IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Application of CSK Encryption Algorithm in Video Synergic Command Systems

Application of CSK Encryption Algorithm in Video Synergic Command Systems
View Sample PDF
Author(s): Lele Qin (School of Economics and Management, Hebei University of Science and Technology, Shijiazhuang, China), Guojuan Zhang (Department of Industrial Basic Education, Hebei College of Industry and Technology, Shijiazhuang, China)and Li You (Department of Economics and Trade, Hebei College of Industry and Technology, Shijiazhuang, China)
Copyright: 2022
Volume: 34
Issue: 2
Pages: 18
Source title: Journal of Organizational and End User Computing (JOEUC)
Editor(s)-in-Chief: Sangbing (Jason) Tsai (International Engineering and Technology Institute (IETI), Hong Kong)and Wei Liu (Qingdao University, China)
DOI: 10.4018/JOEUC.20220301.oa1

Purchase

View Application of CSK Encryption Algorithm in Video Synergic Command Systems on the publisher's website for pricing and purchasing information.

Abstract

Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important. After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection. The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure. This method constitutes a key pool with the three-dimensional Lorenz System, the four-dimensional Cellular Neural Network (CNN) System and the four-dimensional Chen System where the key source system and initial conditions are decided by the plaintext video frame itself. Then, this method optimizes the chaotic sequences to further enhance system security.

Related Content

Ke Zheng, Zhou Li. © 2024. 21 pages.
Weihui Han, Tianshuo Zhang, Jamal Khan, Lujian Wang, Chao Tu. © 2024. 22 pages.
Chen Quan, Baoli Lu. © 2024. 22 pages.
Peijin Li, Xinyi Peng, Chonghui Zhang, Tomas Baležentis. © 2024. 25 pages.
Lei Zhao, Bowen Deng, Liang Wu, Chang Liu, Min Guo, Youjia Guo. © 2024. 27 pages.
Xiaoye Ma, Yanyan Li, Muhammad Asif. © 2024. 29 pages.
Hao Wu, Zhiyi Zhang, Zhilin Zhu. © 2024. 12 pages.
Body Bottom