Secure advanced video coding based on selective encryption algorithms

S Lian, Z Liu, Z Ren, H Wang - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Advanced video coding is recently announced and widely used, although the according
protection means have not been developed thoroughly. In this paper, a secure AVC coding …

A new chaotic algorithm for video encryption

F Chiaraluce, L Ciccarelli, E Gambi… - IEEE Transactions …, 2002 - ieeexplore.ieee.org
We present a new encryption algorithm for the video signal that, employing suitably
arranged chaotic functions, allows to increase the security level while maintaining …

Performance evaluation of DWT based image steganography

V Kumar, D Kumar - 2010 IEEE 2nd International Advance …, 2010 - ieeexplore.ieee.org
Steganography plays an important role in the field of information hiding. It is used in wide
variety of applications such as internet security, authentication, copyright protection and …

An efficient chaos pseudo-random number generator applied to video encryption

H Xu, X Tong, X Meng - Optik, 2016 - Elsevier
Traditional cipher systems are not appropriate for video encryption due to the high
computation overhead. Video encryption must take account of the trade-off of both data …

A review of scientific research in defensive cyberspace operation tools and technologies

PL Goethals, ME Hunt - Journal of Cyber Security Technology, 2019 - Taylor & Francis
The realm of cybersecurity is perhaps one of the most quickly evolving areas within today's
research space. New and emerging technologies, as well as the growth of cybersecurity …

Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission

S Sadoudi, C Tanougast, MS Azzaz… - EURASIP Journal on …, 2013 - Springer
In this paper, we propose and demonstrate experimentally a new wireless digital encryption
hyperchaotic communication system based on radio frequency (RF) communication …

Multi‐Chaos‐Based Lightweight Image Encryption‐Compression for Secure Occupancy Monitoring

YY Ghadi, SA Alsuhibany, J Ahmad… - Journal of …, 2022 - Wiley Online Library
With the advancement of camera and wireless technologies, surveillance camera‐based
occupancy has received ample attention from the research community. However, camera …

Image encryption algorithm based on chaotic map**

M Salleh, S Ibrahim, IF Isnin - Jurnal Teknologi, 2003 - journals.utm.my
Images are routinely used in diverse areas such as medical, military, science, engineering,
art, entertainment, advertising, education as well as training. With the increasing use of …

New approaches to encryption and steganography for digital videos

D Socek, H Kalva, SS Magliveras, O Marques… - Multimedia …, 2007 - Springer
In this work we propose a novel type of digital video encryption that has several advantages
over other currently available digital video encryption schemes. We also present an …

Video encryption using AES algorithm

DM Dumbere, NJ Janwe - Second International Conference on …, 2014 - ieeexplore.ieee.org
Video encryption algorithms have becomes an important field of research nowadays. As an
increasing rate of applying video is getting high, the security of video data becomes more …