NAZIHA KHLIF - Academia.edu (original) (raw)
Papers by NAZIHA KHLIF
Advances in information security, privacy, and ethics book series, Feb 24, 2023
2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)
Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.
Journal of Testing and Evaluation, 2018
Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.
2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)
International Conference on Internet of Things, Embedded Systems and Communications, IEEE IINTEC2019, 2019
Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.
The International Arab Journal of Information Technology
Very well evolved, information technology made so easy the transfer of all types of data over pub... more Very well evolved, information technology made so easy the transfer of all types of data over public channels. For this reason, ensuring data security is certainly a necessary requirement. Scrambling data is one solution to hide information from non authorized users. Presenting matrix content, image scrambling can be made by only adding a mask to the real content. A user, having the appropriate mask, can recognize the image content by only subtracting it. Chaotic function is recently used for image encryption. In this paper, an algorithm of image scrambling based on three logistic chaotic functions is proposed. Defined by its initial condition and parameter, each chaotic function will generate a random signal. The set of initial conditions and parameters is the encryption key. The performance of this technique is ensured for two great reasons. First, using masks on the image makes unintelligible its content. Second, using three successive encryption processes makes so difficult atta...
IET Image Processing
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.
International Image Processing, Applications and Systems Conference, 2014
2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2014
14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013
Journal of Testing and Evaluation, 2014
14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013
Journal Of Testing and Evaluation, Nov 2018
Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.
IET Image Processing, 2018
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.
Advances in information security, privacy, and ethics book series, Feb 24, 2023
2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)
Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.
Journal of Testing and Evaluation, 2018
Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.
2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)
International Conference on Internet of Things, Embedded Systems and Communications, IEEE IINTEC2019, 2019
Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.
The International Arab Journal of Information Technology
Very well evolved, information technology made so easy the transfer of all types of data over pub... more Very well evolved, information technology made so easy the transfer of all types of data over public channels. For this reason, ensuring data security is certainly a necessary requirement. Scrambling data is one solution to hide information from non authorized users. Presenting matrix content, image scrambling can be made by only adding a mask to the real content. A user, having the appropriate mask, can recognize the image content by only subtracting it. Chaotic function is recently used for image encryption. In this paper, an algorithm of image scrambling based on three logistic chaotic functions is proposed. Defined by its initial condition and parameter, each chaotic function will generate a random signal. The set of initial conditions and parameters is the encryption key. The performance of this technique is ensured for two great reasons. First, using masks on the image makes unintelligible its content. Second, using three successive encryption processes makes so difficult atta...
IET Image Processing
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.
International Image Processing, Applications and Systems Conference, 2014
2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2014
14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013
Journal of Testing and Evaluation, 2014
14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013
Journal Of Testing and Evaluation, Nov 2018
Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.
IET Image Processing, 2018
This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.