IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Application of CSK Encryption Algorithm in Video Synergic Command Systems

Application of CSK Encryption Algorithm in Video Synergic Command Systems
View Sample PDF
Author(s): Lele Qin (School of Economics and Management, Hebei University of Science and Technology, Shijiazhuang, China), Guojuan Zhang (Department of Industrial Basic Education, Hebei College of Industry and Technology, Shijiazhuang, China) and Li You (Department of Economics and Trade, Hebei College of Industry and Technology, Shijiazhuang, China)
Copyright: 2022
Volume: 34
Issue: 2
Pages: 18
Source title: Journal of Organizational and End User Computing (JOEUC)
Editor(s)-in-Chief: Sang-Bing Tsai (University of Electronic Science and Technology of China Zhongshan Institute, China and Research Center for Environment and Sustainable Development, Civil Aviation University of China, China)
DOI: 10.4018/JOEUC.20220301.oa1

Purchase

View Application of CSK Encryption Algorithm in Video Synergic Command Systems on the publisher's website for pricing and purchasing information.

Abstract

Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important. After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection. The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure. This method constitutes a key pool with the three-dimensional Lorenz System, the four-dimensional Cellular Neural Network (CNN) System and the four-dimensional Chen System where the key source system and initial conditions are decided by the plaintext video frame itself. Then, this method optimizes the chaotic sequences to further enhance system security.

Related Content

Lele Qin, Guojuan Zhang, Li You. © 2022. 18 pages.
Yanmei Zhao, Yixin Zhou. © 2022. 17 pages.
Zheng Cai. © 2022. 15 pages.
Yu-Hsi Yuan, Yi-Cheng Yeh, Chia-Huei Wu, Cheng-Yong Liu, Hsin-Hao Chen, Chien-Wen Chen. © 2022. 15 pages.
Jianzu Wu, Kunxin Zhang. © 2022. 13 pages.
Yunhong Xu, Guangyu Wu, Yu Chen. © 2022. 17 pages.
Qihua Liu, Li Wang, Jingyi Zhou, Wei Wu, Yiran Li. © 2022. 26 pages.
Body Bottom