2019
DOI: 10.1109/access.2019.2950007
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Encryption Algorithm With Key Controlled Neural Networks for Intelligent Transportation Systems

Abstract: The security of sensitive information is vital in many aspects of multimedia applications such as Intelligent Transportation Systems (ITSs), where traffic data collection, analysis and manipulations is essential. In ITS, the images captured by roadside units form the basis of many traffic rerouting and management techniques, and hence, we should take all precautions necessary to deter unwanted traffic actions caused by malicious adversaries. Moreover, the collected traffic images might reveal critical private … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…This section presents the results of encrypted image classification, where the objective is to identify the vehicle type in each image. All images are encrypted using AES [22], [29], Twofish [30], ChaosNet [31], Serpent [32]; and electronic codebook (ECB), cipher block chaining (CBC), output feedback (OFB), and the enhanced cipher block chaining (ECBC) modes of operation [33], [34].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This section presents the results of encrypted image classification, where the objective is to identify the vehicle type in each image. All images are encrypted using AES [22], [29], Twofish [30], ChaosNet [31], Serpent [32]; and electronic codebook (ECB), cipher block chaining (CBC), output feedback (OFB), and the enhanced cipher block chaining (ECBC) modes of operation [33], [34].…”
Section: Resultsmentioning
confidence: 99%
“…Moreover, the work did not explore the underlying reasons that allow classification algorithms to classify encrypted information. Also, as the data being secured for this framework are images, appropriate encryption algorithms must be used to protect the privacy of the public who are supplying these images [21].…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The Galois field, denoted GF( , contains a finite number of elements, where these elements are integers mod p . We succinctly discuss some of the Galois field GF( results and invite respected readers to see 16 , 17 for detailed discussion.…”
Section: Space Chaotic Shift Processmentioning
confidence: 99%
“…The division is defined likewise except that the first element is multiplied by the multiplicative inverse of the second element. We illustrate the multiplication using an example from 17 —3 F and A 5 are two hexadecimal numbers. …”
Section: Space Chaotic Shift Processmentioning
confidence: 99%