Security standards for real time video surveillance and moving object tracking challenges, limitations, and future: a case study

C Kumar, S Singh - Multimedia Tools and Applications, 2024 - Springer
Uses of video surveillance (VS) have exponentially increased using the internet as a
platform. Therefore, security issues in such real time videos need to be addressed. Video …

LFSS-KF: lightweight fast real-time security standards with key fusion for surveillance videos

C Kumar, S Singh - The Imaging Science Journal, 2022 - Taylor & Francis
Uses of video surveillance (VS) have exponentially increased using the internet as a
platform. Security concerns related to the transmission of videos must be addressed. Even …

[PDF][PDF] Secure image encryption scheme using chaotic maps and rc4 algorithm

R Mohammed, LM Jawad - Solid State Technology, 2020 - researchgate.net
Today, the wide exchange of data in both forms of texts and images over multimedia
applications creates a significant need to develop encryption techniques that can protect the …

A new fog based security strategy (FBS2) for reliable image transmission

SA Hussein, AI Saleh, HED Mostafa - Journal of Ambient Intelligence and …, 2020 - Springer
Fog computing has become a fast intermediate between the cloud and the internet of things
(IOT) devices. So, the communication channel between the fog and IOT devices must be …

An Improved RC4 Algorithm Based on Multi Chaotic Map for Image Encryption

R Munir - 2023 IEEE 8th International Conference on Recent …, 2023 - ieeexplore.ieee.org
RC4 algorithm is a famous stream cipher. It could be used to encrypt images quickly and
efficient. However, the RC4 has been proved has some drawbacks, therefore it is …

[PDF][PDF] A new technique for determining region of interest in selective video protection approach

RM Alhasany, LM Jawad - Iraqi Journal of Information and Communication …, 2021 - iasj.net
Today, the use of video communication in real-time applications is rising at a rapid rate and
most of these videos require secure transmissions like surveillance, video conferencing …

An Enhanced Hybrid Chaotic Technique for Protecting Medical Images.

MM Eid, SA Hussien - Journal of Cybersecurity & Information …, 2022 - search.ebscohost.com
Medical data has attracted much interest; a quick, lossless, and secure cryptosystem is
required for saving and transferring images over open networks while maintaining the …

Implementation of Discrete Cosine Transform and Permutation-Substitution Scheme Based on Henon Chaotic Map for Images

A Lius, IA Pardosi, H Gohzali - 2022 Seventh International …, 2022 - ieeexplore.ieee.org
The use of images from the internet that are not obtained from their creators is a copyright
infringement. Illegal access to confidential images can be detrimental to the owner of the …

Securing Digital Images using Stream Cipher and MDS Matrix

A Gaffar, AB Joshi, D Kumar - SN Computer Science, 2021 - Springer
This is an improved and extended version of the paper presented in CVIP 2020 conference.
Stream ciphers are extensively used over a wide range of applications including security of …

Using the Chaotic to Improve the RC4 Algorithm

NM Hussein, NM Mohammed - International Research Journal …, 2023 - search.proquest.com
Image encryption plays a crucial role in ensuring the security and confidentiality of digital
image data. This study explores an image encryption approach that employs the RC4 …