Show simple item record

dc.contributor.authorShifa, Amna
dc.contributor.authorAsghar, Mamoona Naveed
dc.contributor.authorAhmed, Adeel
dc.contributor.authorMartin, Fleury
dc.date.accessioned2020-05-13T08:29:22Z
dc.date.available2020-05-13T08:29:22Z
dc.date.copyright2020
dc.date.issued2020-04-22
dc.identifier.citationShifa, A., Naveed Asghar, M., Ahmed, A. Fleury, M. (2020). Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams. Journal of Ambient Intelligence and Humanized Computing. April 2020. doi.org/10.1007/s12652-020-01895-2en_US
dc.identifier.issn1868-5145
dc.identifier.issn1868-5137
dc.identifier.otherArticles - Software Research Institute AITen_US
dc.identifier.urihttp://research.thea.ie/handle/20.500.12065/3190
dc.description.abstractThis paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a method to auto-detect three different confidentiality levels for videos streamed from heterogeneous, mobile devices via web edge servers, possibly part of a Content Distribution Network (CDN). The FTC consists of three parallel Fuzzy Inference Systems (FIS) corresponding to device, network, and type of video application, for the real-time, intelligent selection of an appropriate confidentiality level for a specific end-user. After selection of the level, an encryption module implements the corresponding form of encryption. In tests to demonstrate the concept, there were three increasing confidentiality levels, namely (1) low-level with no encryption, (2) Medium level with an in-house cipher [variant of eXclusive OR (XOR)], named P-XOR (XOR with additional rounds of permutation) applied to Selective Encryption (SE) and (3) high level with the Advanced Encryption Standard again for SE of compressed video syntax components. Results were obtained by considering realistic specifications of multiple digital devices, networks, and differing real-time streaming applications. Visual analysis of encrypted test video clips established that the FTC outputs an appropriate privacy level by reason of the implemented FISs. Absolute encryption times across the privacy levels were distinguished by their real-time response level, which is proportionate to the required degree of confidentialityen_US
dc.formatPDFen_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.relation.ispartofJournal of Ambient Intelligence and Humanized Computingen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Ireland*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ie/*
dc.subjectClassification modelen_US
dc.subjectCDNen_US
dc.subjectEdge serversen_US
dc.subjectFuzzy rule-based systemen_US
dc.subjectHEVC and H.264/AVC codesen_US
dc.titleFuzzy‑logic threat classification for multi‑level selective encryption over real‑time video streams.en_US
dc.typeArticleen_US
dc.contributor.sponsorNational Research Program for Universities (NRPU-2016)/6282/Punjab/NRPU/R&D/HEC/2016.en_US
dc.description.peerreviewyesen_US
dc.identifier.doihttps://orcid.org/0000-0001-7460-266X
dc.identifier.orcidhttps://orcid.org/0000-0001-7460-266X
dc.rights.accessOpen Accessen_US
dc.subject.departmentSoftware Research Institute AITen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Ireland
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 Ireland