This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas. In this paper, a symmetric encryption method for surveillance videos is presented, based on reversible composite cellular automata developed for this purpose. This method takes advantage of reversible cellular automata and elementary rule 30 properties, for efficient regions of interest encryption in surveillance video frames, obtaining an algorithm which experimental results of security and performance are consistent with those reported in current literature. In addition, it allows decryption without loss of information throu...
Many cryptosystems have been elaborated to ensure confidentiality and integrity of data exchanged on...
One of the main concerns of the wide use of video surveillance is the loss of individual privacy. In...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Privacy protection of surveillance videos is an important issue because of the pervasiveness of surv...
Abstract We introduce a new encryption algorithm based on re-versible cellular automata (CA). Comple...
AbstractWe propose a novel images encryption schema based on reversible one-dimensional cellular aut...
A teoria do caos estuda o tipo de comportamento, aparentemente aleatório, que apresentam alguns sist...
Cellular Automata have been successfully applied to several scientific problems such as among others...
In cryptography, the previous research generally appears ambiguous and complex to the novice researc...
W pracy zostały umówione automaty komórkowe oraz ich zastosowanie w szyfrowaniu. W pierwszym rozdzia...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Networks have developed very quickly, allowing the speedy transfer of image information through Inte...
Cellular Automata(CA) is a discrete computing model which provides simple, flexible and efficient pl...
The given paper is devoted to the software development of block cipher based on reversible one-dimen...
A multimedia surveillance system aims to provide security and safety of people in a monitored space....
Many cryptosystems have been elaborated to ensure confidentiality and integrity of data exchanged on...
One of the main concerns of the wide use of video surveillance is the loss of individual privacy. In...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Privacy protection of surveillance videos is an important issue because of the pervasiveness of surv...
Abstract We introduce a new encryption algorithm based on re-versible cellular automata (CA). Comple...
AbstractWe propose a novel images encryption schema based on reversible one-dimensional cellular aut...
A teoria do caos estuda o tipo de comportamento, aparentemente aleatório, que apresentam alguns sist...
Cellular Automata have been successfully applied to several scientific problems such as among others...
In cryptography, the previous research generally appears ambiguous and complex to the novice researc...
W pracy zostały umówione automaty komórkowe oraz ich zastosowanie w szyfrowaniu. W pierwszym rozdzia...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Networks have developed very quickly, allowing the speedy transfer of image information through Inte...
Cellular Automata(CA) is a discrete computing model which provides simple, flexible and efficient pl...
The given paper is devoted to the software development of block cipher based on reversible one-dimen...
A multimedia surveillance system aims to provide security and safety of people in a monitored space....
Many cryptosystems have been elaborated to ensure confidentiality and integrity of data exchanged on...
One of the main concerns of the wide use of video surveillance is the loss of individual privacy. In...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...