Random keys Generating for Asymmetric Cryptography using Video Entropy
Random keys Generating for Asymmetric Cryptography using Video Entropy
DOI:
https://doi.org/10.24237/Keywords:
Cryptography, asymptomatic key, video processing, entropy metric.Abstract
Because of the widespread of the Internet usage and the emergence of multiple means of communication like Social media and email applications. also the rapid development in the field of communications lead to arising of difficulties, such as finding methods for protecting transmitted data and difficulty of controlling data penetration. Public key encryption methods are considered the most suitable techniques for correspondence over the Internet, but there is a major problem facing most of the methods of this system, which is the methods of exchanging keys between the sender and the recipient.
In this paper, a new technique for generating keys proposed. by using some video properties to generate keys from data in the video randomly. The proposed method led to solve two problems at the same time. The first problem is the problem of exchanging keys, because sending the video via any means of communication does not raise the suspicion of the attacker, in addition to the difficulty of extracting the keys. The second problem is the methods of selecting the keys, because the proposed method generates many keys randomly.
References
Marsaid1, Radlyah Hasan Jan,elt,“ IMPORTANCE OF DATA SECURITY IN BUSINESS MANAGEMENT PROTECTION OF COMPANY AGAINST SECURITY THREATS”, Vol 7, Issue 1, 2020.
Sivanagaswathi Kallam.” Diffie-Hellman:Key Exchange and Public Key Cryptosystems”, USA ,9/30/2015.
Chandel B. and Jain sh., “Video Steganography: A Survey” , IOSR Journal of Computer Engineering (IOSR-JCE), Volume 18, no 1, p.p: 11-17 Ver. III (Jan – Feb. 2016).
shah j. and Saxena v. ,” Video Encryption: A Survey” IJCSI International Journal of Computer Science Issues, Vol. 8, no 2, March 2011.
Siddu. P Algur and Vivek. R , “Video Key-Frame Extraction using Entropy value as Global and Local Feature”,arxiv,2016, https://doi.org/10.48550/arXiv.1605.08857 .
MOHSIN, R.M., AHMED, R.I.,YAQUB, R., & ETHAR, S., “A new technique for Diffie-Hillman key exchange protocol security using random image generation”. Proceedings of the First International Conference of Computer and Applied Sciences (CAS), 2019, pp. 262-267.
P. Sharma, D. Lakshman, Ch. Bhargavi Sravana and R. Pattanaik, ”A new technique of generating a key for Diffie-hellman algorithm”, International Journal of Mechanical Engineering and Technology (IJMET), vol 9, no 1, pp. 565–571, January 2018.
Murali and R. Palraj, " true random number generator method based on the image for key exchange algorithm", International Symposium on Computing, Communication, and Control, 2011.
Federal office of information security, “Cryptographic Mechanisms:Recommendations and Key Lengths”, January 9, 2023
Sourabh Chandra, Smita Paira,elc,”A comparative survey of symmetric and asymmetric key Cryptography”, International Conference on Electronics, Communication and Computational Engineering (ICECCE), 2014.
Al-Rawi S., Sadiq A.T. , FarhanB. , “Digital Video Quality Metric Based on Watermarking Technique with Geffe Generator”, Computer Science and Engineering 2012, vol 2, no 7, p.p: 138-146, DOI: 10.5923/j.computer.20120207.03.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 CC BY 4.0

This work is licensed under a Creative Commons Attribution 4.0 International License.