Real-time video security system using chaos- improved advanced encryption standard (IAES)
Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making i...
Saved in:
| Published in | Multimedia tools and applications Vol. 81; no. 2; pp. 2275 - 2298 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.01.2022
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1380-7501 1573-7721 |
| DOI | 10.1007/s11042-021-11668-4 |
Cover
| Abstract | Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800–22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2
128
which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission. |
|---|---|
| AbstractList | Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800–22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2128 which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission. Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800–22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2 128 which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission. |
| Author | Hafsa, Amal Sghaier, Anissa Machhout, Mohsen Fradi, Marwa Malek, Jihene |
| Author_xml | – sequence: 1 givenname: Amal surname: Hafsa fullname: Hafsa, Amal email: amalhafsa12@gmail.com organization: Electronics and Micro-Electronics Laboratory, University of Monastir – sequence: 2 givenname: Marwa surname: Fradi fullname: Fradi, Marwa organization: Electronics and Micro-Electronics Laboratory, University of Monastir – sequence: 3 givenname: Anissa surname: Sghaier fullname: Sghaier, Anissa organization: Electronics and Micro-Electronics Laboratory, University of Monastir – sequence: 4 givenname: Jihene surname: Malek fullname: Malek, Jihene organization: Electronics and Micro-Electronics Laboratory, University of Monastir, Department of Electronics, Sousse University, Higher Institute of Applied Sciences and Technology – sequence: 5 givenname: Mohsen surname: Machhout fullname: Machhout, Mohsen organization: Electronics and Micro-Electronics Laboratory, University of Monastir |
| BookMark | eNp9kE9LazEQxYP4QO3zC7gKuNFFdCbJzY1LEfUJgvD-LFyF3CStKW1uTdJCv73RPhBcuJqzOL-ZM-eI7KcxBUJOEC4QoL8siCA5A44MUSnN5B45xK4XrO857jctNLC-AzwgR6XMAVB1XB6S59_BLliNy0A30YeRluDWOdYtLdtSw5KuS0wz6l7sWBiNy1UeN8FT6zc2uSZCcnm7qnFMtFSbvM2enj1c3_45_0l-TO2ihOP_c0L-3d3-vfnFHp_uH26uH5kTeFVZx7UOSmjJtQLfflGgYBiE9eCd1FOQg3Oo5aA16GDhSg5y6qUF1B4UBjEhp7u9LdrrOpRq5uM6p3bScMWFEogdNpfeuVweS8lhalys9j13zTYuDIJ5L9LsijStSPNRpJEN5V_QVY5Lm7ffQ2IHlWZOs5A_U31DvQES7Iat |
| CitedBy_id | crossref_primary_10_1186_s13634_023_01003_4 crossref_primary_10_32604_cmc_2024_054654 crossref_primary_10_1080_13682199_2023_2187513 crossref_primary_10_1016_j_vlsi_2024_102302 crossref_primary_10_1038_s41598_023_41082_9 crossref_primary_10_1364_AO_543978 crossref_primary_10_1007_s11042_023_15957_y crossref_primary_10_1007_s11760_024_03082_8 crossref_primary_10_1016_j_apm_2024_06_016 crossref_primary_10_1016_j_ins_2024_120919 crossref_primary_10_1007_s11042_023_15448_0 crossref_primary_10_1080_21642583_2023_2207593 crossref_primary_10_1080_09540091_2024_2379275 crossref_primary_10_1007_s11517_023_02925_9 crossref_primary_10_1016_j_fraope_2023_100055 crossref_primary_10_1109_ACCESS_2024_3365523 crossref_primary_10_1109_ACCESS_2023_3287858 crossref_primary_10_1117_1_JEI_33_1_013003 crossref_primary_10_1142_S0218127424500135 crossref_primary_10_1109_ACCESS_2022_3211657 crossref_primary_10_1109_TQE_2022_3216530 crossref_primary_10_1109_ACCESS_2022_3173338 crossref_primary_10_1186_s44147_024_00376_z crossref_primary_10_1016_j_chaos_2024_114958 |
| Cites_doi | 10.1504/IJICS.2020.108145 10.1007/s11042-017-4916-2 10.1007/s11042-014-2024-0 10.3390/s20041188 10.1007/s11227-019-02878-7 10.1002/cpe.5533 10.1109/ACCESS.2020.2972269 10.1016/j.optlaseng.2015.12.006 10.1007/s10916-014-0133-y 10.1007/s11554-019-00917-3 10.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV) 10.1007/s10773-018-3989-7 10.1109/JSYST.2015.2424702 10.1007/s00530-020-00648-7 10.3390/sym12030332 10.1016/j.neucom.2019.03.053 10.1109/TIP.2003.819861 10.1109/ACCESS.2020.2972338 10.1145/1027527.1027609 10.1007/s11042-020-09478-1 10.1155/2020/8822777 10.1109/ICALIP.2008.4590187 10.1002/j.1538-7305.1949.tb00928.x 10.3390/app9112316 10.1109/HealthCom.2016.7749426 10.4218/etrij.13.0112.0677 10.1155/2020/8891778 10.1109/ICSMC.2010.5642260 10.1007/s10586-018-1772-4 10.1109/ACCESS.2019.2911892 10.1049/iet-ipr.2018.5250 10.1155/2019/4047957 10.3390/e21060577 10.1007/s12652-020-02066-z 10.1007/s10617-008-9030-2 10.1007/s00371-020-01932-3 10.1504/IJIPT.2020.105046 10.1007/s12652-018-01171-4 10.1109/CGIV.2008.66 10.1007/s11235-010-9351-x |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
| DOI | 10.1007/s11042-021-11668-4 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection (ProQuest) ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database ProQuest Research library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1573-7721 |
| EndPage | 2298 |
| ExternalDocumentID | 10_1007_s11042_021_11668_4 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQUKI Q9U |
| ID | FETCH-LOGICAL-c319t-5288e63842860d0076060bb3ad0dc48f04bcc184b8808ea094b4fd4a018d061e3 |
| IEDL.DBID | AGYKE |
| ISSN | 1380-7501 |
| IngestDate | Sat Jul 26 00:06:04 EDT 2025 Thu Apr 24 23:13:25 EDT 2025 Wed Oct 01 04:51:16 EDT 2025 Fri Feb 21 02:46:21 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | IAES Security Real time Chaos theory Video encryption |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-5288e63842860d0076060bb3ad0dc48f04bcc184b8808ea094b4fd4a018d061e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2623631151 |
| PQPubID | 54626 |
| PageCount | 24 |
| ParticipantIDs | proquest_journals_2623631151 crossref_citationtrail_10_1007_s11042_021_11668_4 crossref_primary_10_1007_s11042_021_11668_4 springer_journals_10_1007_s11042_021_11668_4 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20220100 2022-01-00 20220101 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – month: 1 year: 2022 text: 20220100 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Multimedia tools and applications |
| PublicationTitleAbbrev | Multimed Tools Appl |
| PublicationYear | 2022 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | BenAAKadionikPMasmoudiNLeviHFPGA implementation of a HW/SW platform for multimedia embedded systemsDes Autom Embed Syst20081229331110.1007/s10617-008-9030-2 Th e μClinux project http://www.uClinux.org HuiXXiaojunTZhuWMiaoZYangLJingMA robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipherMultimedia Systems20202636338110.1007/s00530-020-00648-7 YuantaoCWeihongXJingwenKYThe fire recognition algorithm using dynamic feature fusion and IVSVM classifierClust Comput201822S7665S767510.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV) Yuantao C, Jiajun T, Linwu L, Jie X, Runlong X, Jingbo X, Qian Z, Kai Y (2020b) Research of improving semantic image segmentation based on a feature fusion model. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02066-z Yuantao C, Li L, Jiajun T, Xi R, Qian Z, Kai Y, Xi J, Xi C (2020c) The improved image inpainting algorithm via encoder and similarity constraint. Vis Comput. https://doi.org/10.1007/s00371-020-01932-3 Amal H, Anissa SM, Jihene M, Mohsen M (2020) An improved co-designed AES-ECC cryptosystem for secure data transmission. International Journal of Information and Computer Security (IJICS). https://doi.org/10.1504/IJICS.2020.108145 Yuantao C, Jiajun T, Qian Z, Kai Y, Xi C, Xi J, Xi R (2020a) Saliency detection via the improved hierarchical principal component analysis method. Hindawi Wireless Communications and Mobile Computing Volume. https://doi.org/10.1155/2020/8822777 Yuantao C, Jin W, Runlong X, Qian Z, Ca Z (2019c) The visual object tracking algorithm research based on adaptive combination kernel. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-01171-4 HayajnehTUllahSMohdBJBalaganiKSAn enhanced WLAN security system with FPGAIEEE Syst J20171142536254510.1109/JSYST.2015.2424702 Luoyu Z, Tao Z, Yumeng T, Huang H (2020) Fraction-order total variation image blind restoration based on self-similarity features. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972269 Sonia K, Medien Z, Adel B, Taoufik S, Yousef D, Rached T (2015) FPGA-based real-time implementation of AES algorithm for video encryption. Recent Advances in Telecommunications, Informatics and Educational Technologies. ISBN: 978-1-61804-262-0 Yue W, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT):31–38 Zheng Y, Jin J (2015) A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos. Multimed Tools Appl 74:7803–7820. https://doi.org/10.1007/s11042-014-2024-0 Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x Yuantao C, Jin W, Xi C, Mingwei Z (2019b) Single-image super-resolution algorithm based on structural self-similarity and deformation block features. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2911892 Yuantao C, Jin W, Songjie L, Xi C, Xi J, Xi J (2019d) Multiscale fast correlation filtering tracking algorithm based on feature fusion model. Wiley Concurrency Computat Pract Exper. https://doi.org/10.1002/cpe.5533 GanesanKSinghINarainMPublic key encryption of images and videos in real time using Chebyshev mapsProceedings of the 2008 fifth international conference on computer graphics, imaging and visualization2008Washington, DC, USAIEEE Computer Society21121610.1109/CGIV.2008.66 Hassan El K, Wessam MS, Yasmine A (2019) New video encryption schemes based on chaotic maps. IET Image Process. https://doi.org/10.1049/iet-ipr.2018.5250 Wickramage C, Sahama T, Fidge C (2016) Anatomy of log files: implications for information accountability measures. e-Health Netw Appl Serv (Healthcom):1–6. https://doi.org/10.1109/HealthCom.2016.7749426 HuQMohammedGThe accuracy of PSNR in predicting video quality for different video scenes and frame ratesTelecommun Syst201249354810.1007/s11235-010-9351-x Lin D, Xu W, Yuantao C (2020) Density peaks clustering by zero-pointed samples of regional group borders. Hindawi Computational Intelligence and Neuroscience. https://doi.org/10.1155/2020/8891778 Jiang N, Dong X, Hu H et al (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58:979–991. https://doi.org/10.1007/s10773-018-3989-7 Bentoutou Y, Bensikadour EL H, Talab N, Bounoua N (2019) An improved image encryption algorithm for satelite application. Advances in Space Research, Elsevier. 101016/jasr201909027 ZhangXChenWA new chaotic algorithm for image encryptionInt Conf Audio Language Image Process20084388989210.1109/ICALIP.2008.4590187 Seyed ShMYuchengCChunmingTA new algorithm for medical color images encryption using chaotic systemsEntropy201921577397887110.3390/e21060577 ShuliCLiejunWNaixiangAQingqingHA selective video encryption scheme based on coding characteristicsSymmetry202020201233210.3390/sym12030332 Qingqing H, Liejun W, Yongming L, Qi J (2020) Video encryption scheme using hybrid encryption technology. International Journal of Internet Protocol Technology. https://doi.org/10.1504/IJIPT.2020.105046 AlirezaAMohammadJBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7 Nios II integrated development environment. http://www.altera.com/products/ip/processors/nios2/ni2-index.html Aabha N, Al A, Prasad PWC, Rasha A, Sami H (2020a) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1 Fei Yu , Li Li ,Binyong He ,Yuanyuan H, Changqiong Shi, Shuo Cai ,Yun S ,Sichun Du ,and Qiuzhen W (2019) Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization ,and Secure Communication Application. Hindawi. https://doi.org/10.1155/2019/4047957. Agaian S, Raja R, Ravindranath Ch (2010) Logical Transform based encryption for multimedia systems. IEEE International Conference on Systems, Man and Cybernetics. https://doi.org/10.1109/ICSMC.2010.5642260. XingyanWYuanyunZHuiliZKangGA novel color image encryption using alternate chaotic mapping structureOpt Lasers Eng201682798610.1016/j.optlaseng.2015.12.006 Li Y, Jiaohua Q, Xi X, Yun T, Li Q, Lingyun X (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc. https://doi.org/10.1007/s11554-019-00917-3 LiJChenyanWChXZhengTHuGChin-ChenCA selective encryption scheme of CABAC based on video context in high efficiency video codingMultimedia Tools Appl201877128371285110.1007/s11042-017-4916-2 AlirezaAMohammadJRBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7 Jianming Zh, Lu C, Jin W, Yu X-G, Se-Jung L, Zafer AM, Amr T (2020b) Training Convolutional Neural Networks with Multi-Size Images and Triplet Loss for Remote Sensing Scene Classification. Sensors MDPI. https://doi.org/10.3390/s20041188. Aabha N, Al A, Prasad PWC, Rasha SA, Sami H (2020b) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1 BarakatMLMansingkaASRadwanAGSalamaKNGeneralized hardware post-processing technique for Chaos-based pseudorandom number generatorsElectron Telecommun Res Inst201335344845810.4218/etrij.13.0112.0677 Nattional Institute of Standards and Technology (NIST) (2001) Advanced Encryption standard (AES), Federal Information Processing Standards Publications (FIPS PUBS) 197–26 Tzouveli P, Ntalianis K, Kollias S (2004) Security of human video objects by incorporating a chaos-based feedback cryptographic scheme. ACM Multimedia. https://doi.org/10.1145/1027527.1027609 KiahMLAl-BakriSHZaidanAAZaidanBBHussainMDesign and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architectureJ Med Syst20143813313314410.1007/s10916-014-0133-y Yua F, Liua L, Xiao L, Kenli L, Shuo C (2019) A robust and fixed-time zeroing neural dynamics for computing time-variant nonlinear equation using a novel nonlinear activation function. Neurocomputing. https://doi.org/10.1016/j.neucom.2019.03.053 Jianming Z, Xi Z, Juan S, Xin Z, JIN W (2020a) A cascaded R-CNN with multiscale attention and imbalanced samples for traffic sign detection. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972338 Yuantao C, Jie X, Weihong X, Jingwen Z (2018b) A novel online incremental and decremental learning algorithm based on variable support vector machine. Clust Comput. https://doi.org/10.1007/s10586-018-1772-4 YuantaoCJinWXiCArunKSKaiYCaZImage super-resolution algorithm based on dual-channel convolutional neural networksMDPI Appl Sci20199231610.3390/app9112316 Zhou W, Alan CB, Hamid SR, Si EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4) A Alireza (11668_CR4) 2019; 75 T Hayajneh (11668_CR12) 2017; 11 11668_CR1 11668_CR41 11668_CR40 11668_CR43 11668_CR42 11668_CR2 C Shuli (11668_CR29) 2020; 2020 11668_CR45 11668_CR3 11668_CR44 11668_CR46 11668_CR49 11668_CR48 C Yuantao (11668_CR39) 2019; 9 ML Kiah (11668_CR18) 2014; 38 Q Hu (11668_CR13) 2012; 49 11668_CR30 11668_CR32 11668_CR31 11668_CR33 11668_CR36 11668_CR35 11668_CR38 X Hui (11668_CR14) 2020; 26 C Yuantao (11668_CR37) 2018; 22 ML Barakat (11668_CR7) 2013; 35 11668_CR21 11668_CR23 11668_CR22 11668_CR25 11668_CR24 X Zhang (11668_CR47) 2008; 4 11668_CR26 11668_CR28 ML Kiah (11668_CR19) 2014; 38 A Alireza (11668_CR5) 2019; 75 W Xingyan (11668_CR34) 2016; 82 11668_CR9 11668_CR6 M Seyed Sh (11668_CR27) 2019; 21 AA Ben (11668_CR8) 2008; 12 11668_CR11 11668_CR16 J Li (11668_CR20) 2018; 77 11668_CR15 K Ganesan (11668_CR10) 2008 11668_CR17 |
| References_xml | – reference: Aabha N, Al A, Prasad PWC, Rasha SA, Sami H (2020b) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1 – reference: Yuantao C, Jiajun T, Linwu L, Jie X, Runlong X, Jingbo X, Qian Z, Kai Y (2020b) Research of improving semantic image segmentation based on a feature fusion model. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02066-z – reference: Wickramage C, Sahama T, Fidge C (2016) Anatomy of log files: implications for information accountability measures. e-Health Netw Appl Serv (Healthcom):1–6. https://doi.org/10.1109/HealthCom.2016.7749426 – reference: BenAAKadionikPMasmoudiNLeviHFPGA implementation of a HW/SW platform for multimedia embedded systemsDes Autom Embed Syst20081229331110.1007/s10617-008-9030-2 – reference: Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x – reference: Yuantao C, Jin W, Xi C, Mingwei Z (2019b) Single-image super-resolution algorithm based on structural self-similarity and deformation block features. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2911892 – reference: YuantaoCJinWXiCArunKSKaiYCaZImage super-resolution algorithm based on dual-channel convolutional neural networksMDPI Appl Sci20199231610.3390/app9112316 – reference: Th e μClinux project http://www.uClinux.org – reference: YuantaoCWeihongXJingwenKYThe fire recognition algorithm using dynamic feature fusion and IVSVM classifierClust Comput201822S7665S767510.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV) – reference: Yuantao C, Li L, Jiajun T, Xi R, Qian Z, Kai Y, Xi J, Xi C (2020c) The improved image inpainting algorithm via encoder and similarity constraint. Vis Comput. https://doi.org/10.1007/s00371-020-01932-3 – reference: HayajnehTUllahSMohdBJBalaganiKSAn enhanced WLAN security system with FPGAIEEE Syst J20171142536254510.1109/JSYST.2015.2424702 – reference: KiahMLAl-BakriSHZaidanAAZaidanBBHussainMDesign and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architectureJ Med Syst20143813313314410.1007/s10916-014-0133-y – reference: Jianming Zh, Lu C, Jin W, Yu X-G, Se-Jung L, Zafer AM, Amr T (2020b) Training Convolutional Neural Networks with Multi-Size Images and Triplet Loss for Remote Sensing Scene Classification. Sensors MDPI. https://doi.org/10.3390/s20041188. – reference: LiJChenyanWChXZhengTHuGChin-ChenCA selective encryption scheme of CABAC based on video context in high efficiency video codingMultimedia Tools Appl201877128371285110.1007/s11042-017-4916-2 – reference: ShuliCLiejunWNaixiangAQingqingHA selective video encryption scheme based on coding characteristicsSymmetry202020201233210.3390/sym12030332 – reference: HuiXXiaojunTZhuWMiaoZYangLJingMA robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipherMultimedia Systems20202636338110.1007/s00530-020-00648-7 – reference: Zhou W, Alan CB, Hamid SR, Si EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4) – reference: Agaian S, Raja R, Ravindranath Ch (2010) Logical Transform based encryption for multimedia systems. IEEE International Conference on Systems, Man and Cybernetics. https://doi.org/10.1109/ICSMC.2010.5642260. – reference: Bentoutou Y, Bensikadour EL H, Talab N, Bounoua N (2019) An improved image encryption algorithm for satelite application. Advances in Space Research, Elsevier. 101016/jasr201909027 – reference: AlirezaAMohammadJRBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7 – reference: Li Y, Jiaohua Q, Xi X, Yun T, Li Q, Lingyun X (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc. https://doi.org/10.1007/s11554-019-00917-3 – reference: Yuantao C, Jin W, Songjie L, Xi C, Xi J, Xi J (2019d) Multiscale fast correlation filtering tracking algorithm based on feature fusion model. Wiley Concurrency Computat Pract Exper. https://doi.org/10.1002/cpe.5533 – reference: Hassan El K, Wessam MS, Yasmine A (2019) New video encryption schemes based on chaotic maps. IET Image Process. https://doi.org/10.1049/iet-ipr.2018.5250 – reference: Amal H, Anissa SM, Jihene M, Mohsen M (2020) An improved co-designed AES-ECC cryptosystem for secure data transmission. International Journal of Information and Computer Security (IJICS). https://doi.org/10.1504/IJICS.2020.108145 – reference: HuQMohammedGThe accuracy of PSNR in predicting video quality for different video scenes and frame ratesTelecommun Syst201249354810.1007/s11235-010-9351-x – reference: AlirezaAMohammadJBehnamGAn image encryption method based on chaos system and AES algorithmJ Supercomput2019756663668210.1007/s11227-019-02878-7 – reference: Jianming Z, Xi Z, Juan S, Xin Z, JIN W (2020a) A cascaded R-CNN with multiscale attention and imbalanced samples for traffic sign detection. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972338 – reference: Jiang N, Dong X, Hu H et al (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58:979–991. https://doi.org/10.1007/s10773-018-3989-7 – reference: BarakatMLMansingkaASRadwanAGSalamaKNGeneralized hardware post-processing technique for Chaos-based pseudorandom number generatorsElectron Telecommun Res Inst201335344845810.4218/etrij.13.0112.0677 – reference: XingyanWYuanyunZHuiliZKangGA novel color image encryption using alternate chaotic mapping structureOpt Lasers Eng201682798610.1016/j.optlaseng.2015.12.006 – reference: Fei Yu , Li Li ,Binyong He ,Yuanyuan H, Changqiong Shi, Shuo Cai ,Yun S ,Sichun Du ,and Qiuzhen W (2019) Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization ,and Secure Communication Application. Hindawi. https://doi.org/10.1155/2019/4047957. – reference: Yuantao C, Jiajun T, Qian Z, Kai Y, Xi C, Xi J, Xi R (2020a) Saliency detection via the improved hierarchical principal component analysis method. Hindawi Wireless Communications and Mobile Computing Volume. https://doi.org/10.1155/2020/8822777 – reference: Seyed ShMYuchengCChunmingTA new algorithm for medical color images encryption using chaotic systemsEntropy201921577397887110.3390/e21060577 – reference: Yuantao C, Jin W, Runlong X, Qian Z, Ca Z (2019c) The visual object tracking algorithm research based on adaptive combination kernel. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-01171-4 – reference: Aabha N, Al A, Prasad PWC, Rasha A, Sami H (2020a) A novel modified chaotic simplified advanced encryption system (MCS-AES): mixed reality for a secure surgical tele-presence. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09478-1 – reference: Sonia K, Medien Z, Adel B, Taoufik S, Yousef D, Rached T (2015) FPGA-based real-time implementation of AES algorithm for video encryption. Recent Advances in Telecommunications, Informatics and Educational Technologies. ISBN: 978-1-61804-262-0 – reference: ZhangXChenWA new chaotic algorithm for image encryptionInt Conf Audio Language Image Process20084388989210.1109/ICALIP.2008.4590187 – reference: Luoyu Z, Tao Z, Yumeng T, Huang H (2020) Fraction-order total variation image blind restoration based on self-similarity features. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2972269 – reference: Yua F, Liua L, Xiao L, Kenli L, Shuo C (2019) A robust and fixed-time zeroing neural dynamics for computing time-variant nonlinear equation using a novel nonlinear activation function. Neurocomputing. https://doi.org/10.1016/j.neucom.2019.03.053 – reference: Zheng Y, Jin J (2015) A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos. Multimed Tools Appl 74:7803–7820. https://doi.org/10.1007/s11042-014-2024-0 – reference: Yue W, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT):31–38 – reference: Yuantao C, Jie X, Weihong X, Jingwen Z (2018b) A novel online incremental and decremental learning algorithm based on variable support vector machine. Clust Comput. https://doi.org/10.1007/s10586-018-1772-4 – reference: GanesanKSinghINarainMPublic key encryption of images and videos in real time using Chebyshev mapsProceedings of the 2008 fifth international conference on computer graphics, imaging and visualization2008Washington, DC, USAIEEE Computer Society21121610.1109/CGIV.2008.66 – reference: Nios II integrated development environment. http://www.altera.com/products/ip/processors/nios2/ni2-index.html – reference: Nattional Institute of Standards and Technology (NIST) (2001) Advanced Encryption standard (AES), Federal Information Processing Standards Publications (FIPS PUBS) 197–26 – reference: Qingqing H, Liejun W, Yongming L, Qi J (2020) Video encryption scheme using hybrid encryption technology. International Journal of Internet Protocol Technology. https://doi.org/10.1504/IJIPT.2020.105046 – reference: Lin D, Xu W, Yuantao C (2020) Density peaks clustering by zero-pointed samples of regional group borders. Hindawi Computational Intelligence and Neuroscience. https://doi.org/10.1155/2020/8891778 – reference: Tzouveli P, Ntalianis K, Kollias S (2004) Security of human video objects by incorporating a chaos-based feedback cryptographic scheme. ACM Multimedia. https://doi.org/10.1145/1027527.1027609 – ident: 11668_CR6 doi: 10.1504/IJICS.2020.108145 – volume: 77 start-page: 12837 year: 2018 ident: 11668_CR20 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-017-4916-2 – ident: 11668_CR48 doi: 10.1007/s11042-014-2024-0 – ident: 11668_CR17 doi: 10.3390/s20041188 – volume: 75 start-page: 6663 year: 2019 ident: 11668_CR4 publication-title: J Supercomput doi: 10.1007/s11227-019-02878-7 – ident: 11668_CR42 doi: 10.1002/cpe.5533 – ident: 11668_CR23 doi: 10.1109/ACCESS.2020.2972269 – volume: 82 start-page: 79 year: 2016 ident: 11668_CR34 publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2015.12.006 – ident: 11668_CR9 – ident: 11668_CR31 – volume: 38 start-page: 133 issue: 133 year: 2014 ident: 11668_CR18 publication-title: J Med Syst doi: 10.1007/s10916-014-0133-y – ident: 11668_CR21 doi: 10.1007/s11554-019-00917-3 – volume: 22 start-page: S7665 year: 2018 ident: 11668_CR37 publication-title: Clust Comput doi: 10.1007/s10586-018-2368-8(0123456789().,-volV)(0123456789().,-volV) – ident: 11668_CR15 doi: 10.1007/s10773-018-3989-7 – volume: 11 start-page: 2536 issue: 4 year: 2017 ident: 11668_CR12 publication-title: IEEE Syst J doi: 10.1109/JSYST.2015.2424702 – volume: 26 start-page: 363 year: 2020 ident: 11668_CR14 publication-title: Multimedia Systems doi: 10.1007/s00530-020-00648-7 – volume: 2020 start-page: 332 issue: 12 year: 2020 ident: 11668_CR29 publication-title: Symmetry doi: 10.3390/sym12030332 – ident: 11668_CR36 doi: 10.1016/j.neucom.2019.03.053 – ident: 11668_CR49 doi: 10.1109/TIP.2003.819861 – ident: 11668_CR16 doi: 10.1109/ACCESS.2020.2972338 – ident: 11668_CR32 doi: 10.1145/1027527.1027609 – ident: 11668_CR30 – ident: 11668_CR1 doi: 10.1007/s11042-020-09478-1 – ident: 11668_CR43 doi: 10.1155/2020/8822777 – volume: 4 start-page: 889 issue: 3 year: 2008 ident: 11668_CR47 publication-title: Int Conf Audio Language Image Process doi: 10.1109/ICALIP.2008.4590187 – ident: 11668_CR28 doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 9 start-page: 2316 year: 2019 ident: 11668_CR39 publication-title: MDPI Appl Sci doi: 10.3390/app9112316 – ident: 11668_CR33 doi: 10.1109/HealthCom.2016.7749426 – volume: 38 start-page: 133 issue: 133 year: 2014 ident: 11668_CR19 publication-title: J Med Syst doi: 10.1007/s10916-014-0133-y – volume: 35 start-page: 448 issue: 3 year: 2013 ident: 11668_CR7 publication-title: Electron Telecommun Res Inst doi: 10.4218/etrij.13.0112.0677 – ident: 11668_CR24 – volume: 75 start-page: 6663 year: 2019 ident: 11668_CR5 publication-title: J Supercomput doi: 10.1007/s11227-019-02878-7 – ident: 11668_CR22 doi: 10.1155/2020/8891778 – ident: 11668_CR3 doi: 10.1109/ICSMC.2010.5642260 – ident: 11668_CR38 doi: 10.1007/s10586-018-1772-4 – ident: 11668_CR40 doi: 10.1109/ACCESS.2019.2911892 – ident: 11668_CR11 doi: 10.1049/iet-ipr.2018.5250 – ident: 11668_CR35 doi: 10.1155/2019/4047957 – volume: 21 start-page: 577 year: 2019 ident: 11668_CR27 publication-title: Entropy doi: 10.3390/e21060577 – ident: 11668_CR2 doi: 10.1007/s11042-020-09478-1 – ident: 11668_CR25 – ident: 11668_CR44 doi: 10.1007/s12652-020-02066-z – volume: 12 start-page: 293 year: 2008 ident: 11668_CR8 publication-title: Des Autom Embed Syst doi: 10.1007/s10617-008-9030-2 – ident: 11668_CR46 – ident: 11668_CR45 doi: 10.1007/s00371-020-01932-3 – ident: 11668_CR26 doi: 10.1504/IJIPT.2020.105046 – ident: 11668_CR41 doi: 10.1007/s12652-018-01171-4 – start-page: 211 volume-title: Proceedings of the 2008 fifth international conference on computer graphics, imaging and visualization year: 2008 ident: 11668_CR10 doi: 10.1109/CGIV.2008.66 – volume: 49 start-page: 35 year: 2012 ident: 11668_CR13 publication-title: Telecommun Syst doi: 10.1007/s11235-010-9351-x |
| SSID | ssj0016524 |
| Score | 2.4232664 |
| Snippet | Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2275 |
| SubjectTerms | Algorithms Complexity Computer Communication Networks Computer Science Cryptography Data Structures and Information Theory Encryption Initial conditions Multimedia Multimedia Information Systems Real time Security systems Special Purpose and Application-Based Systems Video transmission |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTwIxEJ4oXPTgAzWiaHrwoNHGfZRSD8aggaCJxKAkeNp020VNDIuAB_-909KCmsh5d3uY2em8vw_gSGLKxVIVUy1En7IIE5RUM05jVUOHgQF934L63Ld5q8vuetXeErT9LowZq_R3or2oda5Mjfw8Qj_NDTRMeDX8oIY1ynRXPYWGdNQK-tJCjC1DMTLIWAUoXjfaD51ZX4FXHc2tCCj6ytCt0UyX6UKzqmJGFsKQc0HZb1c1jz__tEytJ2puwJoLIUl9qvNNWMoGJVj39AzEWWsJVn9gDW7BcwdDQmqo5IlZvcvJ2DHXkSmYMzET8C9Evcp8TMmbrTVkmvgZAYJnjr7s_UJ8-YEc39Ybjyfb0G02nm5a1PEqUIUGN8HcU4gM7Q4zDx5o25vjQZrGUgdaMdEPUHkKM78UbVtkEhPAlPU1k0EoNLr_LN6BwiAfZLtAajGTKapFxlwwIUOhWICqNnvZ0UVNijKEXoSJcqDjhvviPZnDJRuxJyj2xIo9YWU4nX0znEJuLHy74jWTOPMbJ_OfpQxnXlvzx_-ftrf4tH1Yicz6gy3BVKAwGX1mBxiUTNJD96d9A9gu2Xw priority: 102 providerName: ProQuest |
| Title | Real-time video security system using chaos- improved advanced encryption standard (IAES) |
| URI | https://link.springer.com/article/10.1007/s11042-021-11668-4 https://www.proquest.com/docview/2623631151 |
| Volume | 81 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1573-7721 dateEnd: 20241105 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: ADMLS dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AFBBN dateStart: 19970101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-7721 dateEnd: 20221231 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: BENPR dateStart: 20220101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-7721 dateEnd: 20241105 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: 8FG dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60vejBt1hf5OBB0chmN03jsUpbHyhSLehpSbJbFaWVPg76652kSauigqeF3WzYzWQy728AdhSaXFybhGZStimP0UDRGRc0MRUUGKjQtx2oz-WVOG3x87vynS8K64ds9xCSdCf1pNiN2VISm1LAmBCS8mkoOrytAhSrjfuL2jh6IMq-ma2MKEpE5otlfp7lq0CaaJnfAqNO3tTnoRW-dJRm8nw4HOhD8_4NxPG_v7IAc14BJdXRjlmEqbyzBPOhuQPxvL4Es5-QCpfhvokKJbWN6Ikt3OuSvu97R0ZQ0MTmzz8Q86i6fUqenKciz0jIMCA4Z-_NnU4kOC_I7lm1drO3Aq167fbklPquDNQguw7QcpUyR65Fu0VEmYvsiUjrRGVRZrhsR0h6g3ajxpNB5grNR83bGVcRkxkqD3myCoVOt5OvAakkXGmRMJUIyaVi0vAIN4qt6o6PKkqWgAXSpMZDltvOGS_pBGzZrmSKK5m6lUx5CfbH77yOADv-HL0ZKJ565u2nMaqEwqIQsRIcBAJOHv8-2_r_hm_ATGyLKZxDZxMKg94w30IVZ6C3YVrWG9t-X-P1uHZ13cS7rbj6AYlm8Es |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bL0NBEJ6gD3hwF6XYBxLCxrms7XpopKi0Lo24JPV07Nk9RSItWhF_zm8zu91VJLx5Pj2TdPY7c9uZ-QBWJKZcLFUx1UI0KYswQUk14zRWRXQYGNA37VKf0zqvXrGjxnZjAN79LIxpq_Q20Rpq3VamRr4VoZ_mZjVMuPv4RA1rlLld9RQa0lEr6JJdMeYGO46zt1dM4Tql2gGe92oUHVYu96vUsQxQhfDrYiYmRIYoxDicB9reVPEgTWOpA62YaAb4VxTmQSkiXWQS06GUNTWTQSg0OsMsRrmDkGMx28HkL7dXqZ-df95j8G1HqysCir45dGM7veG90IzGmBaJMORcUPbdNfbj3R9XtNbzHU7AmAtZSbmHsUkYyFpTMO7pIIizDlMw-mW34TRcn2MISg11PTGjfm3ScUx5pLc8mpiO-1ui7mS7Q8m9rW1kmvieBIIyn9-sPSO-3EHWauXKxfoMXP2LhmdhqNVuZXNAijGTKcJAxlwwIUOhWIDQMnPg0U5RijyEXoWJckvODdfGQ9Jfz2zUnqDaE6v2hOVh4_Odx96Kjz9_XfAnk7jPvZP0wZmHTX9a_ce_S5v_W9oyDFcvT0-Sk1r9eAFGIjN6Ycs_BRjqPr9kixgQddMlhzoCN_8N9A9MHRUD |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1ZSwMxEB60guiDt1jPPCgoGrpHuo0PIkWt1gvxgPq0ZpNdFaSttiL9a_46J9nEqqBvPm93oJNv58rMNwCrAlMulsiQKs4zygJMUBLFIhrKCjoMDOgzQ-pzdh4d3bDjRrkxAO9uFka3VTqbaAy1akldIy8F6KcjTQ3jlzLbFnGxX9ttP1O9QUrftLp1GjlETtLeG6ZvnZ36Pp71WhDUDq73jqjdMEAlQq-LWRjnKSIQY_DIU-aWKvKSJBTKU5LxzMO_ITEHShDlPBWYCiUsU0x4PlfoCNMQ5Q7CUEWzuOsp9drh5w1GVLYLdblH0Sv7dmAnH9vz9VCMbo7w_SjilH13iv1I98flrPF5tQkYs8EqqebomoSBtDkF424RBLF2YQpGv7AaTsPtJQafVC-tJ3rIr0U6dkceyWmjie61vyfyQbQ6lDyaqkaqiOtGICjzpWcsGXGFDrJerx5cbczAzb_odxYKzVYznQNSCZlIEAACdc248LlkHoJKT4AH2xXBi-A7FcbS0pvrLRtPcZ-YWas9RrXHRu0xK8Lm5zvtnNzjz18vupOJ7YfeifuwLMKWO63-49-lzf8tbQWGEd7xaf38ZAFGAj1zYeo-i1DovrymSxgJdZNlAzkCd_-N8Q-Z9RKd |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Real-time+video+security+system+using+chaos-+improved+advanced+encryption+standard+%28IAES%29&rft.jtitle=Multimedia+tools+and+applications&rft.au=Hafsa%2C+Amal&rft.au=Fradi%2C+Marwa&rft.au=Sghaier%2C+Anissa&rft.au=Malek%2C+Jihene&rft.date=2022-01-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=81&rft.issue=2&rft.spage=2275&rft.epage=2298&rft_id=info:doi/10.1007%2Fs11042-021-11668-4&rft.externalDocID=10_1007_s11042_021_11668_4 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |