2014 IEEE International Conference on Consumer Electronics (ICCE) 2014
DOI: 10.1109/icce.2014.6775925
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of a video streaming security system for smart device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Data confidentiality is usually addressed by symmetric-key encryption. Since the amount of data is high in the case of images and image sequences, some approaches resort to encrypt compressed data or to the use of partial or selective encryption of specific regions or objects of interest [4], [14]- [15]. In any case, encryption algorithms should be selected carefully to provide real-time performance with lowcost IoT cameras, which have constrained computing and memory resources.…”
Section: Image Integrity and Confidentialitymentioning
confidence: 99%
“…Data confidentiality is usually addressed by symmetric-key encryption. Since the amount of data is high in the case of images and image sequences, some approaches resort to encrypt compressed data or to the use of partial or selective encryption of specific regions or objects of interest [4], [14]- [15]. In any case, encryption algorithms should be selected carefully to provide real-time performance with lowcost IoT cameras, which have constrained computing and memory resources.…”
Section: Image Integrity and Confidentialitymentioning
confidence: 99%
“…where the general mathematical expression of the main diagonal elements is given by with i = 1, 2, · · · , n. It is noted that, since the nonzero elements A (11) i, i , A (12) i, j , A (21) j, i , A (22) j, j in (5) are ergodic in all positions on the matrix [19], for all possible arrangement orders of the multiplication of n(n − 1)/2 transformation sub-matrices T ij with i = 1, 2, · · · , n − 1; j = i + 1, · · · , n, the resulting matrices A n are different. Thus, Criterion (iii) is satisfied.…”
Section: A Construction Of An N-dimensional Discrete-time Chaotic Mamentioning
confidence: 99%
“…I N the field of information security [1][2][3][4][5], both traditional algebra-based and chaos-based image and video encryption technologies have attracted considerable attention recently [6][7][8]. It is well known that the distinct properties of chaos, such as positive Lyapunov exponent, ergodicity, quasi-randomness, sensitive dependence on initial conditions and system parameters, etc., have granted chaotic dynamics to be a promising alternative of some cryptographic algorithms especially when fast-speed is of a main concern such as in video processing [9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation