期刊文献+

视频监控系统安全传输复合加密算法设计 被引量:4

Design of Compound Encryption Algorithm for Secure Transmission in Surveillance Video System
下载PDF
导出
摘要 监控系统应用广泛,但其自身存在安全漏洞,需要修补和完善。以现有的硬件处理能力和网络架构,为保证视频传输和转储安全,且尽量控制码流生成时延与冗余度,在系统通信建立阶段,引入连续的身份验证算法实现前后端的可靠连接;在数据传输阶段利用改进高效的指数logistic混沌和RC6对称加密算法实现码流的安全传输。通过实验验证加密安全效果与码流加密的功效性,结果表明,复合加密手段可以在保证监控通信效率的前提下满足安全传输要求。 In view of extensive applications of surveillance video,it is necessary to take measures to repair and meliorate varieties of security loopholes immediately.With the current hardware processing capacity and network architecture,in order to ensure the security of video transmission and storage,and control the time delay and redundancy of code stream as far as possible,a continuous authentication algorithm is introduced to realize the reliable connection between the foreground and background terminals in the communication establishment stage.And then the efficiently improved exponential logistic chaos and RC6 symmetric encryption algorithm are used to realize the secure transmission of the code stream.Finally,the experiments verifies the efficiency of encryption security and stream encryption,and chooses reasonable configuration parameters.The results show that the security transmission can be fulfilled by the compound encryption algorithm on the premise of ensuring the efficiency of surveillance video communication.
作者 陶槊 王晓芳 陈滨 TAO Shuo;WANG Xiaofang;CHEN Bin(Electronic Information Department,Hefei Science and Technology College,Hefei 231201,China)
出处 《安庆师范大学学报(自然科学版)》 2021年第2期37-43,共7页 Journal of Anqing Normal University(Natural Science Edition)
基金 安徽省省级教学团队(2018jxtd007) 安徽省教育厅自然科学研究重点项目(KJ2018A0975)。
关键词 监控安全 身份验证 混沌算法 RC6 surveillance video security bilateral certification chaotic algorithm RC6
  • 相关文献

参考文献7

二级参考文献33

  • 1魏树和,王丽萍.公钥基础设施的关键技术[J].情报杂志,2004,23(8):67-69. 被引量:1
  • 2王兴元,骆超.二维Logistic映射的动力学分析(英文)[J].软件学报,2006,17(4):729-739. 被引量:5
  • 3蔡勉,王亚军,常伟华,唐峰.一种基于H.264的视频加密算法研究[J].信息安全与通信保密,2007,29(7):92-94. 被引量:4
  • 4刘建东,付秀丽.基于耦合帐篷映射的时空混沌单向Hash函数构造[J].通信学报,2007,28(6):30-38. 被引量:27
  • 5LEE Tianfu. Enhancing the security of password authenticated key agreement protocols based on chaotic maps[J]. Information Sciences, 2015, 290(1): 63-71. doi: 10.1016/j.ins.2014.08.041.
  • 6TONG Xiaojun. Design of an image encryption scheme based on a multiple chaotic map[J]. Communications in Nonlinear Science and Numerical Simulation, 2013, 18(7): 1725-1733. doi:10.1016/j.asoc.2015.08.008.
  • 7ZHENG Pan, MU ChunLai, HU Xuegang, et al. Boundedness of solutions in a chemotaxis system with nonlinear sensitivity and logistic source[J]. Journal of Mathematical Analysis and Applications, 2015, 424(1): 509-522. doi: 10.1016/ j.jmaa.2014.11.031.
  • 8WANG Mingxin. The diffusive logistic equation with a free boundary and sign-changing coefficient[J]. Journal of Differential Equations, 2015, 258(4): 1252-1266. doi:10.1016/ j.jde.2014.10.022.
  • 9HUA Zhongyun, ZHOU Yicong, PUN Chiman, et al. 2D sine logistic modulation map for image encryption[J]. Information Sciences, 2015, 297(1): 80-94. doi: 10.1016/j.ins.2014.11.018.
  • 10王兴元,王明军.二维Logistic映射的混沌控制[J].物理学报,2008,57(2):731-736. 被引量:26

共引文献176

同被引文献46

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部