Research Article
An Efficient Video Encryption Algorithm Based on the Pseudorandom Number Generator of Zipf Distribution
Figure 14
Replacement attack results for Mobile. (a) encrypted frame #1 substituted by constant 0. (b) Encrypted frame #30 substituted by constant 0. (c) Encrypted frame #1 substituted by constant 1. (d) Encrypted frame #30 substituted by constant 1. (e) Encrypted frame #1 substituted by a random sequence. (f) Encrypted frame #30 substituted by a random sequence.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |