In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream cipher method is presented and investigated for video encryption based on hybrid chaotic map and ChaCha20 algorithm. Two chaotic maps are employed for keys generation process in o...
Selective encryption techniques are usually used with resource limited communication infrastructure ...
Due to the proliferation of connected devices, the development of secured and low-resource cryptogra...
In actual application scenarios of the real-time video confidential communication, encrypted videos ...
In the recent years, an increasing demand for securing visual resource-constrained devices become a ...
The usage of Multimedia data has increased by many folds in recent years. And with so many different...
Technological advancements in the field of multimedia have made access to information effortless. As...
Digital video is one of the most popular multimedia data exchanged over the internet. Previous crypt...
Owing to the growth of high performance network technologies, multimedia applications over the Inter...
We present a new encryption algorithm for the video signal that, employing suitably arranged chaotic...
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has re...
Data transmission over the Internet and the personal network has been risen day by day due to the ad...
Privacy protection of surveillance videos is an important issue because of the pervasiveness of surv...
With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be store...
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has re...
Chaos-based video encryption algorithms are designed based on selective encryption method. Different...
Selective encryption techniques are usually used with resource limited communication infrastructure ...
Due to the proliferation of connected devices, the development of secured and low-resource cryptogra...
In actual application scenarios of the real-time video confidential communication, encrypted videos ...
In the recent years, an increasing demand for securing visual resource-constrained devices become a ...
The usage of Multimedia data has increased by many folds in recent years. And with so many different...
Technological advancements in the field of multimedia have made access to information effortless. As...
Digital video is one of the most popular multimedia data exchanged over the internet. Previous crypt...
Owing to the growth of high performance network technologies, multimedia applications over the Inter...
We present a new encryption algorithm for the video signal that, employing suitably arranged chaotic...
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has re...
Data transmission over the Internet and the personal network has been risen day by day due to the ad...
Privacy protection of surveillance videos is an important issue because of the pervasiveness of surv...
With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be store...
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has re...
Chaos-based video encryption algorithms are designed based on selective encryption method. Different...
Selective encryption techniques are usually used with resource limited communication infrastructure ...
Due to the proliferation of connected devices, the development of secured and low-resource cryptogra...
In actual application scenarios of the real-time video confidential communication, encrypted videos ...