Application of CSK Encryption Algorithm in Video Synergic Command Systems

Application of CSK Encryption Algorithm in Video Synergic Command Systems

Lele Qin, Guojuan Zhang, Li You
Copyright: © 2022 |Pages: 18
DOI: 10.4018/JOEUC.20220301.oa1
Article PDF Download
Open access articles are freely available for download

Abstract

Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important. After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection. The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure. This method constitutes a key pool with the three-dimensional Lorenz System, the four-dimensional Cellular Neural Network (CNN) System and the four-dimensional Chen System where the key source system and initial conditions are decided by the plaintext video frame itself. Then, this method optimizes the chaotic sequences to further enhance system security.
Article Preview
Top

1. Introduction

As a kind of real-time communication system relying on image and voice communication, video systems enable geographically dispersed users to gather in one virtual conferencing space as the various information exchange modes through image and voice enable real and visualized exchange of cooperating members, and facilitate participant understanding of conference content (Yang et al., 2014). At present, video systems have been gradually developing in the directions of multi-network cooperation, high definition quality, development and intelligence. Video synergic command and dispatch systems can be deployed in public networks or private networks, and are broadly applied in cities' emergency responses, environmental protection, safety supervision, digital city management, public security, electric power and other industries. Particularly for public security and emergency management departments, video command and dispatch systems have become essential communication safeguard measures for large-scale security activities and emergency rescue. Especially in the prevention and control of COVID-19 outbreak in the beginning of 2020, video synergic command systems played a crucial role in areas of teleconference, rescue command, video monitoring command, telemedicine and enterprise work resumption. In the application of video systems, video content may concern state secrets, military intelligence, business secrets and private information. Any leakage of such sensitive information will lead to huge safety risks. Therefore, this paper extracts cryptographic demands from typical video conferencing systems and designs a video conferencing encryption scheme using research in combination with commercial cryptographic algorithm, and by taking full advantage of chaos algorithm. This is done to guarantee the information data security, ensure the sustainable development and secure application of video conferencing. This paper proposes an end-to-end encryption scheme for multimedia information in video synergic command systems which studies, combines and designs technologies such as user authentication, end-to-end information encryption protocol, and chaotic encryption algorithm. This implements the video synergic command system and meets various personalized user demands for multimedia information encryption.

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing