Reference Hub3
Application of CSK Encryption Algorithm in Video Synergic Command Systems

Application of CSK Encryption Algorithm in Video Synergic Command Systems

Lele Qin, Guojuan Zhang, Li You
Copyright: © 2022 |Volume: 34 |Issue: 2 |Pages: 18
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781799893257|DOI: 10.4018/JOEUC.20220301.oa1
Cite Article Cite Article

MLA

Qin, Lele, et al. "Application of CSK Encryption Algorithm in Video Synergic Command Systems." JOEUC vol.34, no.2 2022: pp.1-18. http://doi.org/10.4018/JOEUC.20220301.oa1

APA

Qin, L., Zhang, G., & You, L. (2022). Application of CSK Encryption Algorithm in Video Synergic Command Systems. Journal of Organizational and End User Computing (JOEUC), 34(2), 1-18. http://doi.org/10.4018/JOEUC.20220301.oa1

Chicago

Qin, Lele, Guojuan Zhang, and Li You. "Application of CSK Encryption Algorithm in Video Synergic Command Systems," Journal of Organizational and End User Computing (JOEUC) 34, no.2: 1-18. http://doi.org/10.4018/JOEUC.20220301.oa1

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important. After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection. The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure. This method constitutes a key pool with the three-dimensional Lorenz System, the four-dimensional Cellular Neural Network (CNN) System and the four-dimensional Chen System where the key source system and initial conditions are decided by the plaintext video frame itself. Then, this method optimizes the chaotic sequences to further enhance system security.