walker, \u201cSHA-512\/256,\u201d 2011 Eighth International Conference on Information Technology: New Generations, Las Vegas, NV, USA: IEEE, 2011, April, pp. 354\u2013358.","DOI":"10.1109\/ITNG.2011.69"},{"key":"2022081707553248404_j_comp-2020-0225_ref_038","doi-asserted-by":"crossref","unstructured":"D. Valli and K. Ganesan, \u201cChaos based video encryption using maps and Ikeda time delay system,\u201d Europian Phys. J. plus, vol. 132, p. 542, 2017, 10.1140\/epjp\/i2017-11819-7","DOI":"10.1140\/epjp\/i2017-11819-7"},{"key":"2022081707553248404_j_comp-2020-0225_ref_039","unstructured":"Y. Wu, J. P. Noonan, and S. Agaian, \u201cNPCR and UACI randomness tests for image encryption,\u201d Cyber J.: Multidiscip. journals Sci. Technol. J. Sel. Areas Telecommun. (JSAT), vol. 1, no. 2. pp. 31\u201338, 2011."},{"key":"2022081707553248404_j_comp-2020-0225_ref_040","doi-asserted-by":"crossref","unstructured":"P. Deshmukh and V. Kolhe, \u201cModified AES based algorithm for MPEG video encryption,\u201d International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai: IEEE, 2014, pp. 1\u20135. 10.1109\/ICICES.2014.7033928.","DOI":"10.1109\/ICICES.2014.7033928"},{"key":"2022081707553248404_j_comp-2020-0225_ref_041","doi-asserted-by":"crossref","unstructured":"M. Dua, A. Wesanekar, V. Gupta, M. Bhola, and S. Dua, \u201cDifferential evolution optimization of intertwining logistic map-DNA based image encryption technique,\u201d J. Ambient. Intell. Humanized Comput., vol. 11, no. 9, pp. 1\u201316, 2019.","DOI":"10.1007\/s12652-019-01580-z"},{"key":"2022081707553248404_j_comp-2020-0225_ref_042","doi-asserted-by":"crossref","unstructured":"A. Bisht, M. Dua, and S. Dua, \u201cA novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform,\u201d J. Ambient. Intell. Humanized Comput., vol. 10, no. 9. pp. 3519\u20133531, 2019.","DOI":"10.1007\/s12652-018-1072-0"},{"key":"2022081707553248404_j_comp-2020-0225_ref_043","doi-asserted-by":"crossref","unstructured":"M. Dua, A. Wesanekar, V. Gupta, M. Bhola, and S. Dua, \u201cColor image Encryption using synchronous CML-DNA and weighted bi-objective genetic algorithm,\u201d Proceedings of the 3rd International Conference on Big Data and Internet of Things, 2019, August, pp. 121\u2013125.","DOI":"10.1145\/3361758.3361780"},{"key":"2022081707553248404_j_comp-2020-0225_ref_044","doi-asserted-by":"crossref","unstructured":"A. Bisht, M. Dua, S. Dua, and P. Jaroli, \u201cA color image encryption technique based on bit-level permutation and alternate logistic maps,\u201d J. Intell. Syst., vol. 29, no. 1. pp. 1246\u20131260, 2019.","DOI":"10.1515\/jisys-2018-0365"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0225\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0225\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T10:15:52Z","timestamp":1726740952000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0225\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,16]]},"published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1515\/comp-2020-0225"],"URL":"https:\/\/doi.org\/10.1515\/comp-2020-0225","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}