Title: Optimal ECC-based signcryption algorithm for secured video compression process in H.264 encoder

Authors: Sankarasubbu Rajagopal; Ayyachamy Shenbagavalli

Addresses: Department of Information Technology, National Engineering College, Kovilpatti, India ' Department of Electronics and Communication Engineering, National Engineering College, Kovilpatti, Tamilnadu, India

Abstract: Combination of cryptography method and video technology is a video encryption. Video encryption process is a total and demonstrable security of video data. For the purpose of protecting the video sequence, we have intended to recommend a video compression procedure along with its encryption for providing secured video compression framework. In this document we have suggested a method for ECC-based signcryption algorithm for secured video compression process. At first, encryption process will be used on the motion vector by applying elliptic curve cryptography (ECC)-based signcryption algorithm. The suggested method uses ECC method for the generation of public and private key. At the point when contrasted with the other encryption algorithms like small key, more security, increased velocity, little storage space and low data transfer capacity ECC has particular preferences. The suggested method employs the improved artificial bee colony (IABC) algorithm in order to optimise the private key. Next, the optimal selection of private key applied to encrypt the motion vector. By means of different security attacks such as man in middle (MiM) attack, brute force and denial of service (DoS) attacks, the security of the suggested method will be examined.

Keywords: video encryption; video compression; signcryption; elliptic curve cryptography; ECC; improved artificial bee colony algorithm; brute force; DoS attack.

DOI: 10.1504/IJBET.2020.104676

International Journal of Biomedical Engineering and Technology, 2020 Vol.32 No.1, pp.36 - 65

Received: 27 Oct 2016
Accepted: 23 Mar 2017

Published online: 28 Jan 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article