Application of CSK Encryption Algorithm in Video Synergic Command Systems
نویسندگان
چکیده
Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, control as, data security has especially important. After meeting the requirements voice video dispatch, this paper proposes an end-to-end encryption method multimedia information that introduces a multiple protection mechanism including selective integrity protection. The network access authentication service workflow, which implants startup key distribution into signaling procedure. This constitutes pool with three-dimensional Lorenz System, four-dimensional Cellular Neural Network (CNN) System Chen where source system initial conditions are decided by plaintext frame itself. Then, optimizes chaotic sequences to further enhance security.
منابع مشابه
Cryptanalysis of GSM encryption algorithm A5/1
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...
متن کاملPuzzle - A Novel Video Encryption Algorithm
Networked multimedia applications have matured in recent years to be deployed in a larger scale in the Internet. Confidentiality is one of the primary concerns of these services for their commercial usages, e.g. in video on demand services or in video conferences. In particular, video encryption algorithms are strongly required that fulfill real-time requirements. In this paper we present the v...
متن کاملA New Algorithm for MPEG Video Encryption
Continuous digital media such as video and audio are processed and communicated within networked infrastructures. The security of these media has become very important. If the encryption process is part of the video retrieval and playback process, then encryption and decryption must be performed in real time and the speed of the encryption/decryption algorithm matters. We show in this paper tha...
متن کاملDual-Layer Video Encryption using RSA Algorithm
This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components ...
متن کاملA Video Encryption Algorithm in H.264 Compressed Domain for Resource-Limited Systems
Multimedia data security is one of the crucial issues for resource-limited systems, such as PAD and smartphones, where some private information is often stored. By taking limited processing power, memory and bandwidth of resource-limited systems into account, a novel video encryption algorithm in H.264 compressed domain is proposed in this paper, which is independent of the video compression an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Organizational and End User Computing
سال: 2021
ISSN: ['1546-2234', '1546-5012']
DOI: https://doi.org/10.4018/joeuc.20220301.oa1