Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Research on Video Encryption Technology Based on Cross Coupled Map Lattices System

View through CrossRef
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve the efficiency of video encryption, this paper proposes a multi-link selective video encryption algorithm based on the Cross Coupled Map Lattices system by combining H.264/AVC video coding structure. The algorithm reduces the amount of encrypted data while ensuring encryption security to satisfy the needs of video encryption security and real-time performance. The encryption algorithm’s security and visual encryption effect are analyzed subjectively and objectively. The experimental results show that the encryption scheme has an excellent visual encryption effect and strong attack resistance, the encryption time consumption is low, and the video format remains unchanged. It can be applied to real-time video encryption occasions such as video conferences.</p> <p>&nbsp;</p>
Title: Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Description:
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention.
To improve the efficiency of video encryption, this paper proposes a multi-link selective video encryption algorithm based on the Cross Coupled Map Lattices system by combining H.
264/AVC video coding structure.
The algorithm reduces the amount of encrypted data while ensuring encryption security to satisfy the needs of video encryption security and real-time performance.
The encryption algorithm’s security and visual encryption effect are analyzed subjectively and objectively.
The experimental results show that the encryption scheme has an excellent visual encryption effect and strong attack resistance, the encryption time consumption is low, and the video format remains unchanged.
It can be applied to real-time video encryption occasions such as video conferences.
</p> <p>&nbsp;</p>.

Related Results

Cyclic Lattices, Ideal Lattices and Bounds for the Smoothing Parameter
Cyclic Lattices, Ideal Lattices and Bounds for the Smoothing Parameter
<div>Cyclic lattices and ideal lattices were introduced by Micciancio in \cite{D2}, Lyubashevsky and Micciancio in \cite{L1} respectively, which play an efficient role in Ajt...
Cyclic Lattices, Ideal Lattices and Bounds for the Smoothing Parameter
Cyclic Lattices, Ideal Lattices and Bounds for the Smoothing Parameter
<div>Cyclic lattices and ideal lattices were introduced by Micciancio in \cite{D2}, Lyubashevsky and Micciancio in \cite{L1} respectively, which play an efficient role in Ajt...
Audio and video editing system design based on OpenCV
Audio and video editing system design based on OpenCV
With the rapid development of the Internet, a new carrier for people to perceive the world and communicate with each other - audio and video - is gradually being favoured by the pu...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
COUPLING OSCILLATIONS OF LATTICES OF DIFFERENT DIELECTRIC RESONATORS
COUPLING OSCILLATIONS OF LATTICES OF DIFFERENT DIELECTRIC RESONATORS
Background. The development of many elements of modern communication systems is increasingly based on the use of various types of dielectric resonators (DR). The theory of coupled ...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...

Back to Top