Real-time video security system using chaos- improved advanced encryption standard (IAES)

Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making i...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 81; no. 2; pp. 2275 - 2298
Main Authors Hafsa, Amal, Fradi, Marwa, Sghaier, Anissa, Malek, Jihene, Machhout, Mohsen
Format Journal Article
LanguageEnglish
Published New York Springer US 01.01.2022
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1380-7501
1573-7721
DOI10.1007/s11042-021-11668-4

Cover

Abstract Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800–22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2 128 which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission.
AbstractList Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800–22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2128 which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission.
Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800–22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2 128 which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission.
Author Hafsa, Amal
Sghaier, Anissa
Machhout, Mohsen
Fradi, Marwa
Malek, Jihene
Author_xml – sequence: 1
  givenname: Amal
  surname: Hafsa
  fullname: Hafsa, Amal
  email: amalhafsa12@gmail.com
  organization: Electronics and Micro-Electronics Laboratory, University of Monastir
– sequence: 2
  givenname: Marwa
  surname: Fradi
  fullname: Fradi, Marwa
  organization: Electronics and Micro-Electronics Laboratory, University of Monastir
– sequence: 3
  givenname: Anissa
  surname: Sghaier
  fullname: Sghaier, Anissa
  organization: Electronics and Micro-Electronics Laboratory, University of Monastir
– sequence: 4
  givenname: Jihene
  surname: Malek
  fullname: Malek, Jihene
  organization: Electronics and Micro-Electronics Laboratory, University of Monastir, Department of Electronics, Sousse University, Higher Institute of Applied Sciences and Technology
– sequence: 5
  givenname: Mohsen
  surname: Machhout
  fullname: Machhout, Mohsen
  organization: Electronics and Micro-Electronics Laboratory, University of Monastir
BookMark eNp9kE9LazEQxYP4QO3zC7gKuNFFdCbJzY1LEfUJgvD-LFyF3CStKW1uTdJCv73RPhBcuJqzOL-ZM-eI7KcxBUJOEC4QoL8siCA5A44MUSnN5B45xK4XrO857jctNLC-AzwgR6XMAVB1XB6S59_BLliNy0A30YeRluDWOdYtLdtSw5KuS0wz6l7sWBiNy1UeN8FT6zc2uSZCcnm7qnFMtFSbvM2enj1c3_45_0l-TO2ihOP_c0L-3d3-vfnFHp_uH26uH5kTeFVZx7UOSmjJtQLfflGgYBiE9eCd1FOQg3Oo5aA16GDhSg5y6qUF1B4UBjEhp7u9LdrrOpRq5uM6p3bScMWFEogdNpfeuVweS8lhalys9j13zTYuDIJ5L9LsijStSPNRpJEN5V_QVY5Lm7ffQ2IHlWZOs5A_U31DvQES7Iat
CitedBy_id crossref_primary_10_1186_s13634_023_01003_4
crossref_primary_10_32604_cmc_2024_054654
crossref_primary_10_1080_13682199_2023_2187513
crossref_primary_10_1016_j_vlsi_2024_102302
crossref_primary_10_1038_s41598_023_41082_9
crossref_primary_10_1364_AO_543978
crossref_primary_10_1007_s11042_023_15957_y
crossref_primary_10_1007_s11760_024_03082_8
crossref_primary_10_1016_j_apm_2024_06_016
crossref_primary_10_1016_j_ins_2024_120919
crossref_primary_10_1007_s11042_023_15448_0
crossref_primary_10_1080_21642583_2023_2207593
crossref_primary_10_1080_09540091_2024_2379275
crossref_primary_10_1007_s11517_023_02925_9
crossref_primary_10_1016_j_fraope_2023_100055
crossref_primary_10_1109_ACCESS_2024_3365523
crossref_primary_10_1109_ACCESS_2023_3287858
crossref_primary_10_1117_1_JEI_33_1_013003
crossref_primary_10_1142_S0218127424500135
crossref_primary_10_1109_ACCESS_2022_3211657
crossref_primary_10_1109_TQE_2022_3216530
crossref_primary_10_1109_ACCESS_2022_3173338
crossref_primary_10_1186_s44147_024_00376_z
crossref_primary_10_1016_j_chaos_2024_114958
Cites_doi 10.1504/IJICS.2020.108145
10.1007/s11042-017-4916-2
10.1007/s11042-014-2024-0
10.3390/s20041188
10.1007/s11227-019-02878-7
10.1002/cpe.5533
10.1109/ACCESS.2020.2972269
10.1016/j.optlaseng.2015.12.006
10.1007/s10916-014-0133-y
10.1007/s11554-019-00917-3
10.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV)
10.1007/s10773-018-3989-7
10.1109/JSYST.2015.2424702
10.1007/s00530-020-00648-7
10.3390/sym12030332
10.1016/j.neucom.2019.03.053
10.1109/TIP.2003.819861
10.1109/ACCESS.2020.2972338
10.1145/1027527.1027609
10.1007/s11042-020-09478-1
10.1155/2020/8822777
10.1109/ICALIP.2008.4590187
10.1002/j.1538-7305.1949.tb00928.x
10.3390/app9112316
10.1109/HealthCom.2016.7749426
10.4218/etrij.13.0112.0677
10.1155/2020/8891778
10.1109/ICSMC.2010.5642260
10.1007/s10586-018-1772-4
10.1109/ACCESS.2019.2911892
10.1049/iet-ipr.2018.5250
10.1155/2019/4047957
10.3390/e21060577
10.1007/s12652-020-02066-z
10.1007/s10617-008-9030-2
10.1007/s00371-020-01932-3
10.1504/IJIPT.2020.105046
10.1007/s12652-018-01171-4
10.1109/CGIV.2008.66
10.1007/s11235-010-9351-x
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s11042-021-11668-4
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection (ProQuest)
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
ProQuest Research library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 2298
ExternalDocumentID 10_1007_s11042_021_11668_4
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c319t-5288e63842860d0076060bb3ad0dc48f04bcc184b8808ea094b4fd4a018d061e3
IEDL.DBID AGYKE
ISSN 1380-7501
IngestDate Sat Jul 26 00:06:04 EDT 2025
Thu Apr 24 23:13:25 EDT 2025
Wed Oct 01 04:51:16 EDT 2025
Fri Feb 21 02:46:21 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords IAES
Security
Real time
Chaos theory
Video encryption
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-5288e63842860d0076060bb3ad0dc48f04bcc184b8808ea094b4fd4a018d061e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2623631151
PQPubID 54626
PageCount 24
ParticipantIDs proquest_journals_2623631151
crossref_citationtrail_10_1007_s11042_021_11668_4
crossref_primary_10_1007_s11042_021_11668_4
springer_journals_10_1007_s11042_021_11668_4
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20220100
2022-01-00
20220101
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – month: 1
  year: 2022
  text: 20220100
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References BenAAKadionikPMasmoudiNLeviHFPGA implementation of a HW/SW platform for multimedia embedded systemsDes Autom Embed Syst20081229331110.1007/s10617-008-9030-2
Th e μClinux project http://www.uClinux.org
HuiXXiaojunTZhuWMiaoZYangLJingMA robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipherMultimedia Systems20202636338110.1007/s00530-020-00648-7
YuantaoCWeihongXJingwenKYThe fire recognition algorithm using dynamic feature fusion and IVSVM classifierClust Comput201822S7665S767510.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV)
Yuantao C, Jiajun T, Linwu L, Jie X, Runlong X, Jingbo X, Qian Z, Kai Y (2020b) Research of improving semantic image segmentation based on a feature fusion model. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02066-z
Yuantao C, Li L, Jiajun T, Xi R, Qian Z, Kai Y, Xi J, Xi C (2020c) The improved image inpainting algorithm via encoder and similarity constraint. Vis Comput. https://doi.org/10.1007/s00371-020-01932-3
Amal H, Anissa SM, Jihene M, Mohsen M (2020) An improved co-designed AES-ECC cryptosystem for secure data transmission. International Journal of Information and Computer Security (IJICS). https://doi.org/10.1504/IJICS.2020.108145
Yuantao C, Jiajun T, Qian Z, Kai Y, Xi C, Xi J, Xi R (2020a) Saliency detection via the improved hierarchical principal component analysis method. Hindawi Wireless Communications and Mobile Computing Volume. https://doi.org/10.1155/2020/8822777
Yuantao C, Jin W, Runlong X, Qian Z, Ca Z (2019c) The visual object tracking algorithm research based on adaptive combination kernel. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-01171-4
HayajnehTUllahSMohdBJBalaganiKSAn enhanced WLAN security system with FPGAIEEE Syst J20171142536254510.1109/JSYST.2015.2424702
Luoyu Z, Tao Z, Yumeng T, Huang H (2020) Fraction-order total variation image blind restoration based on self-similarity features. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972269
Sonia K, Medien Z, Adel B, Taoufik S, Yousef D, Rached T (2015) FPGA-based real-time implementation of AES algorithm for video encryption. Recent Advances in Telecommunications, Informatics and Educational Technologies. ISBN: 978-1-61804-262-0
Yue W, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT):31–38
Zheng Y, Jin J (2015) A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos. Multimed Tools Appl 74:7803–7820. https://doi.org/10.1007/s11042-014-2024-0
Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Yuantao C, Jin W, Xi C, Mingwei Z (2019b) Single-image super-resolution algorithm based on structural self-similarity and deformation block features. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2911892
Yuantao C, Jin W, Songjie L, Xi C, Xi J, Xi J (2019d) Multiscale fast correlation filtering tracking algorithm based on feature fusion model. Wiley Concurrency Computat Pract Exper. https://doi.org/10.1002/cpe.5533
GanesanKSinghINarainMPublic key encryption of images and videos in real time using Chebyshev mapsProceedings of the 2008 fifth international conference on computer graphics, imaging and visualization2008Washington, DC, USAIEEE Computer Society21121610.1109/CGIV.2008.66
Hassan El K, Wessam MS, Yasmine A (2019) New video encryption schemes based on chaotic maps. IET Image Process. https://doi.org/10.1049/iet-ipr.2018.5250
Wickramage C, Sahama T, Fidge C (2016) Anatomy of log files: implications for information accountability measures. e-Health Netw Appl Serv (Healthcom):1–6. https://doi.org/10.1109/HealthCom.2016.7749426
HuQMohammedGThe accuracy of PSNR in predicting video quality for different video scenes and frame ratesTelecommun Syst201249354810.1007/s11235-010-9351-x
Lin D, Xu W, Yuantao C (2020) Density peaks clustering by zero-pointed samples of regional group borders. Hindawi Computational Intelligence and Neuroscience. https://doi.org/10.1155/2020/8891778
Jiang N, Dong X, Hu H et al (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58:979–991. https://doi.org/10.1007/s10773-018-3989-7
Bentoutou Y, Bensikadour EL H, Talab N, Bounoua N (2019) An improved image encryption algorithm for satelite application. Advances in Space Research, Elsevier. 101016/jasr201909027
ZhangXChenWA new chaotic algorithm for image encryptionInt Conf Audio Language Image Process20084388989210.1109/ICALIP.2008.4590187
Seyed ShMYuchengCChunmingTA new algorithm for medical color images encryption using chaotic systemsEntropy201921577397887110.3390/e21060577
ShuliCLiejunWNaixiangAQingqingHA selective video encryption scheme based on coding characteristicsSymmetry202020201233210.3390/sym12030332
Qingqing H, Liejun W, Yongming L, Qi J (2020) Video encryption scheme using hybrid encryption technology. International Journal of Internet Protocol Technology. https://doi.org/10.1504/IJIPT.2020.105046
AlirezaAMohammadJBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7
Nios II integrated development environment. http://www.altera.com/products/ip/processors/nios2/ni2-index.html
Aabha N, Al A, Prasad PWC, Rasha A, Sami H (2020a) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1
Fei Yu , Li Li ,Binyong He ,Yuanyuan H, Changqiong Shi, Shuo Cai ,Yun S ,Sichun Du ,and Qiuzhen W (2019) Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization ,and Secure Communication Application. Hindawi. https://doi.org/10.1155/2019/4047957.
Agaian S, Raja R, Ravindranath Ch (2010) Logical Transform based encryption for multimedia systems. IEEE International Conference on Systems, Man and Cybernetics. https://doi.org/10.1109/ICSMC.2010.5642260.
XingyanWYuanyunZHuiliZKangGA novel color image encryption using alternate chaotic mapping structureOpt Lasers Eng201682798610.1016/j.optlaseng.2015.12.006
Li Y, Jiaohua Q, Xi X, Yun T, Li Q, Lingyun X (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc. https://doi.org/10.1007/s11554-019-00917-3
LiJChenyanWChXZhengTHuGChin-ChenCA selective encryption scheme of CABAC based on video context in high efficiency video codingMultimedia Tools Appl201877128371285110.1007/s11042-017-4916-2
AlirezaAMohammadJRBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7
Jianming Zh, Lu C, Jin W, Yu X-G, Se-Jung L, Zafer AM, Amr T (2020b) Training Convolutional Neural Networks with Multi-Size Images and Triplet Loss for Remote Sensing Scene Classification. Sensors MDPI. https://doi.org/10.3390/s20041188.
Aabha N, Al A, Prasad PWC, Rasha SA, Sami H (2020b) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1
BarakatMLMansingkaASRadwanAGSalamaKNGeneralized hardware post-processing technique for Chaos-based pseudorandom number generatorsElectron Telecommun Res Inst201335344845810.4218/etrij.13.0112.0677
Nattional Institute of Standards and Technology (NIST) (2001) Advanced Encryption standard (AES), Federal Information Processing Standards Publications (FIPS PUBS) 197–26
Tzouveli P, Ntalianis K, Kollias S (2004) Security of human video objects by incorporating a chaos-based feedback cryptographic scheme. ACM Multimedia. https://doi.org/10.1145/1027527.1027609
KiahMLAl-BakriSHZaidanAAZaidanBBHussainMDesign and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architectureJ Med Syst20143813313314410.1007/s10916-014-0133-y
Yua F, Liua L, Xiao L, Kenli L, Shuo C (2019) A robust and fixed-time zeroing neural dynamics for computing time-variant nonlinear equation using a novel nonlinear activation function. Neurocomputing. https://doi.org/10.1016/j.neucom.2019.03.053
Jianming Z, Xi Z, Juan S, Xin Z, JIN W (2020a) A cascaded R-CNN with multiscale attention and imbalanced samples for traffic sign detection. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972338
Yuantao C, Jie X, Weihong X, Jingwen Z (2018b) A novel online incremental and decremental learning algorithm based on variable support vector machine. Clust Comput. https://doi.org/10.1007/s10586-018-1772-4
YuantaoCJinWXiCArunKSKaiYCaZImage super-resolution algorithm based on dual-channel convolutional neural networksMDPI Appl Sci20199231610.3390/app9112316
Zhou W, Alan CB, Hamid SR, Si EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4)
A Alireza (11668_CR4) 2019; 75
T Hayajneh (11668_CR12) 2017; 11
11668_CR1
11668_CR41
11668_CR40
11668_CR43
11668_CR42
11668_CR2
C Shuli (11668_CR29) 2020; 2020
11668_CR45
11668_CR3
11668_CR44
11668_CR46
11668_CR49
11668_CR48
C Yuantao (11668_CR39) 2019; 9
ML Kiah (11668_CR18) 2014; 38
Q Hu (11668_CR13) 2012; 49
11668_CR30
11668_CR32
11668_CR31
11668_CR33
11668_CR36
11668_CR35
11668_CR38
X Hui (11668_CR14) 2020; 26
C Yuantao (11668_CR37) 2018; 22
ML Barakat (11668_CR7) 2013; 35
11668_CR21
11668_CR23
11668_CR22
11668_CR25
11668_CR24
X Zhang (11668_CR47) 2008; 4
11668_CR26
11668_CR28
ML Kiah (11668_CR19) 2014; 38
A Alireza (11668_CR5) 2019; 75
W Xingyan (11668_CR34) 2016; 82
11668_CR9
11668_CR6
M Seyed Sh (11668_CR27) 2019; 21
AA Ben (11668_CR8) 2008; 12
11668_CR11
11668_CR16
J Li (11668_CR20) 2018; 77
11668_CR15
K Ganesan (11668_CR10) 2008
11668_CR17
References_xml – reference: Aabha N, Al A, Prasad PWC, Rasha SA, Sami H (2020b) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1
– reference: Yuantao C, Jiajun T, Linwu L, Jie X, Runlong X, Jingbo X, Qian Z, Kai Y (2020b) Research of improving semantic image segmentation based on a feature fusion model. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02066-z
– reference: Wickramage C, Sahama T, Fidge C (2016) Anatomy of log files: implications for information accountability measures. e-Health Netw Appl Serv (Healthcom):1–6. https://doi.org/10.1109/HealthCom.2016.7749426
– reference: BenAAKadionikPMasmoudiNLeviHFPGA implementation of a HW/SW platform for multimedia embedded systemsDes Autom Embed Syst20081229331110.1007/s10617-008-9030-2
– reference: Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
– reference: Yuantao C, Jin W, Xi C, Mingwei Z (2019b) Single-image super-resolution algorithm based on structural self-similarity and deformation block features. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2911892
– reference: YuantaoCJinWXiCArunKSKaiYCaZImage super-resolution algorithm based on dual-channel convolutional neural networksMDPI Appl Sci20199231610.3390/app9112316
– reference: Th e μClinux project http://www.uClinux.org
– reference: YuantaoCWeihongXJingwenKYThe fire recognition algorithm using dynamic feature fusion and IVSVM classifierClust Comput201822S7665S767510.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV)
– reference: Yuantao C, Li L, Jiajun T, Xi R, Qian Z, Kai Y, Xi J, Xi C (2020c) The improved image inpainting algorithm via encoder and similarity constraint. Vis Comput. https://doi.org/10.1007/s00371-020-01932-3
– reference: HayajnehTUllahSMohdBJBalaganiKSAn enhanced WLAN security system with FPGAIEEE Syst J20171142536254510.1109/JSYST.2015.2424702
– reference: KiahMLAl-BakriSHZaidanAAZaidanBBHussainMDesign and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architectureJ Med Syst20143813313314410.1007/s10916-014-0133-y
– reference: Jianming Zh, Lu C, Jin W, Yu X-G, Se-Jung L, Zafer AM, Amr T (2020b) Training Convolutional Neural Networks with Multi-Size Images and Triplet Loss for Remote Sensing Scene Classification. Sensors MDPI. https://doi.org/10.3390/s20041188.
– reference: LiJChenyanWChXZhengTHuGChin-ChenCA selective encryption scheme of CABAC based on video context in high efficiency video codingMultimedia Tools Appl201877128371285110.1007/s11042-017-4916-2
– reference: ShuliCLiejunWNaixiangAQingqingHA selective video encryption scheme based on coding characteristicsSymmetry202020201233210.3390/sym12030332
– reference: HuiXXiaojunTZhuWMiaoZYangLJingMA robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipherMultimedia Systems20202636338110.1007/s00530-020-00648-7
– reference: Zhou W, Alan CB, Hamid SR, Si EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4)
– reference: Agaian S, Raja R, Ravindranath Ch (2010) Logical Transform based encryption for multimedia systems. IEEE International Conference on Systems, Man and Cybernetics. https://doi.org/10.1109/ICSMC.2010.5642260.
– reference: Bentoutou Y, Bensikadour EL H, Talab N, Bounoua N (2019) An improved image encryption algorithm for satelite application. Advances in Space Research, Elsevier. 101016/jasr201909027
– reference: AlirezaAMohammadJRBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7
– reference: Li Y, Jiaohua Q, Xi X, Yun T, Li Q, Lingyun X (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc. https://doi.org/10.1007/s11554-019-00917-3
– reference: Yuantao C, Jin W, Songjie L, Xi C, Xi J, Xi J (2019d) Multiscale fast correlation filtering tracking algorithm based on feature fusion model. Wiley Concurrency Computat Pract Exper. https://doi.org/10.1002/cpe.5533
– reference: Hassan El K, Wessam MS, Yasmine A (2019) New video encryption schemes based on chaotic maps. IET Image Process. https://doi.org/10.1049/iet-ipr.2018.5250
– reference: Amal H, Anissa SM, Jihene M, Mohsen M (2020) An improved co-designed AES-ECC cryptosystem for secure data transmission. International Journal of Information and Computer Security (IJICS). https://doi.org/10.1504/IJICS.2020.108145
– reference: HuQMohammedGThe accuracy of PSNR in predicting video quality for different video scenes and frame ratesTelecommun Syst201249354810.1007/s11235-010-9351-x
– reference: AlirezaAMohammadJBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7
– reference: Jianming Z, Xi Z, Juan S, Xin Z, JIN W (2020a) A cascaded R-CNN with multiscale attention and imbalanced samples for traffic sign detection. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972338
– reference: Jiang N, Dong X, Hu H et al (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58:979–991. https://doi.org/10.1007/s10773-018-3989-7
– reference: BarakatMLMansingkaASRadwanAGSalamaKNGeneralized hardware post-processing technique for Chaos-based pseudorandom number generatorsElectron Telecommun Res Inst201335344845810.4218/etrij.13.0112.0677
– reference: XingyanWYuanyunZHuiliZKangGA novel color image encryption using alternate chaotic mapping structureOpt Lasers Eng201682798610.1016/j.optlaseng.2015.12.006
– reference: Fei Yu , Li Li ,Binyong He ,Yuanyuan H, Changqiong Shi, Shuo Cai ,Yun S ,Sichun Du ,and Qiuzhen W (2019) Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization ,and Secure Communication Application. Hindawi. https://doi.org/10.1155/2019/4047957.
– reference: Yuantao C, Jiajun T, Qian Z, Kai Y, Xi C, Xi J, Xi R (2020a) Saliency detection via the improved hierarchical principal component analysis method. Hindawi Wireless Communications and Mobile Computing Volume. https://doi.org/10.1155/2020/8822777
– reference: Seyed ShMYuchengCChunmingTA new algorithm for medical color images encryption using chaotic systemsEntropy201921577397887110.3390/e21060577
– reference: Yuantao C, Jin W, Runlong X, Qian Z, Ca Z (2019c) The visual object tracking algorithm research based on adaptive combination kernel. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-01171-4
– reference: Aabha N, Al A, Prasad PWC, Rasha A, Sami H (2020a) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1
– reference: Sonia K, Medien Z, Adel B, Taoufik S, Yousef D, Rached T (2015) FPGA-based real-time implementation of AES algorithm for video encryption. Recent Advances in Telecommunications, Informatics and Educational Technologies. ISBN: 978-1-61804-262-0
– reference: ZhangXChenWA new chaotic algorithm for image encryptionInt Conf Audio Language Image Process20084388989210.1109/ICALIP.2008.4590187
– reference: Luoyu Z, Tao Z, Yumeng T, Huang H (2020) Fraction-order total variation image blind restoration based on self-similarity features. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972269
– reference: Yua F, Liua L, Xiao L, Kenli L, Shuo C (2019) A robust and fixed-time zeroing neural dynamics for computing time-variant nonlinear equation using a novel nonlinear activation function. Neurocomputing. https://doi.org/10.1016/j.neucom.2019.03.053
– reference: Zheng Y, Jin J (2015) A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos. Multimed Tools Appl 74:7803–7820. https://doi.org/10.1007/s11042-014-2024-0
– reference: Yue W, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT):31–38
– reference: Yuantao C, Jie X, Weihong X, Jingwen Z (2018b) A novel online incremental and decremental learning algorithm based on variable support vector machine. Clust Comput. https://doi.org/10.1007/s10586-018-1772-4
– reference: GanesanKSinghINarainMPublic key encryption of images and videos in real time using Chebyshev mapsProceedings of the 2008 fifth international conference on computer graphics, imaging and visualization2008Washington, DC, USAIEEE Computer Society21121610.1109/CGIV.2008.66
– reference: Nios II integrated development environment. http://www.altera.com/products/ip/processors/nios2/ni2-index.html
– reference: Nattional Institute of Standards and Technology (NIST) (2001) Advanced Encryption standard (AES), Federal Information Processing Standards Publications (FIPS PUBS) 197–26
– reference: Qingqing H, Liejun W, Yongming L, Qi J (2020) Video encryption scheme using hybrid encryption technology. International Journal of Internet Protocol Technology. https://doi.org/10.1504/IJIPT.2020.105046
– reference: Lin D, Xu W, Yuantao C (2020) Density peaks clustering by zero-pointed samples of regional group borders. Hindawi Computational Intelligence and Neuroscience. https://doi.org/10.1155/2020/8891778
– reference: Tzouveli P, Ntalianis K, Kollias S (2004) Security of human video objects by incorporating a chaos-based feedback cryptographic scheme. ACM Multimedia. https://doi.org/10.1145/1027527.1027609
– ident: 11668_CR6
  doi: 10.1504/IJICS.2020.108145
– volume: 77
  start-page: 12837
  year: 2018
  ident: 11668_CR20
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-017-4916-2
– ident: 11668_CR48
  doi: 10.1007/s11042-014-2024-0
– ident: 11668_CR17
  doi: 10.3390/s20041188
– volume: 75
  start-page: 6663
  year: 2019
  ident: 11668_CR4
  publication-title: J Supercomput
  doi: 10.1007/s11227-019-02878-7
– ident: 11668_CR42
  doi: 10.1002/cpe.5533
– ident: 11668_CR23
  doi: 10.1109/ACCESS.2020.2972269
– volume: 82
  start-page: 79
  year: 2016
  ident: 11668_CR34
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2015.12.006
– ident: 11668_CR9
– ident: 11668_CR31
– volume: 38
  start-page: 133
  issue: 133
  year: 2014
  ident: 11668_CR18
  publication-title: J Med Syst
  doi: 10.1007/s10916-014-0133-y
– ident: 11668_CR21
  doi: 10.1007/s11554-019-00917-3
– volume: 22
  start-page: S7665
  year: 2018
  ident: 11668_CR37
  publication-title: Clust Comput
  doi: 10.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV)
– ident: 11668_CR15
  doi: 10.1007/s10773-018-3989-7
– volume: 11
  start-page: 2536
  issue: 4
  year: 2017
  ident: 11668_CR12
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2015.2424702
– volume: 26
  start-page: 363
  year: 2020
  ident: 11668_CR14
  publication-title: Multimedia Systems
  doi: 10.1007/s00530-020-00648-7
– volume: 2020
  start-page: 332
  issue: 12
  year: 2020
  ident: 11668_CR29
  publication-title: Symmetry
  doi: 10.3390/sym12030332
– ident: 11668_CR36
  doi: 10.1016/j.neucom.2019.03.053
– ident: 11668_CR49
  doi: 10.1109/TIP.2003.819861
– ident: 11668_CR16
  doi: 10.1109/ACCESS.2020.2972338
– ident: 11668_CR32
  doi: 10.1145/1027527.1027609
– ident: 11668_CR30
– ident: 11668_CR1
  doi: 10.1007/s11042-020-09478-1
– ident: 11668_CR43
  doi: 10.1155/2020/8822777
– volume: 4
  start-page: 889
  issue: 3
  year: 2008
  ident: 11668_CR47
  publication-title: Int Conf Audio Language Image Process
  doi: 10.1109/ICALIP.2008.4590187
– ident: 11668_CR28
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 9
  start-page: 2316
  year: 2019
  ident: 11668_CR39
  publication-title: MDPI Appl Sci
  doi: 10.3390/app9112316
– ident: 11668_CR33
  doi: 10.1109/HealthCom.2016.7749426
– volume: 38
  start-page: 133
  issue: 133
  year: 2014
  ident: 11668_CR19
  publication-title: J Med Syst
  doi: 10.1007/s10916-014-0133-y
– volume: 35
  start-page: 448
  issue: 3
  year: 2013
  ident: 11668_CR7
  publication-title: Electron Telecommun Res Inst
  doi: 10.4218/etrij.13.0112.0677
– ident: 11668_CR24
– volume: 75
  start-page: 6663
  year: 2019
  ident: 11668_CR5
  publication-title: J Supercomput
  doi: 10.1007/s11227-019-02878-7
– ident: 11668_CR22
  doi: 10.1155/2020/8891778
– ident: 11668_CR3
  doi: 10.1109/ICSMC.2010.5642260
– ident: 11668_CR38
  doi: 10.1007/s10586-018-1772-4
– ident: 11668_CR40
  doi: 10.1109/ACCESS.2019.2911892
– ident: 11668_CR11
  doi: 10.1049/iet-ipr.2018.5250
– ident: 11668_CR35
  doi: 10.1155/2019/4047957
– volume: 21
  start-page: 577
  year: 2019
  ident: 11668_CR27
  publication-title: Entropy
  doi: 10.3390/e21060577
– ident: 11668_CR2
  doi: 10.1007/s11042-020-09478-1
– ident: 11668_CR25
– ident: 11668_CR44
  doi: 10.1007/s12652-020-02066-z
– volume: 12
  start-page: 293
  year: 2008
  ident: 11668_CR8
  publication-title: Des Autom Embed Syst
  doi: 10.1007/s10617-008-9030-2
– ident: 11668_CR46
– ident: 11668_CR45
  doi: 10.1007/s00371-020-01932-3
– ident: 11668_CR26
  doi: 10.1504/IJIPT.2020.105046
– ident: 11668_CR41
  doi: 10.1007/s12652-018-01171-4
– start-page: 211
  volume-title: Proceedings of the 2008 fifth international conference on computer graphics, imaging and visualization
  year: 2008
  ident: 11668_CR10
  doi: 10.1109/CGIV.2008.66
– volume: 49
  start-page: 35
  year: 2012
  ident: 11668_CR13
  publication-title: Telecommun Syst
  doi: 10.1007/s11235-010-9351-x
SSID ssj0016524
Score 2.4232664
Snippet Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2275
SubjectTerms Algorithms
Complexity
Computer Communication Networks
Computer Science
Cryptography
Data Structures and Information Theory
Encryption
Initial conditions
Multimedia
Multimedia Information Systems
Real time
Security systems
Special Purpose and Application-Based Systems
Video transmission
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTwIxEJ4oXPTgAzWiaHrwoNHGfZRSD8aggaCJxKAkeNp020VNDIuAB_-909KCmsh5d3uY2em8vw_gSGLKxVIVUy1En7IIE5RUM05jVUOHgQF934L63Ld5q8vuetXeErT9LowZq_R3or2oda5Mjfw8Qj_NDTRMeDX8oIY1ynRXPYWGdNQK-tJCjC1DMTLIWAUoXjfaD51ZX4FXHc2tCCj6ytCt0UyX6UKzqmJGFsKQc0HZb1c1jz__tEytJ2puwJoLIUl9qvNNWMoGJVj39AzEWWsJVn9gDW7BcwdDQmqo5IlZvcvJ2DHXkSmYMzET8C9Evcp8TMmbrTVkmvgZAYJnjr7s_UJ8-YEc39Ybjyfb0G02nm5a1PEqUIUGN8HcU4gM7Q4zDx5o25vjQZrGUgdaMdEPUHkKM78UbVtkEhPAlPU1k0EoNLr_LN6BwiAfZLtAajGTKapFxlwwIUOhWICqNnvZ0UVNijKEXoSJcqDjhvviPZnDJRuxJyj2xIo9YWU4nX0znEJuLHy74jWTOPMbJ_OfpQxnXlvzx_-ftrf4tH1Yicz6gy3BVKAwGX1mBxiUTNJD96d9A9gu2Xw
  priority: 102
  providerName: ProQuest
Title Real-time video security system using chaos- improved advanced encryption standard (IAES)
URI https://link.springer.com/article/10.1007/s11042-021-11668-4
https://www.proquest.com/docview/2623631151
Volume 81
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241105
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: ADMLS
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-7721
  dateEnd: 20221231
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: BENPR
  dateStart: 20220101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241105
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: 8FG
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60vejBt1hf5OBB0chmN03jsUpbHyhSLehpSbJbFaWVPg76652kSauigqeF3WzYzWQy728AdhSaXFybhGZStimP0UDRGRc0MRUUGKjQtx2oz-WVOG3x87vynS8K64ds9xCSdCf1pNiN2VISm1LAmBCS8mkoOrytAhSrjfuL2jh6IMq-ma2MKEpE5otlfp7lq0CaaJnfAqNO3tTnoRW-dJRm8nw4HOhD8_4NxPG_v7IAc14BJdXRjlmEqbyzBPOhuQPxvL4Es5-QCpfhvokKJbWN6Ikt3OuSvu97R0ZQ0MTmzz8Q86i6fUqenKciz0jIMCA4Z-_NnU4kOC_I7lm1drO3Aq167fbklPquDNQguw7QcpUyR65Fu0VEmYvsiUjrRGVRZrhsR0h6g3ajxpNB5grNR83bGVcRkxkqD3myCoVOt5OvAakkXGmRMJUIyaVi0vAIN4qt6o6PKkqWgAXSpMZDltvOGS_pBGzZrmSKK5m6lUx5CfbH77yOADv-HL0ZKJ565u2nMaqEwqIQsRIcBAJOHv8-2_r_hm_ATGyLKZxDZxMKg94w30IVZ6C3YVrWG9t-X-P1uHZ13cS7rbj6AYlm8Es
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bL0NBEJ6gD3hwF6XYBxLCxrms7XpopKi0Lo24JPV07Nk9RSItWhF_zm8zu91VJLx5Pj2TdPY7c9uZ-QBWJKZcLFUx1UI0KYswQUk14zRWRXQYGNA37VKf0zqvXrGjxnZjAN79LIxpq_Q20Rpq3VamRr4VoZ_mZjVMuPv4RA1rlLld9RQa0lEr6JJdMeYGO46zt1dM4Tql2gGe92oUHVYu96vUsQxQhfDrYiYmRIYoxDicB9reVPEgTWOpA62YaAb4VxTmQSkiXWQS06GUNTWTQSg0OsMsRrmDkGMx28HkL7dXqZ-df95j8G1HqysCir45dGM7veG90IzGmBaJMORcUPbdNfbj3R9XtNbzHU7AmAtZSbmHsUkYyFpTMO7pIIizDlMw-mW34TRcn2MISg11PTGjfm3ScUx5pLc8mpiO-1ui7mS7Q8m9rW1kmvieBIIyn9-sPSO-3EHWauXKxfoMXP2LhmdhqNVuZXNAijGTKcJAxlwwIUOhWIDQMnPg0U5RijyEXoWJckvODdfGQ9Jfz2zUnqDaE6v2hOVh4_Odx96Kjz9_XfAnk7jPvZP0wZmHTX9a_ce_S5v_W9oyDFcvT0-Sk1r9eAFGIjN6Ycs_BRjqPr9kixgQddMlhzoCN_8N9A9MHRUD
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1ZSwMxEB60guiDt1jPPCgoGrpHuo0PIkWt1gvxgPq0ZpNdFaSttiL9a_46J9nEqqBvPm93oJNv58rMNwCrAlMulsiQKs4zygJMUBLFIhrKCjoMDOgzQ-pzdh4d3bDjRrkxAO9uFka3VTqbaAy1akldIy8F6KcjTQ3jlzLbFnGxX9ttP1O9QUrftLp1GjlETtLeG6ZvnZ36Pp71WhDUDq73jqjdMEAlQq-LWRjnKSIQY_DIU-aWKvKSJBTKU5LxzMO_ITEHShDlPBWYCiUsU0x4PlfoCNMQ5Q7CUEWzuOsp9drh5w1GVLYLdblH0Sv7dmAnH9vz9VCMbo7w_SjilH13iv1I98flrPF5tQkYs8EqqebomoSBtDkF424RBLF2YQpGv7AaTsPtJQafVC-tJ3rIr0U6dkceyWmjie61vyfyQbQ6lDyaqkaqiOtGICjzpWcsGXGFDrJerx5cbczAzb_odxYKzVYznQNSCZlIEAACdc248LlkHoJKT4AH2xXBi-A7FcbS0pvrLRtPcZ-YWas9RrXHRu0xK8Lm5zvtnNzjz18vupOJ7YfeifuwLMKWO63-49-lzf8tbQWGEd7xaf38ZAFGAj1zYeo-i1DovrymSxgJdZNlAzkCd_-N8Q-Z9RKd
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Real-time+video+security+system+using+chaos-+improved+advanced+encryption+standard+%28IAES%29&rft.jtitle=Multimedia+tools+and+applications&rft.au=Hafsa%2C+Amal&rft.au=Fradi%2C+Marwa&rft.au=Sghaier%2C+Anissa&rft.au=Malek%2C+Jihene&rft.date=2022-01-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=81&rft.issue=2&rft.spage=2275&rft.epage=2298&rft_id=info:doi/10.1007%2Fs11042-021-11668-4&rft.externalDocID=10_1007_s11042_021_11668_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon