{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T09:52:22Z","timestamp":1753869142088,"version":"3.41.2"},"reference-count":31,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T00:00:00Z","timestamp":1657929600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2022,11]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article presents a selective encryption (SE) chaotic video stream cipher for the scalable extended high\u2010efficiency video coding (SHVC) bitstream. The proposed SHVC SE uses a logistic map (LM) for enciphering the motion vector difference (MVD), discrete cosine transform (DCT) coefficients and delta quantization parameter (dQP) sign bits. The SHVC SE chaotic video stream cipher is proposed to secure the most sensitive bits of the SHVC while keeping the video format compliance feature. Also, this paper presents a performance analysis for the proposed SHVC SE and the AES in CFB operation mode. Experimental results illustrate the main feature of using the LM in the proposed SHVC SE, which is lower latency encoding time for the SHVC SE chaotic video stream cipher than using the AES in CFB operation mode. Security investigations are performed on the proposed SHVC SE for ensuring the robustness of the ciphered SHVC digital video against unauthorized attacks.<\/jats:p>","DOI":"10.1002\/ett.4599","type":"journal-article","created":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T10:05:00Z","timestamp":1657965900000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Low\u2010latency selective encryption scheme for scalable extension of high\u2010efficiency video coding"],"prefix":"10.1002","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1982-335X","authenticated-orcid":false,"given":"Osama S.","family":"Faragallah","sequence":"first","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology Taif University  Taif Saudi Arabia"}]},{"given":"Ahmed I.","family":"Sallam","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Faculty of Electronic Engineering Menoufia University  Menouf Egypt"}]},{"given":"Masoud","family":"Alajmi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computers and Information Technology Taif University  Taif Saudi Arabia"}]},{"given":"Hala S.","family":"El\u2010sayed","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering Menoufia University  Shebin El\u2010Kom Egypt"}]}],"member":"311","published-online":{"date-parts":[[2022,7,16]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2305579"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2625261"},{"key":"e_1_2_10_4_1","unstructured":"ChenJ BoyceJ YeY HannukselaMM SullivanGJ WangYK.HEVC scalable extensions (SHVC) draft text 7 in document JCTVC\u2010R1008 v7 2014.http:\/\/phenix.intevry.fr\/jct\/doc_end_user\/current_document.php?id=9465"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2014.47"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.02.017"},{"key":"e_1_2_10_7_1","doi-asserted-by":"crossref","unstructured":"FarajallahM HamidoucheW DeforgesO El AssadS.ROI encryption for the HEVC coded video contents. Processing in IEEE International Conference on Image ICIP; 2015:3096\u20103100; Barcelona Spain.","DOI":"10.1109\/ICIP.2015.7351373"},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","unstructured":"TahaMA SidatyN HamidoucheW DforgesO VanneJ ViitanenM.End\u2010to\u2010end real\u2010time ROI\u2010based encryption in HEVC videos. Proceedings of the 2018 26th European Signal Processing Conference (EUSIPCO); 2018:171\u2010175.","DOI":"10.23919\/EUSIPCO.2018.8553038"},{"key":"e_1_2_10_9_1","first-page":"6805","article-title":"Fast selective encryption for video stream of high efficiency video coding standard","volume":"96","author":"Saleh MA","year":"2018","journal-title":"J Theor Appl Inf Technol"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2511879"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2924910"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5611-7"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.06.007"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2013.2283657"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2014.47"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2461951"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06895-4_8"},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"TewY MinemuraK WongK.HEVC selective encryption using transform skip signal and sign bin. Proceedings of APSIPA Annual Summit and Conference; 2015; December 2015:963\u2010970.","DOI":"10.1109\/APSIPA.2015.7415415"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"HofbauerH UnterwegerA UhlA.Transparent encryption for HEVC using bit\u2010stream\u2010based selective coefficient sign encryption. Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP); Florence Italy; May 2014:1986\u20101990; IEEE.","DOI":"10.1109\/ICASSP.2014.6853946"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6626250"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2281029"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4916-2"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2511879"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.05.018"},{"key":"e_1_2_10_25_1","unstructured":"SHVCReference software model (SHM).https:\/\/hevc.hhi.fraunhofer.de\/svn\/svn_SHVCSoftware\/. Accessed January 6 2020."},{"key":"e_1_2_10_26_1","unstructured":"MSU graphics and media lab video group MSU codecs.www.compression.ru\/video\/. Accessed January 6 2020."},{"key":"e_1_2_10_27_1","unstructured":"https:\/\/media.xiph.org\/. Accessed January 6 2020."},{"issue":"3","key":"e_1_2_10_28_1","first-page":"1","article-title":"Optical color image cryptosystem using chaotic baker mapping based\u2010double random phase encoding","volume":"49","author":"Allah OF","year":"2017","journal-title":"Int J Opt Quant Electron"},{"issue":"4","key":"e_1_2_10_29_1","first-page":"18","article-title":"Efficiency analysis and security evaluation of image encryption schemes","volume":"12","author":"Ahmad J","year":"2012","journal-title":"Int J Video Image Process Netw Secur"},{"issue":"5","key":"e_1_2_10_30_1","first-page":"32","article-title":"Image recognition using coefficient of correlation and structural SIMilarity index in uncontrolled environment","volume":"59","author":"Kaur A","year":"2012","journal-title":"Int J Comput Appl"},{"issue":"8","key":"e_1_2_10_31_1","first-page":"38","article-title":"A new approach to measure quality of image encryption","volume":"2","author":"Jolfaei A","year":"2010","journal-title":"Int J Comput Netw Secur"},{"key":"e_1_2_10_32_1","unstructured":"http:\/\/www.mathworks.com\/help\/images\/ref\/edge.html Access Date: 1\/6\/2020."}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4599","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/ett.4599","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T11:07:08Z","timestamp":1692616028000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,16]]},"references-count":31,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["10.1002\/ett.4599"],"URL":"https:\/\/doi.org\/10.1002\/ett.4599","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"type":"print","value":"2161-3915"},{"type":"electronic","value":"2161-3915"}],"subject":[],"published":{"date-parts":[[2022,7,16]]},"assertion":[{"value":"2021-05-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e4599"}}