A Metaheuristic Approach to Secure Multimedia Big Data for IoT-Based Smart City Applications

Authors / Editors

Research Areas

No matching items found.

Publication Details

Output type: Journal article

UM6P affiliated Publication?: Yes

Author list: Gill H.S., Singh T., Kaur B., Gaba G.S., Masud M., Baz M.

Publisher: Hindawi: Wiley Hindawi Partnership / Hindawi-Wiley

Publication year: 2021

Journal: Wireless Communications and Mobile Computing (1530-8669)

ISSN: 1530-8669

eISSN: 1530-8677

URL: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85117375868&doi=10.1155%2f2021%2f7147940&partnerID=40&md5=a780101439754dd6077175c93f192072

Languages: English (EN-GB)

View on publisher site


Media streaming falls into the category of Big Data. Regardless of the video duration, an enormous amount of information is encoded in accordance with standardized algorithms of videos. In the transmission of videos, the intended recipient is allowed to receive a copy of the broadcasted video; however, the adversary also has access to it which poses a serious concern to the data confidentiality and availability. In this paper, a cryptographic algorithm, Advanced Encryption Standard, is used to conceal the information from malicious intruders. However, in order to utilize fewer system resources, video information is compressed before its encryption. Various compression algorithms such as Discrete Cosine Transform, Integer Wavelet transforms, and Huffman coding are employed to reduce the enormous size of videos. moving picture expert group is a standard employed in video broadcasting, and it constitutes of different frame types, viz., I, B, and P frames. Later, two frame types carry similar information as of foremost type. Even I frame is to be processed and compressed with the abovementioned schemes to discard any redundant information from it. However, I frame embraces an abundance of new information; thus, encryption of this frame is sufficient enough to safeguard the whole video. The introduction of various compression algorithms can further increase the encryption time of one frame. The performance parameters such as PSNR and compression ratio are examined to further analyze the proposed model's effectiveness. Therefore, the presented approach has superiority over the other schemes when the speed of encryption and processing of data are taken into consideration. After the reversal of the complete system, we have observed no major impact on the quality of the deciphered video. Simulation results ensure that the presented architecture is an efficient method for enciphering the video information. © 2021 Harsimranjit Singh Gill et al.


No matching items found.


No matching items found.

Last updated on 2022-12-01 at 23:16