The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, an improved video encryption method based on coupled logistic chaotic map is proposed. In it, the method adopts coupled chaotic logistic maps as the key-stream generator to encrypt the DCT (Discrete Cosine Transform) coefficients of the video frame. In the whole process, the new method can provide the pseudo-random sequence with good randomness. Therefore, these systems are suitable...
Video encryption is an important field. It has been recently rapidly used in many multimedia systems. The proposed method is focusing on H.264/AVC [1] [2] video coding standard. Several encryption algorithms are based on intra frame/slice had been utilized. The drawbacks of previously used algorithms is that they are vulnerable to known plaintext attack, the increase of stream size, they can't handle...
Cloud storage is an important service of cloud computing, which offers services for data owners to host their data in the cloud. But cloud computing also brings new and challenging security threats to the outsourced data. In order to regain security assurances and access control in the cloud storage, we analyzes the access control algorithm of Ciphertext-policy attribute-based encryption. In this...
With the development of Internet, people transmit a large number of digital image every day on the Internet. At the same time, people also begin gradually focusing on the digital image data transmission security issues. First of all, this paper introduces some common image encryption algorithm. Secondly, focusing on the chaotic image encryption technology and focusing on the three-dimensional mapping...
Key management is very important for Wireless Sensor Networks' (WSNs) security. Many key management protocols have been proposed recently. However, most of them assume that the area which nodes monitored is equal security, and the probability of nodes being compromised to be the same for every node. In some application environments(e.g. in battle field), the probability of nodes being compromised...
This paper introduces a tunnel procedure based on the virtual network card. The data through the tunnel are encrypted by using the open source library OpenSSL. Through this program we can implement an intelligent home control center VPN system base on Android that can protect the information which collected by wireless sensors at home on the Internet.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.