DOI QR코드

DOI QR Code

비디오 암호화를 위한 여원 최대길이 셀룰라 오토마타

Complemented Maximum-Length Cellular Automata Applied on Video Encryption

  • 이고용 (부경대학교 정보통신공학과) ;
  • 조성진 (부경대학교 응용수학과) ;
  • 김석태 (부경대학교 정보통신공학과)
  • 투고 : 2016.11.28
  • 심사 : 2017.02.03
  • 발행 : 2017.02.28

초록

인터넷기술의 발전에 따라 데이터를 보호하려는 연구가 점점 중요하게 되었다. 데이터를 보호하는 방법의 하나로서 본 논문에서는 여원 MLCA(Complemented Maximum Length Cellular Automata) 기법을 이용한 비디오 암호화 방법을 제안한다. 먼저 CA규칙 90/150을 이용해 여원 MLCA의 상태 전이행렬 T를 만든 후, 2D 여원MLCA의 기저영상을 생성한다. 다음, 비디오영상을 다중프레임으로 나눈다. 마지막으로 여원 MLCA 규칙을 이용하여 생성한 기저영상과의 XOR 연산으로 최종 암호화된 비디오영상을 얻게 된다. 이러한 방법은 영상 데이터를 시각화하기 위한 영상의 기본 정보인 픽셀의 값을 변환시키기 때문에 기존의 암호화 방법보다 향상된 암호화 결과를 얻을 수 있다.

With the advancement of internet technology, the importance of data protection is gaining more attention. As a possible data protection solution, we propose a novel video encryption method using complemented maximum-length cellular automata (C-MLCA). The first step for encryption is to use 90/150 CA rule to generate a transition matrix T of a C-MLCA state followed by a 2D C-MLCA basis image. Then, we divide the video into multiple frames. Once, we perform exclusive-OR operation with the split frames and the 2D basis image, the final encrypted video can be obtained. By altering values of pixel, the fundamental information in visualizing image data, the proposed method provides improved security. Moreover, we carry out some computational experiments to further evaluate our method where the results confirm its feasibility.

키워드

참고문헌

  1. Won Ho, et al., "Performance analysis of the encryption algorithms in a satellite communication network based on H-ARQ," IIBC, The Journal of The Institute of Internet, Broadcasting and Communication Vol.15, No.1, pp.45-52, 2015 DOI: https://doi.org/10.7236/JIIBC.2015.15.1.45
  2. Y. S. Im and E. Y. Kang, "MPEG-2 video watermarking in quantized DCT domain," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol.11, No.1, pp. 81-86, 2011
  3. Jeon, S. Kang and H. Yang, "Development of security quality evaluate basis and measurement of intrusion prevention system," Journal of the Korea Academia-Industrial cooperation Society (JKAIS), Vol.11, No.1, pp. 81-86, 2010 DOI: https://doi.org/10.5762/KAIS.2010.11.4.1449
  4. N. K. Pareek, Vinod Patidar and K. K Sud, "Image encryption using chaotic logistic map," IVC. Vol.24, No.9, pp. 926-934, 2006 DOI: https://doi.org/10.1016/j.imavis.2006.02.021
  5. X. Tong and M. Cui, "Image encryption with compound chaotic sequence cipher shifting dynamically," IVC.26, pp. 843-850, 2007 DOI: https://doi.org/10.1016/j.imavis.2007.09.005
  6. X. Li, S. J. Cho and S. T. Kim. "A 3D image encryption technique using computer-generated integral imaging and cellular automata transform," Optik, Vol.125, pp. 2983-2990, 2014 DOI: https://doi.org/10.1016/j.ijleo.2013.12.036
  7. Li XW and Kim ST. "Optical 3D watermark based digital image watermarking for telemedicine," Opt Laser Eng, Vol. 51, pp.1310-1320, 2013 DOI: https://doi.org/10.1016/j.optlaseng.2013.06.001
  8. J. Sang, et al. "Security analysis and improvement on a double-random phase-encoding technique based information hiding method," Opt Commun.,Vol.282, pp.2307-2317, 2009 DOI: https://doi.org/10.1016/j.optcom.2009.02.068
  9. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt Lett., Vol. 20, pp.767-769, 1995 DOI: https://doi.org/10.1364/OL.20.000767
  10. GC Langelaar and RL Lagendijk. "Optimal differential energy watermarking of DCT encoded images and video," Vol.10, No.1, pp. 148-158, 2001 DOI: https://doi.org/10.1109/83.892451
  11. L. Tang, "For encryption and decrypting MPEG video data efficiently," in Proceeding of the Forth ACM International Conference on Multimedia; pp. 55-61, 1998 DOI: https://doi.org/10.1145/244130.244209
  12. W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Transactions on Multimedia, Vol.5, No.1, pp. 118-129, 2003 DOI: https://doi.org/10.1109/TMM.2003.808817
  13. Xiao-Wei Li and Seok-Tae Kim, "Optical 3D water mark based digital image watermarking for telemedicine, Optics & Lasers in Engineering," Vol.51, pp. 1310-1320, 2013 DOI: https://doi.org/10.1016/j.optlaseng.2013.06.001
  14. X. W Li, J. S Yun, S .J. Cho and S. T. Kim, "Watermarking based on complemented MLCA and 2D CAT," KIMICS, Vol.9, No.2, 2011 DOI: https://doi.org/10.6109/jicce.2011.9.2.212