Research Article

An Efficient Video Encryption Algorithm Based on the Pseudorandom Number Generator of Zipf Distribution

Figure 14

Replacement attack results for Mobile. (a) encrypted frame #1 substituted by constant 0. (b) Encrypted frame #30 substituted by constant 0. (c) Encrypted frame #1 substituted by constant 1. (d) Encrypted frame #30 substituted by constant 1. (e) Encrypted frame #1 substituted by a random sequence. (f) Encrypted frame #30 substituted by a random sequence.
(a)
(b)
(c)
(d)
(e)
(f)