NAZIHA KHLIF - Academia.edu (original) (raw)

Papers by NAZIHA KHLIF

Research paper thumbnail of An Enhancement of Lossless Video Compression Using Two-Layer Approach

Advances in information security, privacy, and ethics book series, Feb 24, 2023

Research paper thumbnail of Encryption of lossless coded videos

2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)

Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.

Research paper thumbnail of A New Evaluation of Video Encryption Security with a Perceptual Metric

Journal of Testing and Evaluation, 2018

Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.

Research paper thumbnail of Evaluation of the Improvement in Hierarchical Lossless Video Compression

2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)

Research paper thumbnail of Encryption of lossless coded videos

International Conference on Internet of Things, Embedded Systems and Communications, IEEE IINTEC2019, 2019

Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.

Research paper thumbnail of Generation of Chaotic Signal for Scrambling Matrix Content

The International Arab Journal of Information Technology

Very well evolved, information technology made so easy the transfer of all types of data over pub... more Very well evolved, information technology made so easy the transfer of all types of data over public channels. For this reason, ensuring data security is certainly a necessary requirement. Scrambling data is one solution to hide information from non authorized users. Presenting matrix content, image scrambling can be made by only adding a mask to the real content. A user, having the appropriate mask, can recognize the image content by only subtracting it. Chaotic function is recently used for image encryption. In this paper, an algorithm of image scrambling based on three logistic chaotic functions is proposed. Defined by its initial condition and parameter, each chaotic function will generate a random signal. The set of initial conditions and parameters is the encryption key. The performance of this technique is ensured for two great reasons. First, using masks on the image makes unintelligible its content. Second, using three successive encryption processes makes so difficult atta...

Research paper thumbnail of A secure chaotic dual encryption scheme for H.264/AVC video conferencing protection

IET Image Processing

This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.

Research paper thumbnail of A very efficient encryption scheme for the H.264/AVC CODEC adopted in Intra prediction mode

International Image Processing, Applications and Systems Conference, 2014

Research paper thumbnail of Motion vectors signs encryption for H.264/AVC

2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2014

Research paper thumbnail of Selective encryption of CAVLC for H.264/AVC

14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013

Research paper thumbnail of Joint Selective Encryption of CAVLC and Signs of Motion Vectors for H.264/AVC

Journal of Testing and Evaluation, 2014

Research paper thumbnail of Selective encryption of CAVLC for H.264/AVC

14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013

Research paper thumbnail of A new evaluation of video encryption security with a perceptual metric

Journal Of Testing and Evaluation, Nov 2018

Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.

Research paper thumbnail of A secure chaotic dual encryption scheme for H.264/AVC video conferencing protection

IET Image Processing, 2018

This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.

Research paper thumbnail of An Enhancement of Lossless Video Compression Using Two-Layer Approach

Advances in information security, privacy, and ethics book series, Feb 24, 2023

Research paper thumbnail of Encryption of lossless coded videos

2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)

Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.

Research paper thumbnail of A New Evaluation of Video Encryption Security with a Perceptual Metric

Journal of Testing and Evaluation, 2018

Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.

Research paper thumbnail of Evaluation of the Improvement in Hierarchical Lossless Video Compression

2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)

Research paper thumbnail of Encryption of lossless coded videos

International Conference on Internet of Things, Embedded Systems and Communications, IEEE IINTEC2019, 2019

Several military files and medical research reports do not tolerate any type of distortion and ar... more Several military files and medical research reports do not tolerate any type of distortion and are at the same time secret to owners. In order to preserve source information and guarantee data security, lossless video compression with encryption seems to be the best alternative. In this work, cryptography was grafted with lossless compression to ensure a high image quality and secure the transmission of such data. Thus, the insertion of the encryption module in the lossless video compression chain appears to be better than the application of compression and encryption separately in terms of computing time. Our developed method reached about 30% gain of total bits and around 75% improvement of the compression ratio proving promising results.

Research paper thumbnail of Generation of Chaotic Signal for Scrambling Matrix Content

The International Arab Journal of Information Technology

Very well evolved, information technology made so easy the transfer of all types of data over pub... more Very well evolved, information technology made so easy the transfer of all types of data over public channels. For this reason, ensuring data security is certainly a necessary requirement. Scrambling data is one solution to hide information from non authorized users. Presenting matrix content, image scrambling can be made by only adding a mask to the real content. A user, having the appropriate mask, can recognize the image content by only subtracting it. Chaotic function is recently used for image encryption. In this paper, an algorithm of image scrambling based on three logistic chaotic functions is proposed. Defined by its initial condition and parameter, each chaotic function will generate a random signal. The set of initial conditions and parameters is the encryption key. The performance of this technique is ensured for two great reasons. First, using masks on the image makes unintelligible its content. Second, using three successive encryption processes makes so difficult atta...

Research paper thumbnail of A secure chaotic dual encryption scheme for H.264/AVC video conferencing protection

IET Image Processing

This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.

Research paper thumbnail of A very efficient encryption scheme for the H.264/AVC CODEC adopted in Intra prediction mode

International Image Processing, Applications and Systems Conference, 2014

Research paper thumbnail of Motion vectors signs encryption for H.264/AVC

2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2014

Research paper thumbnail of Selective encryption of CAVLC for H.264/AVC

14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013

Research paper thumbnail of Joint Selective Encryption of CAVLC and Signs of Motion Vectors for H.264/AVC

Journal of Testing and Evaluation, 2014

Research paper thumbnail of Selective encryption of CAVLC for H.264/AVC

14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013, 2013

Research paper thumbnail of A new evaluation of video encryption security with a perceptual metric

Journal Of Testing and Evaluation, Nov 2018

Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to ... more Peak Signal to Noise Ratio (PSNR) and Structural SIMilarity (SSIM) are metrics initially used to evaluate the visual quality of compressed images or sequences compared to the original ones. By analogy to compressed sequences, researchers use these metrics to evaluate the degradation of encrypted sequences. Video encryption algorithms target a maximum scrambling so that their contents become imperceptible to the human visual system. The distortion of PSNR and SSIM values comes from both compression and encryption. The use of these metrics to measure the degradation of joint compressed and encrypted sequences cannot give us a precise evaluation of the distortion. For a better evaluation, a Contrast Sensitivity Function (CSF) metric was used. This article aims to provide a perceptual evaluation of the encryption effect for the H.264 Advanced Video Coding compressed and encrypted sequences, using the CSF metric. The visual quality of the encrypted video is degraded and proven bad from different viewing distances.

Research paper thumbnail of A secure chaotic dual encryption scheme for H.264/AVC video conferencing protection

IET Image Processing, 2018

This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video c... more This study presents a chaos-based crypto-compression scheme to protect the H.264 advanced video coding (AVC) used for the applications of video conference. To this end, a selective encryption approach was adopted. The authors proposed to encrypt the inter-prediction, the intra-prediction and the context adaptive variable length coding. The format compliance and compression ratio are conserved. Their encryption method is based on two piecewise linear chaotic maps for pseudo-random bit generators. The first is considered as a decision module to choose either to encrypt or not, whereas the second is used for the encryption. The proposed encryption techniques were developed and discussed, and their experimental results indicate that the scheme is secure and very efficient according to the computing times. Moreover, it is suitable for real-time application and convenient for all the H.264/AVC profiles or even with other video compression standards.