Article Preview
Top1. Introduction
As a kind of real-time communication system relying on image and voice communication, video systems enable geographically dispersed users to gather in one virtual conferencing space as the various information exchange modes through image and voice enable real and visualized exchange of cooperating members, and facilitate participant understanding of conference content (Yang et al., 2014). At present, video systems have been gradually developing in the directions of multi-network cooperation, high definition quality, development and intelligence. Video synergic command and dispatch systems can be deployed in public networks or private networks, and are broadly applied in cities' emergency responses, environmental protection, safety supervision, digital city management, public security, electric power and other industries. Particularly for public security and emergency management departments, video command and dispatch systems have become essential communication safeguard measures for large-scale security activities and emergency rescue. Especially in the prevention and control of COVID-19 outbreak in the beginning of 2020, video synergic command systems played a crucial role in areas of teleconference, rescue command, video monitoring command, telemedicine and enterprise work resumption. In the application of video systems, video content may concern state secrets, military intelligence, business secrets and private information. Any leakage of such sensitive information will lead to huge safety risks. Therefore, this paper extracts cryptographic demands from typical video conferencing systems and designs a video conferencing encryption scheme using research in combination with commercial cryptographic algorithm, and by taking full advantage of chaos algorithm. This is done to guarantee the information data security, ensure the sustainable development and secure application of video conferencing. This paper proposes an end-to-end encryption scheme for multimedia information in video synergic command systems which studies, combines and designs technologies such as user authentication, end-to-end information encryption protocol, and chaotic encryption algorithm. This implements the video synergic command system and meets various personalized user demands for multimedia information encryption.