Next Article in Journal
A New Topp–Leone Odd Weibull Flexible-G Family of Distributions with Applications
Previous Article in Journal
Thermal Stress of Fractured Rock Under Solar Radiation Based on a Typical Shape Function Method
Previous Article in Special Issue
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Dual Approach Cryptographic Model for Video Transmission Based on Association Schemes

by
Rajendra Kumar Sharma
1,
Anuradha Sabharwal
2,* and
Pooja Yadav
3
1
Department of Mathematics, Indian Institute of Technology Delhi, New Delhi 110016, India
2
Department of Mathematics, University of Delhi, Delhi 110007, India
3
Department of Mathematics, Kamala Nehru College, University of Delhi, New Delhi 110049, India
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(17), 2865; https://doi.org/10.3390/math13172865
Submission received: 20 July 2025 / Revised: 6 August 2025 / Accepted: 11 August 2025 / Published: 5 September 2025
(This article belongs to the Special Issue Mathematical Models in Information Security and Cryptography)

Abstract

The security of video data requires cryptographic techniques that are resilient to both classical and quantum threats. This study presents an encryption framework based on association schemes and algebraic combinatorial tools that enable systematic and secure data transformations. In the classical setting, video encryption is achieved through random matrix transformations applied to the relations of an association scheme, producing secure and imperceptible ciphertext. Experimental evaluations, including statistical and error analyses, confirm the robustness and efficiency of the proposed method. We extend the framework to quantum cryptography by exploring unitary encryption operators derived from the Bose–Mesner algebra of association schemes. These operators are used to encrypt quantum-encoded multimedia data. The results demonstrate the potential of association schemes to support secure multimedia encryption in both classical and quantum domains.
MSC:
05E30; 94A60; 81P94; 94A08

1. Introduction

In today’s rapidly evolving digital landscape, the widespread adoption of video across domains such as pay television, video surveillance, video-on-demand (VOD), and conferencing platforms highlights the pressing need for robust security mechanisms. The open nature of transmission channels poses significant threats to the confidentiality and integrity of video data [1,2]. Additionally, new environments such as multi-UAV systems further necessitate secure, scalable encryption schemes [3].
The literature has explored several techniques aimed at securing two-dimensional data through various transformations, including optical, chaotic, and scrambling-based approaches [4,5,6,7,8,9]. Traditionally, video security can be achieved through three main techniques: video encryption (cryptography), video watermarking, and video steganography [10,11,12,13,14,15,16,17]. Cryptography stands out due to its ability to offer high confidentiality through mathematically driven key-based transformations. Within this space, algebraic combinatorics, specifically association schemes, offer a powerful foundation for constructing structured and efficient encryption algorithms. Multiple recent schemes have been developed for the secure transmission of video data, focusing on improving encryption speed, compression compatibility, and cryptographic strength [18].
Recent research into multimedia security has explored increasingly sophisticated techniques for robust content protection. Zhang et al. [19] proposed a frequency-domain, attention-guided, adaptive, robust, watermarking model that enhances resistance to diverse attacks while maintaining visual quality. In another direction, a visually meaningful triple-image encryption algorithm based on 2D compressive sensing and multi-region embedding [20] demonstrated how high-capacity multi-image encryption can be combined with visually meaningful outputs. These emerging approaches align with the present study’s aim of leveraging algebraic structures, particularly association schemes, for the development of classical and quantum cryptographic models tailored to secure multimedia transmission.
Association schemes, originally formalized by Bose and Shimamoto [21], are algebraic structures that describe relationships within a finite set through a partition of its Cartesian square. These schemes are widely used in coding theory, group theory, and design theory due to their strong combinatorial regularity and algebraic symmetry [22,23]. In particular, symmetric and commutative association schemes exhibit desirable properties that make them suitable for secure transformations. A complete exposition of definitions, algebraic properties, and examples of association schemes can be found in [22,23].
Sabharwal et al. recently introduced non-symmetric commutative association schemes for product groups such as Z n 1 × Z n 2 × × Z n r and demonstrated their utility in securing image and text data via algebraic ciphers [24,25]. These schemes provide algebraic flexibility and cryptographic strength for multidimensional data structures.
Motivated by the versatility and strong algebraic foundation of association schemes, this work develops a dual cryptographic model operating in both classical and quantum settings. In the classical framework, we apply a Random Matrix Transformation on Association Schemes (RMTAS), where structured random matrices act on scheme relations over Z n r to realize systematic, key-driven pixel transformations for video encryption. In the quantum framework, we exploit the Bose–Mesner algebra of a symmetric association scheme to construct unitary encryption operators that act on quantum-encoded multimedia states. This approach is inspired by recent work by Chan and Martin [26], who demonstrated how association schemes can be applied in quantum information theory, particularly in problems such as the quantum isomorphism of graphs. By formulating both models within a unified algebraic framework, the study highlights the scalability of association schemes across computational paradigms and their potential as a mathematical bridge between current and quantum-secure cryptographic systems.
In this study, Section 2 presents the proposed classical cryptographic framework using association schemes and random matrix transformations. Section 3 reports the experimental results for the classical scheme, followed by detailed error analysis in Section 4. Section 5 provides a comparative evaluation with existing techniques. Section 6 introduces the quantum cipher construction, outlining the quantum encoding model and the unitary operator derived from the Bose–Mesner algebra. Finally, Section 7 concludes this study and discusses future research directions.

2. Proposed Approach for Secure Video Transmission

Cryptography is the process of protecting sensitive information and communications through encryption and decryption. During encryption, information is converted into ciphertext using an encryption key, making it unintelligible to unauthorized individuals. In this study, we propose a technique for securing color video data using association schemes.
Our approach involves first encrypting the original video data using random matrix transformation for the relations of an association scheme over Z n r , resulting in an initial encrypted video. This video is then further scrambled using the Arnold transformation, which enhances security by making data more resistant to statistical and structural attacks. This layered encryption technique effectively safeguards the video content against unauthorized access. The decryption process follows a similar strategy, enabling the recovery of the original video frames.

2.1. Random Matrix Transformation on Association Schemes (RMTAS)

Let ( a , b , c , d ) be the RMT parameters, k 1 be the relation index in the association scheme, and n be the number of permissible symbols (including alphabetical letters, digits, and special characters). The value of k 1 is preferably chosen to be between 1 and n r 1 .
The RMT uses thetransformation matrix
1 a 0 b a b + 1 0 c d 1
which is applied to the relation S k 1 of the association scheme over Z n 3 , as described in Theorem 3 of [24]. Applying the RMT to S k 1 involves multiplying the above matrix by the column vector formed by the base-n digits of each trigraph. The transformation is performed for every trigraph in the data, producing encrypted trigraphs that represent the ciphertext.
For decryption, let S k 1 * = S l . Apply the same RMT to the relation S l and then apply the relation R l to each encrypted trigraph. This process reconstructs the original plaintext.

2.2. Encryption and Decryption of Colored Video Using RMTAS and Arnold Transformation

We begin by encrypting the original data, which are in the form of a colored video, using random matrix transformation for an association scheme over Z n r . Let R, G, and B be matrices over Z n , representing the red, green, and blue pixel values of a video frame, respectively. Now, consider a single matrix M over Z n 3 . Each element x i j of matrix M is a 3-tuple x i j ( 1 ) , x i j ( 2 ) , x i j ( 3 ) , where x i j ( 1 ) , x i j ( 2 ) , and x i j ( 3 ) are the ( i , j ) t h entries of R, G, and B, respectively.
Let ( a , b , c , d , k 1 , k 2 ) be the encryption keys shared with the receiver. Here, a ,   b ,   c and d are used as the RMT parameters to form the transformation matrix, which is then applied to the relations of the association scheme over Z n 3 (see Theorem 3 of [24]) relative to key k 1 . This results in a new set of relations. By applying the selected relation to each element ( x i j , y i j ) , we compute y i j , the ( i , j ) th encrypted pixel in matrix C. Using y i j = y i j ( 1 ) , y i j ( 2 ) , y i j ( 3 ) , we determine the value of y i j , the ( i , j ) t h element of matrix C. Here, each element y i j of C represents the encrypted pixel value.
In the final step, the Arnold transformationor cat map, introduced by V. Arnold [27], is iteratively applied k 2 times to scramble the encrypted data. The number of iterations ( k 2 ) acts as part of the decryption key. The procedure used to generate the final encrypted video using this approach is outlined in Algorithm 1.
A similar procedure is followed to recover the video during decryption, as shown in Algorithm 2. The inverse Arnold transformation is applied k 2 times to unscramble the frames. Then, the decryption key l is computed from k 1 using the association scheme. The original video is retrieved by applying the inverse of the RMT to relation R l .
Algorithm 1 The encryption of colored video using RMTAS and the Arnold transformation
Require: Original video A, encryption keys ( a , b , c , d , k 1 , k 2 )
Ensure: Encrypted video E

1: 
  procedure Encrypt( A , ( a , b , c , d , k 1 , k 2 ) )
2: 
     Generate RMT matrix M using keys ( a , b , c , d )
3: 
     Generate relations R of the association scheme over Z n 3 relative to k 1
4: 
     Initialize an empty video A
5: 
     for each frame f in A do
6: 
         Apply M to the relations R on frame f to obtain f
7: 
         Add f to A
8: 
     end for
9: 
     for  i = 1 to k 2  do
10: 
         Apply Arnold transformation to each frame of A to obtain A
11: 
          A A
12: 
     end for
13: 
      E A
14: 
    return E
15: 
end procedure
Algorithm 2 The decryption of colored video using RMTAS and the Arnold transformation
Require: Encrypted video E, encryption keys ( a , b , c , d , k 1 , k 2 )
Ensure:  Decrypted video D

1: 
  procedure  Decrypt( E , ( a , b , c , d , k 1 , k 2 ) )
2: 
     Initialize an empty video A
3: 
     for  i = 1 to k 2  do
4: 
        Apply inverse Arnold transformation to each frame of E to obtain E
5: 
         E E
6: 
     end for
7: 
      A E
8: 
     Determine decryption key l from k 1 using the association scheme
9: 
     Generate RMT matrix M using keys ( a , b , c , d )
10: 
     Generate relation R l from the association scheme
11: 
     Initialize an empty video D
12: 
     for each frame f in A  do
13: 
         Apply M to the relation R l on frame f to obtain f
14: 
         Add f to D
15: 
     end for
16: 
     return D
17: 
end procedure

3. Experimental Results

This section provides a comprehensive evaluation of the proposed classical video encryption method using association schemes and random matrix transformations (RMTAS). This analysis was based on computer simulations and experimental results focused on the secure transmission of colored video, particularly emphasizing statistical performance metrics. The simulations were implemented in MATLAB R2021b in a Windows 11 environment and executed on a laptop equipped with a 12th Gen Intel® Core™ i7-1255U CPU @ 1.70 GHz with 16 GB RAM(Intel Corporation, Santa Clara, CA, USA).
For evaluation, three distinct color videos, namely Akiyo, Coastguard, and Foreman (see Figure 1a,d,g), were chosen. These videos underwent encryption utilizing RMTAS and the Arnold transformation (see Figure 1b,e,h). Notably, the recovered data (see Figure 1c,f,i) showed no noticeable distortion, confirming the reversibility of the transformations.
This analysis included an assessment of the peak signal-to-noise ratio (PSNR), mean square error (MSE), histogram analysis, pixel intensity correlation graphs, correlation coefficient (CC), unified average changing intensity (UACI), and number of pixel change rate (NPCR) to evaluate the cryptosystem’s robustness. The choice of these metrics reflects the dual goals of the RMTAS and Arnold transformation scheme: achieving strongconfusion of pixel values (reflected in high NPCR and UACI) and strongdiffusion of spatial information (reflected in low correlation and uniform histograms). Theoretically, the algebraic mapping of RMTAS ensures each pixel’s RGB value is transformed in a key-dependent and non-linear way, while the Arnold transformation scrambles positions, producing statistical uniformity and resistance to both statistical and differential attacks.

3.1. Histogram Analysis

A histogram analysis was conducted to compare the original, encrypted, and decrypted versions of the selected videos, providing insight into the effectiveness of the encryption scheme. Figure 2, Figure 3 and Figure 4 demonstrate that the histograms of the encrypted videos exhibit a significantly altered distribution of pixel intensities compared to the original. This altered distribution is theoretically expected because RMTAS applies transformations derived from association schemes that uniformly permute pixel values across the full range [ 0 , 255 ] . This uniform distribution prevents leakage of statistical patterns, while the Arnold transformation disrupts spatial structure, reinforcing histogram uniformity.
After decryption, the histograms of the recovered videos closely match those of the original, confirming lossless recovery due to the bijective nature of both RMTAS and the Arnold transformation.

3.2. Pixel Intensity

Pixel intensity measures the brightness or color value of pixels within encrypted or decrypted video frames. Figure 5, Figure 6 and Figure 7 illustrate that the encrypted frames have pixel intensity distributions drastically different from the original frames, a direct consequence of the confusion stage of RMTAS and the diffusion stage of the Arnold transformation. These changes ensure that even partial pixel value guesses are useless without spatial context, which is also scrambled.

4. Error Analysis

The analysis of the original, encrypted, and decrypted videos for the selected test cases is shown in Table 1 and Table 2.
The high NPCR values (around 99%) and UACI values (around 0.33) demonstrate the scheme’s strong sensitivity to changes in the input data. In practice, altering a single pixel in the original video triggers widespread changes in the encrypted output. Low correlation coefficients (close to 0) indicate that adjacent pixel dependencies in the original frames are destroyed, consistent with the goal of defeating statistical attacks. The high PSNR and zero MAE for the decrypted videos confirm the reversibility of the scheme, which follows from the invertible nature of both RMTAS and the periodic Arnold transformation. The histogram uniformity and high diffusion make the cipher robust against chosen-plaintext and known-plaintext attacks.
These theoretical properties align with the statistical observations, demonstrating that the performance metrics are not arbitrary but are a direct consequence of the cryptosystem’s algebraic and scrambling design. The formulas for these metrics are given below.
Themean absolute error (MAE) for videos measures the average absolute difference between the corresponding pixel values of two videos across all frames and color channels. The formula is given as
MAE RGB = 1 3 F c { R , G , B } f = 1 F 1 H × W i = 1 H j = 1 W V 1 f ( i , j , c ) V 2 f ( i , j , c )
where F is the total number of frames, H and W are the height and width of the frames, and c represents the color channels (red, green, blue).
Themean square error (MSE) is a basic measure used to gauge differences between two images or video frames. It calculates the average squared difference of corresponding pixels:
MSE = 1 m n i = 1 m j = 1 n ( I original ( i , j ) I processed ( i , j ) ) 2
In the context of encrypted and decrypted videos, the MSE helps to assess how accurately data are retrieved.
Thepeak signal-to-noise ratio (PSNR) is a widely used metric for evaluating the quality of reconstructed images and videos compared to their original versions. It quantifies the difference between the original and processed content, with higher values indicating better quality. The PSNR is defined by the following formula:
PSNR = 10 · log 10 MAX 2 MSE
where MAX is the maximum possible pixel value of the image (e.g., 255 for an 8-bit image) and MSE (the mean squared error) is the average squared difference between the original and processed images.
Thecorrelation coefficient (CC) measures the strength and direction of the linear relationship between two variables, such as pixel intensities in video frames:
CC = i = 1 m j = 1 n ( I original ( i , j ) · I decrypted ( i , j ) ) i = 1 m j = 1 n ( I original ( i , j ) ) 2 · i = 1 m j = 1 n ( I decrypted ( i , j ) ) 2
Thenumber of pixel change rate (NPCR) quantifies the difference between two video frames based on the percentage of pixels that change their values. It is calculated using the following formula:
NPCR = Number of changed pixels m × n × 100 %
where m and n are the dimensions of the frames.
Theunified average changing intensity (UACI) measures the average intensity difference between corresponding pixels of two images or video frames. It is calculated using the following formula:
UACI = 1 m n i = 1 m j = 1 n | I original ( i , j ) I processed ( i , j ) | 255
Here, m and n denote the dimensions of the images or frames, while I original ( i , j ) and I processed ( i , j ) represent pixel intensities from the original and processed images, respectively. In video analysis, the UACI provides valuable insights into the average pixel intensity changes between frames.

5. Comparative Analysis

To evaluate the performance of the proposed classical video encryption method using association schemes and random matrix transformations, we compared it with existing techniques, including those devised by Hosny et al. [1], Kotel et al. [28], Elkamchouchi et al. [29], Cheng et al. [16], and Hafsa et al. [15]. Using the standard ‘Foreman’ test video, we assessed performance using metrics such as the PSNR, MAE, NPCR, UACI, and correlation coefficient, as shown in Table 3.
The results demonstrate that the proposed method achieves high NPCR (greater than 99%) and UACI values (approximately 0.33), indicating strong resistance to differential attacks and ensuring that small changes in the plaintext propagate widely in the ciphertext. The low CC values (close to 0) confirm that spatial correlations between adjacent pixels are effectively removed. These outcomes are expected from the design: the RMTAS algebraically transforms pixel values in a key-dependent, non-linear way, while the Arnold transformation disperses pixel positions across the frame, jointly ensuring confusion and diffusion.
In terms of the PSNR, the decrypted video achieves values comparable to or better than those of other methods, reflecting the lossless nature of the encryption–decryption process. This stems from the invertibility of both the association scheme mapping and the Arnold transform. MAE values are near zero for decrypted videos, further confirming error-free reconstruction.
Overall, the combination of algebraic structure from association schemes and spatial scrambling yields a cipher that maintains competitive performance with state-of-the-art methods while providing a mathematically rigorous framework suitable for extension into quantum encryption models.

6. Proposed Quantum Cipher Framework

In this section, we describe the theoretical foundation and model of the proposed quantum cipher designed for image and video encryption. The scheme integrates the algebraic structure of association schemes into the construction of quantum encryption operators. The framework consists of three key components, quantum data encoding, unitary encryption using association scheme-derived operators, and decryption using inverse unitary operations, as shown in Figure 8.

6.1. Quantum Encoding of Classical Multimedia Data

Classical image or video data are first mapped into quantum states. A grayscale image of dimensions h × w with 8-bit pixels is represented by a quantum state encoded over n = 8 × h × w qubits. For RGB images, each pixel consists of three values ( R , G , B ) { 0 , , 255 } 3 , requiring 24 qubits per pixel.
The encoded quantum image is given as
| Ψ image = i = 1 N | p i ,
where p i is the intensity or RGB value of the i-th pixel and N is the total number of pixels. Each | p i is a computational basis state in a qubit register.
For video encryption, the sequence of frames { F t } t = 1 T is treated as a temporal quantum register:
| Ψ video = t = 1 T | Ψ F t .

6.2. Construction of Unitary Operator from Association Schemes

Let { A 0 , A 1 , , A d } be the adjacency matrices of a symmetric association scheme defined over a finite set X, such that each A i is a real symmetric matrix satisfying A i A j = k p i j k A k . These matrices form the basis for the Bose–Mesner algebra  A , a commutative algebra with dimensions d + 1 .
We define the quantum encryption operator as
U K = i = 0 d α i A i ,
where α i C are coefficients derived from the classical encryption key K, chosen so that U K is unitary (see Figure 9). The unitarity condition can be ensured through normalization or algebraic constraints on the α i .
In the proposed quantum cipher, the encryption key K is a classical key that determines the structure of the unitary encryption operator U K . Specifically, K encodes the set of coefficients α i used in the Bose–Mesner algebra expansion above, where A i are the adjacency matrices of the association scheme. These coefficients are derived from the shared secret key material and are chosen to satisfy the unitarity condition, ensuring that U K is reversible. The same key K allows the legitimate receiver to reconstruct U K and recover the original quantum-encoded data.
This unitary operator acts on the encoded quantum image or video state as follows:
| Ψ enc = U K | Ψ image / video .

6.3. Decryption Process

Since U K is unitary, decryption is straightforward:
| Ψ image / video = U K | Ψ enc .
Thus, anyone with access to the shared classical key K, as well as knowledge of the association scheme structure, can reconstruct U K and recover the original data.

7. Conclusions and Future Research

This study presents a secure video encryption technique based on association schemes, combining random matrix transformations and Arnold scrambling. The experimental results confirm the method’s robustness through statistical and error analyses, while comparisons with existing techniques highlight its effectiveness and structural advantages. A quantum extension using unitary operators derived from association schemes has also been proposed, offering a foundation for quantum-secure multimedia encryption. Future research will focus on implementing the proposed quantum model using simulation tools such as Qiskit. This will be further extended by integrating quantum key distribution and error correction techniques to enhance security in next-generation communication systems.

Author Contributions

Conceptualization, R.K.S., A.S. and P.Y.; Methodology, R.K.S., A.S. and P.Y.; Software, A.S.; Validation, R.K.S., A.S. and P.Y.; Formal analysis, R.K.S., A.S. and P.Y.; Investigation, A.S.; Resources, A.S.; Data curation, A.S.; Writing—original draft, A.S.; Writing—review & editing, R.K.S. and P.Y.; Visualization, R.K.S., A.S. and P.Y.; Supervision, R.K.S. and P.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Hosny, K.M.; Zaki, M.A.; Lashin, N.A.; Hamza, H.M. Fast colored video encryption using block scrambling and multi-key generation. Vis. Comput. 2023, 39, 6041–6072. [Google Scholar] [CrossRef]
  2. von Solms, R.; van Niekerk, J. From information security to cyber security. Comput. Secur. 2013, 38, 97–102. [Google Scholar] [CrossRef]
  3. Wen, C.; Chen, G.; Gu, X.; Wang, W. Joint optimization of communication rates for multi-UAV relay systems. Complex Intell. Syst. 2025, 11, 1–27. [Google Scholar] [CrossRef]
  4. Arora, A.; Sharma, R.K. Cryptanalysis and enhancement of image encryption scheme based on word-oriented feed back shift register. Multimed. Tools Appl. 2022, 81, 16679–16705. [Google Scholar] [CrossRef]
  5. Liu, Z.; Xu, L.; Liu, T.; Chen, H.; Li, P.; Lin, C.; Liu, S. Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Opt. Commun. 2011, 284, 123–128. [Google Scholar] [CrossRef]
  6. Liu, Z.; Guo, Q.; Xu, L.; Ahmad, M.A.; Liu, S. Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express 2010, 18, 12033–12043. [Google Scholar] [CrossRef]
  7. Abuturab, M.R. Securing color information using Arnold transform in gyrator transform domain. Opt. Lasers Eng. 2012, 50, 772–779. [Google Scholar] [CrossRef]
  8. Luo, Y.; Yu, J.; Lai, W.; Liu, L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 2019, 78, 22023–22043. [Google Scholar] [CrossRef]
  9. Hayat, U.; Azam, N.A. A novel image encryption scheme based on an elliptic curve. Signal Process. 2019, 155, 391–402. [Google Scholar] [CrossRef]
  10. Liu, F.; Koenig, H. A survey of video encryption algorithms. Comput. Secur. 2010, 29, 3–15. [Google Scholar] [CrossRef]
  11. El-Shafai, W.; Mesrega, A.K.; Ahmed, H.E.H.; El-Bahnasawy, N.A.; Abd El-Samie, F.E. An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks. J. Inf. Secur. Appl. 2022, 64, 103039. [Google Scholar] [CrossRef]
  12. Gupta, G.; Gupta, V.; Chandra, M. An efficient video watermarking based security model. Microsyst. Technol. 2018, 24, 2539–2548. [Google Scholar] [CrossRef]
  13. Asikuzzaman, M.; Pickering, M.R. An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. 2017, 28, 2131–2153. [Google Scholar] [CrossRef]
  14. Liu, Y.; Liu, S.; Wang, Y.; Zhao, H.; Liu, S. Video steganography: A review. Neurocomputing 2019, 335, 238–250. [Google Scholar] [CrossRef]
  15. Hafsa, A.; Fradi, M.; Sghaier, A.; Malek, J.; Machhout, M. Real-time video security system using chaos-improved advanced encryption standard (IAES). Multimed. Tools Appl. 2022, 81, 2275–2298. [Google Scholar] [CrossRef]
  16. Cheng, S.; Wang, L.; Ao, N.; Han, Q. A selective video encryption scheme based on coding characteristics. Symmetry 2020, 12, 332. [Google Scholar] [CrossRef]
  17. Hadj Brahim, A.; Ali Pacha, A.; Hadj Said, N. An image encryption scheme based on a modified AES algorithm by using a variable S-box. J. Opt. 2024, 53, 1170–1185. [Google Scholar] [CrossRef]
  18. Huang, Q.; Wang, L.; Chen, J. An efficient video slice encryption scheme and its application. Cybersecurity 2025, 8, 40. [Google Scholar] [CrossRef]
  19. Zhang, H.; Kone, M.; Ma, X.; Zhou, N. Frequency-domain attention-guided adaptive robust watermarking model. J. Frankl. Inst. 2025, 362, 107511. [Google Scholar] [CrossRef]
  20. Hu, L.; Chen, M.; Wang, M.; Zhou, N. Visually meaningful triple images encryption algorithm based on 2D compressive sensing and multi-region embedding. Knowl.-Based Syst. 2025, 324, 113804. [Google Scholar] [CrossRef]
  21. Bose, R.C.; Shimamoto, T. Classification and analysis of partially balanced incomplete block designs with two associate classes. J. Am. Stat. Assoc. 1952, 47, 151–184. [Google Scholar] [CrossRef]
  22. Bannai, E.; Bannai, E.; Bannai, H. Uniqueness of certain association schemes. Eur. J. Comb. 2008, 29, 1379–1395. [Google Scholar] [CrossRef][Green Version]
  23. Zieschang, P.H. An Algebraic Approach to Association Schemes; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
  24. Sabharwal, A.; Yadav, P.; Sharma, R. Association Schemes for Some Finite Group Rings II. Commun. Appl. Nonlinear Anal. 2024, 31, 392–402. [Google Scholar] [CrossRef]
  25. Sabharwal, A.; Yadav, P.; Sharma, R. Association schemes in encrypting two dimensional data. J. Discret. Math. Sci. Cryptogr. 2025, 28, 161–183. [Google Scholar] [CrossRef]
  26. Chan, A.; Martin, W.J. Quantum isomorphism of graphs from association schemes. J. Comb. Theory Ser. B 2024, 164, 340–363. [Google Scholar] [CrossRef]
  27. Arnold, V.I.; Avez, A. Ergodic Problems of Classical Mechanics; W.A. Benjamin: New York, NY, USA, 1968; Volume 9. [Google Scholar]
  28. Kotel, S.; Zeghid, M.; Baganne, A.; Saidani, T.; Daradkeh, Y.I.; Rached, T. FPGA-based real-time implementation of AES algorithm for video encryption. In Recent Advances in Telecommunications, Informatics and Educational Technologies; WSEAS Press: Athens, Greece, 2014; pp. 27–36. [Google Scholar]
  29. Elkamchouchi, H.; Salama, W.M.; Abouelseoud, Y. New video encryption schemes based on chaotic maps. IET Image Process. 2020, 14, 397–406. [Google Scholar] [CrossRef]
Figure 1. Original, encrypted, and decrypted videos for the test sequences: (ac) Akiyo: (a) original, (b) encrypted, (c) decrypted; (df) Coastguard: (d) original, (e) encrypted, (f) decrypted; (gi) Foreman: (g) original, (h) encrypted, (i) decrypted.
Figure 1. Original, encrypted, and decrypted videos for the test sequences: (ac) Akiyo: (a) original, (b) encrypted, (c) decrypted; (df) Coastguard: (d) original, (e) encrypted, (f) decrypted; (gi) Foreman: (g) original, (h) encrypted, (i) decrypted.
Mathematics 13 02865 g001
Figure 2. Histogram analysis of ‘Akiyo’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Figure 2. Histogram analysis of ‘Akiyo’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Mathematics 13 02865 g002
Figure 3. Histogram analysis of ‘Coastguard’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Figure 3. Histogram analysis of ‘Coastguard’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Mathematics 13 02865 g003
Figure 4. Histogram analysis of ‘Foreman’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Figure 4. Histogram analysis of ‘Foreman’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Mathematics 13 02865 g004
Figure 5. Pixel intensity of ‘Akiyo’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Figure 5. Pixel intensity of ‘Akiyo’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Mathematics 13 02865 g005
Figure 6. Pixel intensity of ‘Coastguard’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Figure 6. Pixel intensity of ‘Coastguard’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Mathematics 13 02865 g006
Figure 7. Pixel intensity of ‘Foreman’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Figure 7. Pixel intensity of ‘Foreman’: (a) original frame, (b) encrypted frame, (c) decrypted frame.
Mathematics 13 02865 g007
Figure 8. Quantum cipher framework based on association schemes. The classical encryption key K defines the coefficients α i for constructing the unitary operator U K , which acts on quantum-encoded multimedia data for encryption. Decryption is achieved using U K .
Figure 8. Quantum cipher framework based on association schemes. The classical encryption key K defines the coefficients α i for constructing the unitary operator U K , which acts on quantum-encoded multimedia data for encryption. Decryption is achieved using U K .
Mathematics 13 02865 g008
Figure 9. A block diagram for the construction of the unitary encryption operator U K from an association scheme.
Figure 9. A block diagram for the construction of the unitary encryption operator U K from an association scheme.
Mathematics 13 02865 g009
Table 1. Error analysis of original and encrypted videos.
Table 1. Error analysis of original and encrypted videos.
VideoChannelMAEMSEPSNR (dB)CCNPCRUACI
AkiyoRed82.193610,625.0230.280.00040.99620.3223
Green75.16558597.1630.110.00020.99520.2948
Blue112.983117,483.2730.910.00090.99800.4431
CoastguardRed88.724111,664.9029.15−0.00010.99690.3479
Green88.810211,684.9829.21−0.00010.99690.3483
Blue95.388513,334.7230.260.00000.99690.3741
ForemanRed100.307414,732.8926.940.00030.99740.3934
Green96.825713,867.1227.040.00020.99720.3797
Blue97.124813,715.8428.500.00000.99680.3809
Table 2. Error analysis of original and decrypted videos.
Table 2. Error analysis of original and decrypted videos.
VideoChannelMAEMSEPSNR (dB)CCNPCRUACI
AkiyoRed00Inf100
Green00Inf100
Blue00Inf100
CoastguardRed00Inf100
Green00Inf100
Blue00Inf100
ForemanRed00Inf100
Green00Inf100
Blue00Inf100
Table 3. A comparison of encryption techniques.
Table 3. A comparison of encryption techniques.
TechniquePSNR (dB)MAENPCR (%)UACI (%)Correlation Coefficient
HVD
VCMAB [29]13.214686.695298.6334.030.00190.00450.0033
VCMTH [29]14.988787.351599.3735.140.00250.00370.0049
Hosny et al. [1]7.98-99.6133.46−0.0099−0.00430.0116
Kotel et al. [28]----0.0056 2.28 × 10 5 0.0091
Cheng et al. [16]-------
Hafsa et al. [15]----−0.0045−0.0026−0.0081
Proposed6.652898.086099.7135.6518−0.0002 6.81 × 10 5 −0.0004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sharma, R.K.; Sabharwal, A.; Yadav, P. A Dual Approach Cryptographic Model for Video Transmission Based on Association Schemes. Mathematics 2025, 13, 2865. https://doi.org/10.3390/math13172865

AMA Style

Sharma RK, Sabharwal A, Yadav P. A Dual Approach Cryptographic Model for Video Transmission Based on Association Schemes. Mathematics. 2025; 13(17):2865. https://doi.org/10.3390/math13172865

Chicago/Turabian Style

Sharma, Rajendra Kumar, Anuradha Sabharwal, and Pooja Yadav. 2025. "A Dual Approach Cryptographic Model for Video Transmission Based on Association Schemes" Mathematics 13, no. 17: 2865. https://doi.org/10.3390/math13172865

APA Style

Sharma, R. K., Sabharwal, A., & Yadav, P. (2025). A Dual Approach Cryptographic Model for Video Transmission Based on Association Schemes. Mathematics, 13(17), 2865. https://doi.org/10.3390/math13172865

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop