Abstract

Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important. After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection. The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure. This method constitutes a key pool with the three-dimensional Lorenz System, the four-dimensional Cellular Neural Network (CNN) System and the four-dimensional Chen System where the key source system and initial conditions are decided by the plaintext video frame itself. Then, this method optimizes the chaotic sequences to further enhance system security.

Highlights

  • As a kind of real-time communication system relying on image and voice communication, video systems enable geographically dispersed users to gather in one virtual conferencing space as the various information exchange modes through image and voice enable real and visualized exchange of cooperating members, and facilitate participant understanding of conference content (Yang et al, 2014)

  • After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection

  • The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure. This method constitutes a key pool with the three-dimensional Lorenz system, the four-dimensional cellular neural network (CNN) system, and the four-dimensional Chen system where the key source system and initial conditions are decided by the plaintext video frame itself

Read more

Summary

INTRODUCTION

As a kind of real-time communication system relying on image and voice communication, video systems enable geographically dispersed users to gather in one virtual conferencing space as the various information exchange modes through image and voice enable real and visualized exchange of cooperating members, and facilitate participant understanding of conference content (Yang et al, 2014). This paper extracts cryptographic demands from typical video conferencing systems and designs a video conferencing encryption scheme using research in combination with commercial cryptographic algorithm, and by taking full advantage of chaos algorithm. This is done to guarantee the information data security, ensure the sustainable development and secure application of video conferencing. This paper proposes an end-toend encryption scheme for multimedia information in video synergic command systems which studies, combines and designs technologies such as user authentication, end-to-end information encryption protocol, and chaotic encryption algorithm. This implements the video synergic command system and meets various personalized user demands for multimedia information encryption

Research Status
Composition of Video Synergic Command Systems
Cryptographic Key Configuration Design
Encryption Design
Network Access Authentication after Startup and its Process
APPLICATION OF CSK ENCRYPTION ALGORITHM IN VIDEO SYNERGIC COMMAND SYSTEMS
Security Testing
Performance Testing
Testing of Video Encryption and Decryption Condition
SYSTEM SECURITY PERFORMANCE EVALUATION AND DISCUSSION
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call