Next-Generation Systems and Secure Computing
by Subhabrata Barman, Santanu Koley, Subhankar Joardar
1Yet Another Move Towards Securing Video Using Sudoku-Fernet
Sunanda Jana1, Swarnajit Bhattacharya1, Mrinmoy Sen1*, Abhinandan Khan2, Arnab Kumar Maji3 and Rajat Kumar Pal2
1Haldia Institute of Technology, WB, India
2University of Calcutta, Kolkata, India
3North-Eastern Hill University, Meghalaya, India
Abstract
In this era of digital communication and multimedia content sharing, ensuring the security and privacy of sensitive video data is of utmost importance. Symmetric key encryption is a widely used technique for securing video content; however, the generation of secure and unpredictable encryption keys remains a challenge. This study proposes a novel approach that employs Sudoku puzzles as a mechanism for generating symmetric keys. Then, by passing the key through fernet module, the Sudoku-Fernet cipher key was extracted for video encryption. The Sudoku puzzle’s inherent properties of uniqueness, complexity, and nonlinearity make it an ideal candidate for key generation. The proposed method combines the strength of the Giant Sudoku instance of size 25 × 25 with a cryptographic fernet module to enhance the security of video encryption systems, offering an innovative solution to protect sensitive video content without affecting cost and time.
Keywords: Symmetric key, fernet, sudoku-fernet cipher key, video encryption, security
1.1 Introduction
Sudoku puzzle [1] is a popular logic-based number-placement game that has gained worldwide popularity. Its structure consists of ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access