Matrix Models of Cryptographic Transformations of Video Images Transmitted From Aerial-Mobile Robotic Systems

Matrix Models of Cryptographic Transformations of Video Images Transmitted From Aerial-Mobile Robotic Systems

Vladimir G. Krasilenko, Alexander Lazarev, Diana Nikitovich
ISBN13: 9781522599241|ISBN10: 152259924X|ISBN13 Softcover: 9781522599258|EISBN13: 9781522599265
DOI: 10.4018/978-1-5225-9924-1.ch005
Cite Chapter Cite Chapter

MLA

Krasilenko, Vladimir G., et al. "Matrix Models of Cryptographic Transformations of Video Images Transmitted From Aerial-Mobile Robotic Systems." Control and Signal Processing Applications for Mobile and Aerial Robotic Systems, edited by Oleg Sergiyenko, et al., IGI Global, 2020, pp. 170-214. https://doi.org/10.4018/978-1-5225-9924-1.ch005

APA

Krasilenko, V. G., Lazarev, A., & Nikitovich, D. (2020). Matrix Models of Cryptographic Transformations of Video Images Transmitted From Aerial-Mobile Robotic Systems. In O. Sergiyenko, M. Rivas-Lopez, W. Flores-Fuentes, J. Rodríguez-Quiñonez, & L. Lindner (Eds.), Control and Signal Processing Applications for Mobile and Aerial Robotic Systems (pp. 170-214). IGI Global. https://doi.org/10.4018/978-1-5225-9924-1.ch005

Chicago

Krasilenko, Vladimir G., Alexander Lazarev, and Diana Nikitovich. "Matrix Models of Cryptographic Transformations of Video Images Transmitted From Aerial-Mobile Robotic Systems." In Control and Signal Processing Applications for Mobile and Aerial Robotic Systems, edited by Oleg Sergiyenko, et al., 170-214. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9924-1.ch005

Export Reference

Mendeley
Favorite

Abstract

In this chapter, the authors consider the need and relevance of cryptographic transformation of images and video files that are transmitted from unmanned aircraft, airborne robots. The authors propose and consider new multifunctional matrix-algebraic models of cryptographic image transformations, the variety of matrix models, including block parametrical and matrix affine permutation ciphers. The authors show the advantages of the cryptographic models, such as adaptability to various formats, multi-functionality, ease of implementation on matrix parallel structures, interchangeability of iterative procedures and matrix exponentiation modulo, ease of selection, and control of cryptographic transformation parameters. The simulation results of the proposed algorithms and procedures for the direct and inverse transformation of images with the aim of masking them during transmission are demonstrated and discussed in this chapter. The authors evaluate the effectiveness and implementation reliability of matrix-algebraic models of cryptographic image transformations.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.