{"title":"基于正交矩阵的感知视频加密","authors":"S. Alhassan, M. M. Iddrisu, M. I. Daabo","doi":"10.1080/23799927.2019.1645210","DOIUrl":null,"url":null,"abstract":"ABSTRACT In this paper, the properties of rotation matrices are employed to construct special orthogonal matrices that are used to encrypt and decrypt video with varying perceptibility. Square orthogonal matrices of varying sides are formulated as cipher key matrices. The encryption algorithm uses these matrices to encrypt plain video into cipher video and transmit while the decryption algorithm uses the transpose of the cipher key matrices to recover the original video at the other end of the communication channel. Degradation in visual quality is controlled by varying cipher key dimension and the number of repetitions. Barring any noise in the communication channel, the proposed method retrieves the original video free of any error. Analysis of results show that the proposed method is key sensitive and resistant to chosen/known plain-text attacks.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Perceptual video encryption using orthogonal matrix\",\"authors\":\"S. Alhassan, M. M. Iddrisu, M. I. Daabo\",\"doi\":\"10.1080/23799927.2019.1645210\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT In this paper, the properties of rotation matrices are employed to construct special orthogonal matrices that are used to encrypt and decrypt video with varying perceptibility. Square orthogonal matrices of varying sides are formulated as cipher key matrices. The encryption algorithm uses these matrices to encrypt plain video into cipher video and transmit while the decryption algorithm uses the transpose of the cipher key matrices to recover the original video at the other end of the communication channel. Degradation in visual quality is controlled by varying cipher key dimension and the number of repetitions. Barring any noise in the communication channel, the proposed method retrieves the original video free of any error. Analysis of results show that the proposed method is key sensitive and resistant to chosen/known plain-text attacks.\",\"PeriodicalId\":37216,\"journal\":{\"name\":\"International Journal of Computer Mathematics: Computer Systems Theory\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2019-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Mathematics: Computer Systems Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/23799927.2019.1645210\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Mathematics: Computer Systems Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23799927.2019.1645210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Perceptual video encryption using orthogonal matrix
ABSTRACT In this paper, the properties of rotation matrices are employed to construct special orthogonal matrices that are used to encrypt and decrypt video with varying perceptibility. Square orthogonal matrices of varying sides are formulated as cipher key matrices. The encryption algorithm uses these matrices to encrypt plain video into cipher video and transmit while the decryption algorithm uses the transpose of the cipher key matrices to recover the original video at the other end of the communication channel. Degradation in visual quality is controlled by varying cipher key dimension and the number of repetitions. Barring any noise in the communication channel, the proposed method retrieves the original video free of any error. Analysis of results show that the proposed method is key sensitive and resistant to chosen/known plain-text attacks.