

Furthermore, the adoption of multimedia rich content, within videos or images, has increased considerably in IoT environments, with the result that the Motion Pictures Experts Group (MPEG) is now standardizing audio–visual and other media data formats as part of an IoMT. However, even more so than within the traditional Internet, the IoT architecture has inherent security weaknesses of which this paper focuses on confidentiality. Storage and later analysis of data can be on remote cloud data centers. The aim is to make these devices intelligent by allowing them to interact with each other, that is, they become smart objects. In IoMT applications, video-surveillance devices might be deployed in various scenarios, such as within public transport management systems (managing buses, airplanes or road traffic), health management services (for patient or child monitoring), personal asset protection (within homes or construction sites) and many more. Thus, the results demonstrate that the proposed security scheme is a suitable choice for constrained devices in an Internet of Multimedia Things environment.Īn Internet of Things (IoT) is a networked architecture, of which the Internet of Multimedia Things (IoMT) is an emerging sub-set, integrating many devices and sensors at the Internet edge. A detailed comparative analysis of EXPer with other state-of-the-art encryption algorithms confirms that EXPer provides significant confidentiality with a small computational cost and a negligible encryption bitrate overhead. As a diagnostic tool, the Encryption Space Ratio measures encoding complexity of the video relative to the level of encryption so as to judge the success of the encryption process, according to entropy coder.

The selected syntax elements are taken from the final stage of video encoding that is during the entropy coding stage. To address such limitations, this paper presents a lightweight selective encryption scheme, in which encoder syntax elements are encrypted with the innovative EXPer (extended permutation with exclusive OR).


Some of them have limitations, in terms of: significant delay due to computational cost, or excess memory utilization, or, despite being energy efficient, not providing a satisfactory level of confidentiality, due to their simplicity. To reduce the overhead and the lack of flexibility arising from full encryption of the content, a good number of selective-encryption algorithms have been proposed in the last decade. This leads to the encryption of that content. Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such as that arising from video surveillance, is of heightened concern.
