A chaos-based novel approach to video encryption using dynamic S-box
D Dhingra, M Dua - Multimedia Tools and Applications, 2024 - Springer
Video Encryption is the process of converting the video into an unrecognizable form to
protect it from unauthorized access. This paper proposes a novel video encryption method …
protect it from unauthorized access. This paper proposes a novel video encryption method …
Enhanced Data Security Framework Using Lightweight Cryptography and Multi-Level Encryption
Network security is essential for individuals as well as organizations in the modern day,
since the majority of enterprises and organizations store their data on clouds. Therefore, a …
since the majority of enterprises and organizations store their data on clouds. Therefore, a …
Elasticedge: An intelligent elastic edge framework for live video analytics
H Sun, Q Li, K Sha, Y Yu - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Cloud computing and edge computing models are popularly applied in emerging
applications, such as smart homes, smart parks, and connected autonomous vehicles for …
applications, such as smart homes, smart parks, and connected autonomous vehicles for …
Combined CNN/RNN video privacy protection evaluation method for monitoring home scene violence
J Liu, P Dai, G Han, N Sun - Computers and Electrical Engineering, 2023 - Elsevier
Rapid developments in technology have led to increasing numbers of video surveillance
devices in the home environment. The importance of video privacy protection has spurred …
devices in the home environment. The importance of video privacy protection has spurred …
Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection
Surely surveillance cameras are certainly important in all aspects of life. We have become in
an era where we need to use surveillance cameras everywhere, homes, schools, banks …
an era where we need to use surveillance cameras everywhere, homes, schools, banks …
Security standards for real time video surveillance and moving object tracking challenges, limitations, and future: a case study
C Kumar, S Singh - Multimedia Tools and Applications, 2024 - Springer
Uses of video surveillance (VS) have exponentially increased using the internet as a
platform. Therefore, security issues in such real time videos need to be addressed. Video …
platform. Therefore, security issues in such real time videos need to be addressed. Video …
A format compliant framework for HEVC selective encryption after encoding
B Tang, C Yang, Y Zhang - … on Circuits and Systems for Video …, 2022 - ieeexplore.ieee.org
The security protection of Ultra-High-Definition (UHD) video is facing grand challenges due
to changeable application scenarios. The video business is highly dependent on the video …
to changeable application scenarios. The video business is highly dependent on the video …
A novel chaotic map-based encryption scheme for surveillance videos
D Dhingra, M Dua - Physica Scripta, 2023 - iopscience.iop.org
The widespread use of surveillance cameras has initiated privacy concerns among
individuals being captured by these devices. Due to the limited internal storage capacity …
individuals being captured by these devices. Due to the limited internal storage capacity …
[HTML][HTML] Pixel tampering detection in encrypted surveillance videos on resource-constrained devices
Encryption (naïve/selective) is recommended to secure the recorded visual content;
however, intruders can still manipulate encrypted data. Visually, tampering attacks on …
however, intruders can still manipulate encrypted data. Visually, tampering attacks on …
Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video
In communication, there is a process of transferring information from the sender to the
recipient. The information sent must be the same as the information received. If there are …
recipient. The information sent must be the same as the information received. If there are …