Skip to main content
PLOS ONE logoLink to PLOS ONE
. 2024 Nov 22;19(11):e0311765. doi: 10.1371/journal.pone.0311765

Optimizing video data security: A hybrid MAES-ECC encryption technique for efficient internet transmission

Sobia Shafiq 1,2, Sohaib Latif 3,*, Jawad Ibrahim 2, M Saad Bin Ilyas 3, Azhar Imran 4, Natalia Kryvinska 5, Ahmad Alshammari 6,*, Mohammed El-Meligy 7,8
Editor: M Usman Ashraf9
PMCID: PMC11584095  PMID: 39576785

Abstract

Data security is becoming important as the amount of video data transmitted over the internet grows rapidly. This research article aims to maximize the security of transmitted video data by proposing a novel hybrid technique for video encryption and decryption. Elliptic Curve Cryptography (ECC) and the Modified Advanced Encryption Standard (MAES) are two encryption techniques that are included in the hybrid approach. By providing a more effective and safe method for video encryption and decryption, this research considerably advances the field of video data protection in Internet communication. In the proposed technique the video frames are extracted, and each frame is first encrypted using MAES technique and then again encrypted using ECC technique. After the encryption, the individual frames are merged to make an encrypted video. The same process is performed in reverse order to perform decryption of the video. The results of the experiments demonstrate the effectiveness of the suggested scheme: higher security, better accuracy, and shorter processing times when compared to well-known techniques such as Advanced Encryption Standard (AES), MAES, ECC, Simplified Data Encryption Standard (SDES), and Chaotic Map methods.

Section 1: Introduction

With the expansion of internet and computer networks, video sharing in multimedia applications has now become an indispensable part of our lives. Now video data is being transferred in every field, including commercial, industrial, military, medical, etc. [1]. The security of such data has become a big concern as the data might contain some sensitive information. There is a high need to secure sensitive information from intruders [2]. Cryptography aims to guard sensitive data from unauthorized users by converting it into an unrecognizable form [3].

In the past few years, researchers have proposed many video encryption techniques, including symmetric and asymmetric techniques. Symmetric technique makes use of similar key for encryption and decryption of data, while asymmetric technique uses different keys, one is for encryption and other is for decryption of the data. These techniques are different in terms of the security they provide, complexity in terms of computational, and the time they need for encryption and decryption of the video data [4]. With improvements to its fundamental design and key scheduling algorithm, the widely used AES has evolved into the MAES. MAES is a symmetric technique that provides high security for the encryption of data in large amount [5], The purpose of this change is to strengthen encryption and make it more resistant to new types of cryptographic assaults. However, ECC is an asymmetric technique with a short key that requires less storage space and is considered suitable for encrypting small amounts of data [6]. ECC is well known for being resource-constrained, especially in environments like multimedia applications, because of its efficiency in terms of both key size and computational complexity [7].

To strengthen video content security via strong encryption and effective decryption procedures, this research paper presents a novel hybrid approach that combines two potent cryptographic techniques: ECC and the MAES. By combining the advantages of both algorithms, MAES and ECC offer a comprehensive and sophisticated solution to the problems presented by modern video encryption requirements. Our hybrid approach aims to create a strong and secure framework for video encryption and decryption by combining the advantages of MAES and ECC. This study explores the technical details of MAES and ECC, examining their unique advantages and disadvantages before suggesting an integrated system that best utilizes their complementary qualities. The research holds importance as it can aid in the creation of sophisticated cryptographic methods designed for video content, tackling the difficulties brought about by the dynamic and substantial amounts of multimedia data. This paper’s subsequent sections will examine the specific methodology, experimental findings, and comparative analyses, providing insight into the efficacy and possibility of the suggested hybrid approach in strengthening the security of video storage and communication in the digital sphere.

By combining the advantages of both techniques, we propose a hybrid technique for video encryption in which the videos are first encrypted using MAES and then the encrypted video is again encrypted using the ECC technique. Once the video is encrypted, the decryption of the video can be performed by applying both techniques to the encrypted video but in reverse order. Experimental results illustrate that the proposed hybrid technique is highly secure and takes less computational time than AES, MAES, ECC, SDES and Chaotic Map techniques.

The remaining paper is structured as follows. Section 2 comprises the literature review. Section 3 considers the proposed methodology in detail. Section 4 represents analysis of experimental results, and Section 5 provides the conclusion.

Section 2: Literature survey

The proliferation of digital video content and the increasing reliance on internet transmission underscores the critical importance of video data security. As video data traverse the internet, they face numerous challenges, including unauthorized access, data interception, and potential compromise. Therefore, the optimization of video data security is imperative to ensure the confidentiality, integrity, and authenticity of transmitted content.

In this paper [8] author proposes a new hybrid multi-key cryptography technique for secure communication of video. The objective of the research is to address the concern of protecting copyright and preventing piracy in real-time video streaming systems. The proposed technique utilizes the ECC method as a pseudorandom encryption key generator to encrypt and decrypt small chunks of video files dynamically. Multiple keys are generated on video-based data, enhancing the security of the encryption process. The implementation of the proposed technique was carried out on the Android platform, with sender and recipient applications developed for streaming videos. The performance and security of the system were evaluated, and the outcomes demonstrated superiority in terms of both aspects. The results show significant improvements in terms of encryption and decryption time, as well as parameters such as SSIM, SNR, PSNR, MSE, and RMSE. In [9] author proposes a secure video communication technique based on multi-equation multi-key hybrid cryptography that helps to improve the security of video communication. The proposed technique aims to secure the content of video from unauthorized access and ensure the confidentiality and integrity of the transmitted data. The results demonstrate the effectiveness of the multi-equation multi-key hybrid cryptography approach in providing enhanced security for video communication. This research [10] presents a hybrid cryptographic approach that combines the AES and DES algorithms. The paper discusses the implementation of the hybrid cryptographic technique and evaluates its performance and security. The results exhibit the effectiveness of the hybrid approach in terms of encryption and decryption speed and the level of security provided.

A video encryption scheme that utilizes hybrid encryption technology is presented in this research [11]. The focus of this research is to enhance the security of video content by employing a combination of encryption techniques. The proposed scheme aims to protect video data from unauthorized access and ensure the confidentiality and integrity of the content. The results demonstrate the effectiveness of the hybrid encryption technology in providing robust protection for video content. The objective of the research in [12] is to obtain an encryption algorithm which combines the efficiency of MAES and the security of ECC. The paper describes the implementation of the EMAES algorithm in MATLAB and Android Studio, using a messaging application. The results show that EMAES is 30% more efficient in terms of encryption and decryption time compared to other algorithms. The security of EMAES is also improved when compared to other hybrid algorithms, as demonstrated by parameters like, SNR, PSNR, SSIM, MSE, and RMSE.

The author [13] proposed a real-time video security system that utilizes a chaos-improved Advanced Encryption Standard (IAES) algorithm. This research enhances the security of real-time video streaming systems by incorporating chaos-based encryption techniques into the AES algorithm. The paper describes the implementation of the IAES algorithm and its application in video encryption and decryption. The IAES algorithm utilizes chaos-based techniques to generate encryption keys, which are used to encrypt and decrypt video data in real-time. The research evaluates the performance and security of the proposed system by implementing it on devices and streaming videos. In this paper [14] author proposes a multi-level image security system that combines ECC, magic matrix, and the AES. The objective of the research is to enhance the security of image data by utilizing multiple encryption techniques.

The proposed system utilizes ECC to generate encryption keys and achieve encryption and decryption operations on the image data. Additionally, a magic matrix is employed to further improve the security of the encrypted image. The AES algorithm is used as the primary encryption algorithm in the multi-level security system. The research evaluates the performance and security of the proposed system by conducting experiments on image data.

A novel approach for multimedia encryption using a hybrid cryptographic technique is proposed in [15]. The proposed approach utilizes a hybrid cryptographic technique, which combines multiple encryption algorithms to encrypt multimedia data. The research evaluates the performance and security of the proposed approach by conducting experiments on multimedia data. The paper titled "A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in IoT multimedia applications" presents innovative hybrid cryptosystem for streaming of H.265 compressed videos securely in IoT multimedia applications. The objective of the research is to develop a secure cryptosystem that can be used for streaming high efficiency H.265 compressed videos in IoT multimedia applications. The proposed hybrid cryptosystem combines multiple encryption techniques to ensure the security of the streamed videos. The research evaluates the execution and security of the proposed cryptosystem by conducting experiments on H.265 compressed videos [16].

Author in [17] used the Advance Encryption Standard (AES) algorithm for video encryption. In their approach different sets of round keys were derived from the cipher keys and the plain text was initialized in a state array. The initial round key was then added to the start of the state array and ten different rounds were performed for the state modification. After these rounds, the final state array was copied as cipher text output. Different video lengths ranging from 18 to 52 seconds were used for experiments. In this paper [18] researchers highlighted the limitations of the AES technique for video encryption including high calculations, computation overhead and time consumption. They proposed an AES technique with modifications and named it as Modified Advance Encryption Standard (MAES). Experiments in [18] were performed using the same video lengths that were used in [17] and the comparison showed that the MAES technique worked faster as compared to the AES technique.

Shrutika et al. [19] presented a scheme which consisted of three modules. These modules are data embedding, video encryption, and data extraction. The video encryption was performed using the RC4 method, which is a stream cipher and produces improve results as compared to a block cipher. The RC4 algorithm was provided with a secret key to generate a key stream. XOR operation was then performed on the generated key stream and the video stream to perform video encryption. Although, the RC4 algorithm is a block cipher but is more vulnerable to the attacks and this technique cannot be easily implemented on small streams of data. In [20] author proposed a method of video encryption using the SDES and chaotic map schemes. In the proposed scheme, video was converted from RGB to Y-Cb-Cr color space to make encryption simpler. After the conversion, only the Y component was encrypted through a selection mechanism using the SDES, and the encryption on remaining frames was performed using a chaotic map scheme. For exchanging the keys, the RSA public key cryptosystem was used. At last, the merging of Y-Cb-Cr frames was done to make a video. The resultant video was then changed back to RGB to get an encrypted RGB video. The proposed technique takes much time for conversion from R-G-B to Y-Cb-Cr color space of videos which makes it a time-consuming technique.

In [21], researchers proposed a method called Unequal Secure Encryption (USE), which encrypts different portions of videos using different cryptographic techniques. The proposed scheme was divided into two modules. The First module was based on the classification of the video data, and the second module was based on USE. Two segments were generated in the video classification module which they named as “important” and “unimportant” video segments. After the division, the important video segments were encrypted using the AES technique and the unimportant video segments were encrypted using the Fast Leak Extraction (FLEX). After encrypting with FLEX, they were subjected to an XOR operation to reduce computational costs. Although the scheme offered advantages like low computational cost, but it is a quite complex technique. Authors used ECC technique for real time video encryption in [22]. The suggested approach focuses on analyzing the performance of several ECC curves for real-time video encryption before recommending an appropriate ECC curve for the best outcomes. The suggested method is based on a client-server architecture in which the server encrypts the video frame by frame as the client sends the initial request for video. It was determined that the X9.62 272-bit binary curve and the NIST-recommended 256-bit prime curves are appropriate for real-time video encryption after looking at 18 different curves. The suggested method was developed only on an institutional network and is only mentioned for real-time video streaming. The literature review is discussed more in Table 1 with their contribution.

Table 1. Background study.

Ref. Year Method Used Contribution Limitation
[8] 2023 Hybrid Multikey Cryptography Introduces an advanced hybrid multikey cryptography technique for securing video communication. Specifics of the hybrid approach and its adaptability to various video formats may require further exploration.
[9] 2023 Multi-Equation Multi-Key Hybrid Cryptography Presents a secure video communication system utilizing a multi-equation multi-key hybrid cryptography approach. The effectiveness in diverse network conditions and scalability could be areas for further investigation.
[10] 2023 Hybrid Cryptographic Encryption and Decryption Proposes a hybridized encryption and decryption technique using both AES and DES for enhanced security. The performance trade-offs and computational efficiency of the hybrid scheme might need further analysis.
[11] 2020 Hybrid Encryption Technology Introduces a video encryption scheme utilizing hybrid encryption technology for enhanced data security. Specifics on the adaptability to various video formats and real-time performance could be areas for exploration.
[12] 2023 EMAES Hybrid Encryption Algorithm Implements and evaluates the EMAES hybrid encryption algorithm for secure and efficient multimedia file sharing. Further investigation is required to assess the algorithm’s performance in large-scale multimedia file sharing.
[13] 2022 Chaos-Improved Advanced Encryption Standard (IAES) Proposes a real-time video security system employing IAES, enhancing the security of video streams with chaos. The impact on computational overhead and real-time performance in different scenarios may require examination.
[14] 2022 Elliptic Curve, Magic Matrix, AES Introduces a multi-level image security system combining elliptic curve, magic matrix, and AES for heightened security. The scalability and efficiency of the proposed multi-level security system may warrant further exploration.
[15] 2016 Hybrid Cryptographic Techniques Presents a novel idea of multimedia encryption using hybrid cryptographic techniques, offering enhanced security. Specifics on the adaptability to different multimedia formats and real-time performance could be areas for exploration.
[16] 2020 Hybrid Cryptosystem for Secure Streaming Proposes a novel hybrid cryptosystem for secure streaming of compressed videos in IoT multimedia applications. The impact on latency and resource utilization in IoT environments may need further investigation.
[17] 2014 AES Algorithm Discusses video encryption using the AES, contributing to video data security. The adaptability and efficiency of the AES algorithm in different video formats and sizes could be explored.
[18] 2014 Modified AES Algorithm Introduces a modified AES algorithm for MPEG video encryption, aiming to enhance security in multimedia applications. The applicability of the modified AES algorithm to various MPEG video formats and compression levels may need scrutiny.
[19] 2015 RC4 Encryption Scheme Discusses securing compressed video streams using the RC4 encryption scheme, contributing to multimedia data security. The robustness and performance of the RC4 encryption scheme in different compression scenarios could be explored.
[20] 2018 Selective Frame Scheme Proposes robust encryption of uncompressed videos with a selective frame scheme, contributing to video data security. The efficiency and trade-offs of the selective frame scheme in different video content and sizes may warrant investigation.
[21] 2007 New Video Encryption Scheme for H. 264/AVC Introduces a new video encryption scheme specifically designed for H. 264/AVC, enhancing video data security. The compatibility and performance of the proposed scheme with other video compression standards may need examination.
[22] 2018 Elliptic Curves for Real-time Video Encryption Conducts a performance analysis of elliptic curves for real-time video encryption, contributing to video security. The scalability and resource utilization of elliptic curves in real-time scenarios may need further exploration.
[23] 2022 Secure Image Steganography Technique based on Hybrid Transforms and Enhanced AES Proposing an innovative approach to image steganography that utilizes hybrid transforms and enhanced Advanced Encryption Standard (AES) algorithms. The paper aims to enhance the security and robustness of steganographic methods for hiding secret information within digital images.
[24] 2019 Chaos based efficient selective image encryption Discusses the significance of encryption in ensuring patient privacy and the secure transmission of medical data. It underscores the importance of encryption in maintaining patient privacy and ensuring the secure transmission of medical data.
[25] 2018 Elliptic Curve, Multi-Keys, Chaotic Map Introduces elliptic curve video encryption based on multi-keys and chaotic map for secure mobile communication. The scalability and computational efficiency of the proposed method in mobile environments may require further examination.
[26] 2023 Encryption algorithm, Chaos-based block permutation The proposed encryption algorithm can effectively resist the chosen-plaintext attack. It is crucial to recognize the potential limitations and continuously assess its security posture in evolving threat landscapes.
[27] 2020 Cryptanalyzing an image cipher using multiple chaos and DNA operations A chosen-plaintext attack method to attack ICIC-DNA. Differential analysis is firstly adopted to break the DNA-base permutation process, and then the DNA domain encryption is eliminated, and finally the equivalent key is used to achieve complete cracking. The limitations stem from the lack of detail, context, and discussion on ethical and legal considerations, as well as ambiguity in terminology. These factors hinder a thorough understanding and evaluation of the text’s claims and implications.
[28] 2023 Bit-level image encryption algorithm based on chaotic maps Chooses a cipher image with the same sum value as that of the target cipher image to break the confusion module possessing a dynamic mechanism. The absence of real-world application scenarios and comparative analyses diminishes the study’s relevance and practical significance in cryptography.
[29] 2022 Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding Revealing weaknesses in image encryption through cryptanalysis of an algorithm utilizing a quantum chaotic map and DNA coding. Encryption algorithm using quantum chaotic map and DNA coding is inherently secure, overlooking vulnerabilities or weaknesses that may exist under certain conditions or attack scenarios.
[30] 2024 Image encryption scheme using variant Hill cipher and chaos The research paper contributes by uncovering vulnerabilities through cryptanalysis of an image encryption scheme that utilizes a variant of the Hill cipher and chaos. Encryption scheme using a variant of the Hill cipher and chaos is secure, without fully exploring potential vulnerabilities or weaknesses that may exist under different attack scenarios or cryptographic analyses.

Section 3: Proposed methodology

Video encryption technique must be secure, fast and easy to implement so that it can be used in real world. After reviewing different video encryption techniques, our proposed methodology is a hybrid video encryption and decryption technique in which the advantages of Modified Advance Encryption Standard (MAES) and ECC algorithms are used. In the proposed technique the video is split into multiple frames for encryption and decryption and an array of bitmap images is created which holds the frames of the video. After that each video frame is first encrypted using MAES algorithm and then again encrypted using ECC algorithm. The flowchart of proposed technique is given below shown in Fig 1.

Fig 1. Flowchart of proposed technique.

Fig 1

MAES algorithm uses the concept of row shifting and ECC follows column shifting of pixels present in a frame. Shifting of pixels will depend on the grayscale value of each 4th pixel in both vertical and horizontal direction which will be calculated using the equation 1.

G=r+g+b3 (1)

Once encryption is done, the encrypted frames will be combined to generate a complete encrypted video. On the other hand, while performing decryption the encrypted video will be split into multiple frames and each frame will be decrypted using ECC and MAES algorithm and then combined into an understandable digital video. This section further provides an overview of encryption, decryption and key generation steps used in the proposed technique.

3.1. Encryption process in proposed methodology

Fig 2 represents the encryption process of the proposed technique where random keys are generated including MAES shared key, ECC public and ECC private key. These keys are used for the encryption and decryption of the video frames and to enhance the security to the video data, the MAES shared key and ECC private key are encrypted using Rail Fence Cipher [15]. The pseudocode of the proposed technique is described below:

Fig 2. Encryption process in proposed technique.

Fig 2

Pseudocode for MAES Encryption
function MAES_Encrypt(plaintext, key):
expandedKey = KeyExpansion(key)
state = AddRoundKey(plaintext, expandedKey[0])
for round from 1 to Nr-1:
state = SubBytes(state)
state = ShiftRows(state)
state = MixColumns(state)
state = AddRoundKey(state, expandedKey[round])
state = SubBytes(state)
state = ShiftRows(state)
ciphertext = AddRoundKey(state, expandedKey[Nr])
return ciphertext
Pseudocode for ECC Encryption
function ECC_Encrypt(plaintext, publicKey):
messagePoint = EncodeMessageAsPoint(plaintext)
ephemeralKey = GenerateEphemeralKey()
sharedSecret = Multiply(publicKey, ephemeralKey)
ciphertext = PointAddition(messagePoint, sharedSecret)
return ciphertext
Integration of MAES and ECC Encryption
function Hybrid_Encrypt(plaintext, maesKey, eccPublicKey):
// Step 1: MAES Encryption
maesCiphertext = MAES_Encrypt(plaintext, maesKey)
// Step 2: ECC Encryption
eccCiphertext = ECC_Encrypt(maesCiphertext, eccPublicKey)
return eccCiphertext

To perform encryption, first the video is split into multiple frames and then each frame is first encrypted by MAES algorithm using its key. Once frame get encrypted using MAES algorithm, again encryption is performed on it using the public key of ECC algorithm to further encrypt the video frames. As each frame gets encrypted by MAES and ECC algorithms, it will be stored in a bit map array. When all the frames of video get encrypted, the bitmap array will be converted into encrypted version of the original video.

3.2. Decryption process in proposed technique

Fig 3 shows the decryption process of the encrypted video where the key file and encrypted video is used. To perform the decryption of video, the keys are first decrypted. The encrypted video is again split into frames and each frame is first decrypted using ECC algorithm and the decrypted frame is then again decrypted using MAES algorithm to get the original video.

Fig 3. Decryption process in proposed technique.

Fig 3

3.3. Operation on each individual frame

In the proposed technique MAES technique is used for row shifting of individual frames of video. In MAES, the value of gray value of 1st row and 1st column is checked. If the gray value of the 1st row and the 1st column is even, then no shift will be performed in the 1st and 4th row however 2nd row is shifted towards the right three places cyclically, and the 3rd row is shifted towards the left five places cyclically as shown in Fig 4.

Fig 4. MAES Row shifting when 1st row and 1st column is even.

Fig 4

On the other hand, if the value of 1st row and 1st column is odd, then the 1st and 3rd row remain unchanged but the 2nd row is shifted towards left by one place and the 4th row is shifted towards left three place as shown in Fig 5. The same operation will perform on each frame 14 times i.e. 14 rounds for MAES encryption.

Fig 5. MAES row shifting when 1st row and 1st column is odd.

Fig 5

Once the MAES encryption is performed, the MAES encrypted frame will be further encrypted using ECC’s algorithm. In the proposed technique ECC algorithm is used to perform the column shifting of the pixels in the video frames which is made in pixels vertically upward or downward.

Algorithm 1:MAES and ECC encryption on each frame of a video

def encrypt_video(video_frames):

frameCount = len(video_frames)

e = keyGeneration(ECC_keys)

m = keyGeneration(MAES_key)

encrypted_frames = []

for i in range(frameCount):

frame = video_frames[i]

# MAES encryption

frame = shiftRow(frame, m)

frame1 = MAES_encryption(frame)

# ECC encryption

frame1 = shiftColumn(frame1, e)

frame2 = Hybrid_encryption(frame1)

encrypted_frames.append(frame2)

return encrypted_frames

Section 4: Results

In the proposed methodology a hybrid technique is proposed which comprises of two different algorithms including MAES and ECC for encryption and decryption of a video. The proposed technique is developed using C sharp. Experimentation is performed on the proposed technique using different video sizes that are already used in the different research papers and the analysis of results is discussed in this section.

Table 2 represents the comparison of encryption time required for encrypting a video using AES algorithm and our proposed hybrid technique. Result revels that our system takes much less encryption time as compare to the existing technique [17].

Table 2. Comparison between AES [17] and proposed technique.

Video Length Encryption Time Using
AES Proposed Hybrid System
32 sec 270 sec 64.99 sec
52 sec 318 sec 98.62 sec
33 sec 270 sec 60.44 sec
23 sec 215 sec 40.75 sec
20 sec 201 sec 42.18 sec

Table 3 shows the comparison of the encryption and decryption time required for encrypting and decrypting a video using MAES [18] algorithm and proposed technique.

Table 3. Comparison of encryption and decryption time using MAES [18] and proposed technique.

Video Size MAES Time (ms) Proposed Hybrid Scheme (ms)
MB Encryption Decryption Encryption Decryption
1.26 MB 1122 2540 1045 2341
4.45 MB 2476 4823 2275 4652
1.11 MB 917 2011 857 1987

Table 4 represents the comparison of the encryption and decryption time required to encrypt and decrypt different video length using the Hybrid technique 2018 (SDES and Chaotic Map Scheme) [19] and our proposed system. Result shows that our proposed hybrid approach takes less time for encryption and decryption of same video length.

Table 4. Comparison between Hybrid technique 2018 [19] and our proposed system.

Video Length Hybrid Technique 2018 (SDES & Chaotic Map Scheme) Our Proposed Hybrid System
ET DT ET DT
300 frames 249.47 sec 191.73 sec 173.88 sec 128.31 sec
400 frames 286.77 sec 274.14 sec 103.69 sec 99.37 sec
240 frames 445 sec 317.95 sec 121.37 sec 113.31 sec
500 frames 890.5 sec 603.81 sec 280.56 sec 232.18 sec

Table 5 shows the comparison of hybrid technique (including AES and ECC algorithm) discussed in [23] and our proposed technique.

Table 5. Comparison of hybrid technique [23] and our proposed technique.

File Size Encryption Time in Seconds
Hybrid System (AES and ECC) Our Proposed System
1.1 Mb 0.79 0.67
1.20 Mb 0.85 0.78
4.45 Mb 1.24 1.03

Another hybrid technique is proposed in [24] comprises of AES and ECC algorithm. Table 6 shows the comparison of time required to encrypt and decrypt a video using technique discuss in [24] and our proposed technique.

Table 6. Comparison of hybrid technique [24] and our proposed technique.

Size of File Hybrid Scheme Proposed Technique
896 KB 0.16 0.11
1.31 MB 0.24 0.20
1.5 MB 0.30 0.24
3.75 MB 0.64 0.53

Fig 6 represents the graphical comparison of time required for encryption using AES and our proposed hybrid scheme.

Fig 6. Graphical comparison between AES and proposed hybrid system.

Fig 6

Fig 7 represents the graphical comparison of the encryption and decryption time required for encrypting and decryption same video lengths using the Hybrid Scheme 2018 (SDES and Chaotic Map scheme) and our proposed technique.

Fig 7. Graphical comparison of the SDES and chaotic map scheme and the proposed hybrid system.

Fig 7

Section 5: Conclusion

This research paper has presented a novel approach for optimizing video data security through the development of a hybrid MAES-ECC encryption technique tailored for efficient internet transmission. By integrating Modified Advanced Encryption Standard (MAES) and Elliptic Curve Cryptography (ECC), the proposed technique offers enhanced security measures while ensuring computational efficiency and facilitating seamless transmission over the internet. Throughout the study, we have elucidated the rationale behind key design decisions, including the selection of appropriate key sizes and encryption rounds, to address the unique challenges posed by video data encryption. Through extensive experimentation and analysis, the effectiveness and performance of the hybrid encryption technique have been demonstrated, underscoring its potential for safeguarding video data in diverse internet transmission scenarios. Moving forward, further research avenues may explore optimizations and enhancements to refine the proposed technique, thereby advancing the realm of video data security in the context of internet transmission.

Acknowledgments

The first author is thankful to all co-authors who contributed to carrying out the proposed work.

Data Availability

All relevant data are within the manuscript.

Funding Statement

The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA for funding this research work through the project number “NBU-FFR-2024-2990-01”.

References

  • 1.Nauman A., Qadri Y. A., Amjad M., Zikria Y. B., Afzal M. K., and Kim S. W., "Multimedia Internet of Things: A comprehensive survey," IEEE Access, vol. 8, pp. 8202–8250, 2020. [Google Scholar]
  • 2.Aqeel M., Ali F., Iqbal M. W., Rana T. A., Arif M., and Auwul M. R., "A review of security and privacy concerns in the internet of things (IoT)," Journal of Sensors, vol. 2022, 2022. [Google Scholar]
  • 3.Sarkar A., Chatterjee S. R., and Chakraborty M., "Role of cryptography in network security," in The "essence" of network security: an end-to-end panorama. pp. 103–143, 2021. [Google Scholar]
  • 4.Padhiar S. and Mori K. H., "A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques," in Implementing Data Analytics and Architectures for Next Generation Wireless Communications, IGI Global, pp. 132–144, 2022. [Google Scholar]
  • 5.Hafsa A., Sghaier A., Malek J., and Machhout M., "Image encryption method based on improved ECC and modified AES algorithm," Multimedia Tools and Applications, vol. 80, pp. 19769–19801, 2021. [Google Scholar]
  • 6.Ullah S., Zheng J., Din N., Hussain M. T., Ullah F., and Yousaf M., "Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey," Computer Science Review, vol. 47, p. 100530, 2023. [Google Scholar]
  • 7.Khan M. N., Rao A., and Camtepe S., "Lightweight cryptographic protocols for IoT-constrained devices: A survey," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4132–4156, 2020. [Google Scholar]
  • 8.Fouzar Y., Lakhssassi A., and Ramakrishna M., "A Novel Hybrid Multikey Cryptography Technique for Video Communication," IEEE Access, vol. 11, pp. 15693–15700, 2023. [Google Scholar]
  • 9.Fouzar Y., Lakhssassi A., and Mundugar R., "Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography," Future Internet, vol. 15, no. 12, p. 387, 2023. [Google Scholar]
  • 10.Kanshi A., Soundrapandiyan R., Sofia V. A., and Rajasekar V. R., "Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard," Cybernetics and Information Technologies, vol. 23, no. 4, pp. 63–78, 2023. [Google Scholar]
  • 11.Han Q., Wang L., Lee Y., and Qin J., "Video encryption scheme using hybrid encryption technology," International Journal of Internet Protocol Technology, vol. 13, no. 1, pp. 1–8, 2020. [Google Scholar]
  • 12.Somaiya R., Gonsai A., and Tanna R., "Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed," International journal of electrical and computer engineering systems, vol. 14, no. 4, pp. 401–409, 2023. [Google Scholar]
  • 13.Hafsa A., Fradi M., Sghaier A., Malek J., and Machhout M., "Real-time video security system using chaos-improved advanced encryption standard (IAES)," Multimedia Tools and Applications, pp. 1–24, 2022. [Google Scholar]
  • 14.Raju D., Eleswarapu L., Pranav M. S., and Sinha R. K., "Multi-level image security using elliptic curve and magic matrix with advanced encryption standard," Multimedia Tools and Applications, vol. 81, no. 26, pp. 37783–37803, 2022. [Google Scholar]
  • 15.Iyer S. C., Sedamkar R. R., and Gupta S., "A novel idea on multimedia encryption using hybrid crypto approach," in Proc. Comput. Sci., vol. 79, pp. 293–298, Jan. 2016. [Google Scholar]
  • 16.Alarifi A., Sankar S., Altameem T., Jithin K., Amoon M., and El-Shafai W., "A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in IoT multimedia applications," IEEE Access, vol. 8, pp. 128548–128573, 2020. [Google Scholar]
  • 17.Dumbere D. M. and Janwe N. J., "Video encryption using AES algorithm," in Second International Conference on Current Trends In Engineering and Technology-ICCTET 2014, pp. 332–337, July 2014. [Google Scholar]
  • 18.Deshmukh P. and Kolhe V., "Modified AES based algorithm for MPEG video encryption," in International Conference on Information Communication and Embedded Systems (ICICES2014), pp. 1–5, February 2014. [Google Scholar]
  • 19.Giradkar S. S. and Bhattacharya A., "Securing compressed video streams using RC4 encryption scheme," in 2015 Global Conference on Communication Technologies (GCCT), pp. 640–644, April 2015. [Google Scholar]
  • 20.Hole R. N. and Kolhekar M., "Robust encryption of uncompressed videos with a selective frame scheme," in 2018 3rd International Conference for Convergence in Technology (I2CT), pp. 1–7, April 2018. [Google Scholar]
  • 21.Fan Y., Wang J., Ikenaga T., Tsunoo Y., and Goto S., "A new video encryption scheme for H. 264/AVC," in Advances in Multimedia Information Processing–PCM 2007: 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11–14, 2007. Proceedings 8, pp. 246–255, Springer Berlin Heidelberg, 2007. [Google Scholar]
  • 22.Sen N., Dantu R., Vempati J., and Thompson M., "Performance analysis of elliptic curves for real-time video encryption," in 2018 National Cyber Summit (NCS), pp. 64–71, June 2018. [Google Scholar]
  • 23.Shaik S. B., Devi D. S., Sujithra M., Sarika G., Tripathi V., and Kapila D., "Secure Image Steganography Technique based on Hybrid Transforms and Enhanced AES," in 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), pp. 01–06, November 2022. IEEE. [Google Scholar]
  • 24.Khan J. S. and Ahmad J., "Chaos based efficient selective image encryption," Multidimensional Systems and Signal Processing, vol. 30, pp. 943–961, 2019. [Google Scholar]
  • 25.Naji A. K., "Elliptic curve video encryption in mobile phone based on multi-keys and chaotic map," Al-Mustansiriyah Journal of Science, vol. 29, no. 2, pp. 106–116, 2018. [Google Scholar]
  • 26.Ahmed S. T., Hammood D. A., Chisab R. F., Al-Naji A., and Chahl J., "Medical Image encryption: A comprehensive review," Computers, vol. 12, no. 8, p. 160, 2023. [Google Scholar]
  • 27.Paul A. J., "Recent advances in selective image encryption and its indispensability due to COVID-19," in 2020 IEEE Recent Advances in Intelligent Computational Systems (RAICS), pp. 201–206, 2020. [Google Scholar]
  • 28.Vijaykumar S. and Thyagaraj S. P., "Optimizing multimedia communication in internet of thing network for improving quality of service," The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 31, no. 2, pp. 1201–1210, 2023. [Google Scholar]
  • 29.Lalithambigai B. and Chitra S., "Segment Based Compressive Sensing (SBCS) of Color Images for Internet of Multimedia Things Applications," Journal of Medical Imaging and Health Informatics, vol. 12, no. 1, pp. 1–6, 2022. [Google Scholar]
  • 30.Wen H., Lin Y., Yang L., and Chen R., "Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos," Expert Systems with Applications, p. 123748, 2024. [Google Scholar]

Decision Letter 0

M Usman Ashraf

1 Sep 2024

PONE-D-24-29845Robust Video Data Security: A Hybrid MAES-ECC Encryption Technique for Efficient Internet TransmissionPLOS ONE

Dear Dr. Latif,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Oct 16 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Prof. Dr. M. Usman Ashraf

Academic Editor

PLOS ONE

Journal requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please note that PLOS ONE has specific guidelines on code sharing for submissions in which author-generated code underpins the findings in the manuscript. In these cases, we expect all author-generated code to be made available without restrictions upon publication of the work. Please review our guidelines at https://journals.plos.org/plosone/s/materials-and-software-sharing#loc-sharing-code and ensure that your code is shared in a way that follows best practice and facilitates reproducibility and reuse.

3. Please provide a complete Data Availability Statement in the submission form, ensuring you include all necessary access information or a reason for why you are unable to make your data freely accessible. If your research concerns only data provided within your submission, please write "All data are in the manuscript and/or supporting information files" as your Data Availability Statement.

4. Please amend your authorship list in your manuscript file to include authors Haitham A. Mahmoud, Sharefa Murad and Azhar Imran.

5. Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The paper proposes a hybrid technique for video encryption and decryption, combining the advantages of the Modified Advanced Encryption Standard (MAES) and Elliptic Curve Cryptography (ECC) algorithms. The proposed technique encrypts each video frame using MAES and then encrypts the encrypted frames using ECC. The same process is performed in reverse order for decryption. Experimental results show that the proposed technique provides higher security, better accuracy, and shorter processing times compared to other well-known techniques. However, the paper need following minor changes for improvement of paper quality for publication:

Comment 1: A more in-depth discussion on the specific modifications made to the MAES and ECC algorithms for hybrid application would be beneficial. This discussion should encompass any optimizations or alterations aimed at enhancing performance for video data encryption. Clarifying the rationale behind key decisions, such as the selection of key sizes and the number of encryption rounds tailored for video data, would provide readers with deeper insights into the design and implementation choices.

Comment 2: To ensure the highest standards of academic communication, I recommend that the manuscript undergo a thorough review by a professional editor or a third party. This step is crucial not only to eliminate grammatical errors but also to enhance the logical flow of content, thereby improving readability and ensuring that the manuscript effectively communicates its significant contributions.

Reviewer #2: The paper proposes a hybrid technique for video encryption and decryption, combining the advantages of the Modified Advanced Encryption Standard (MAES) and Elliptic Curve Cryptography (ECC) algorithms. The proposed technique encrypts each video frame using MAES and then encrypts the encrypted frames using ECC. The same process is performed in reverse order for decryption. Experimental results show that the proposed technique provides higher security, better accuracy, and shorter processing times compared to other well-known techniques. However, the paper need following minor changes for improvement of paper quality for publication:

Comment 1: To ensure the highest standards of academic communication, I recommend that the manuscript undergo a thorough review. This step is crucial not only to eliminate grammatical errors but also to enhance the logical flow of content, thereby improving readability and ensuring that the manuscript effectively communicates its significant contributions.

Comment 2: The figures and tables citations require substantial improvement in their descriptions and all figures should be cited properly in the main text.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Azhar Imran

Reviewer #2: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Attachment

Submitted filename: comments.docx

pone.0311765.s001.docx (12.7KB, docx)
PLoS One. 2024 Nov 22;19(11):e0311765. doi: 10.1371/journal.pone.0311765.r002

Author response to Decision Letter 0


6 Sep 2024

Reviewer 1 Comments

Comment 1: A more in-depth discussion on the specific modifications made to the MAES and ECC algorithms for hybrid application would be beneficial. This discussion should encompass any optimizations or alterations aimed at enhancing performance for video data encryption. Clarifying the rationale behind key decisions, such as the selection of key sizes and the number of encryption rounds tailored for video data, would provide readers with deeper insights into the design and implementation choices.

Response 1: Thanks for the editor feedback and honor the expertise in this domain. By elucidating the rationale behind selecting specific key sizes and encryption round numbers, readers gain a comprehensive understanding of the factors considered during the design process. Justifying these choices involves discussing factors such as the desired level of security, computational efficiency, and the characteristics of video data, which directly impact the encryption process. Through such explanations, readers gain insights into the reasoning behind the decisions made, enabling them to appreciate the thoughtfulness and considerations involved in the design and implementation of the encryption scheme.

Comment 2: To ensure the highest standards of academic communication, I recommend that the manuscript undergo a thorough review by a professional editor or a third party. This step is crucial not only to eliminate grammatical errors but also to enhance the logical flow of content, thereby improving readability and ensuring that the manuscript effectively communicates its significant contributions.

Response 2: Thank you for your suggestions and comments. The main manuscript has overcome the grammatical mistakes.

Reviewer 2 Comments

Comment 1: The figures and tables citations require substantial improvement in their descriptions and all figures should be cited properly in the main text.

Response 1: Thank you for the valuable suggestion. The suggestion is addressed in the manuscript file and updated.

Attachment

Submitted filename: Response to reviewer PLOS one.docx

pone.0311765.s002.docx (94.5KB, docx)

Decision Letter 1

M Usman Ashraf

24 Sep 2024

Robust Video Data Security: A Hybrid MAES-ECC Encryption Technique for Efficient Internet Transmission

PONE-D-24-29845R1

Dear Dr. Latif,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager® and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

M. Usman Ashraf, Ph.D

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #2: (No Response)

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: (No Response)

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: (No Response)

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: (No Response)

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: (No Response)

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: I appreciate your efforts in responding to each point and making the necessary revisions. Based on the current version, I find the manuscript suitable for publication.

Reviewer #2: (No Response)

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Azhar Imran

Reviewer #2: No

**********

Acceptance letter

M Usman Ashraf

31 Oct 2024

PONE-D-24-29845R1

PLOS ONE

Dear Dr. Latif,

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team.

At this stage, our production department will prepare your paper for publication. This includes ensuring the following:

* All references, tables, and figures are properly cited

* All relevant supporting information is included in the manuscript submission,

* There are no issues that prevent the paper from being properly typeset

If revisions are needed, the production department will contact you directly to resolve them. If no revisions are needed, you will receive an email when the publication date has been set. At this time, we do not offer pre-publication proofs to authors during production of the accepted work. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few weeks to review your paper and let you know the next and final steps.

Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

If we can help with anything else, please email us at customercare@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. M. Usman Ashraf

Academic Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    Attachment

    Submitted filename: comments.docx

    pone.0311765.s001.docx (12.7KB, docx)
    Attachment

    Submitted filename: Response to reviewer PLOS one.docx

    pone.0311765.s002.docx (94.5KB, docx)

    Data Availability Statement

    All relevant data are within the manuscript.


    Articles from PLOS ONE are provided here courtesy of PLOS

    RESOURCES