Feb. 16, 2023, 2:10 a.m. | Dong Jiang, Zhen Yuan, Wen-xin Li, Liang-liang Lu

cs.CR updates on arXiv.org arxiv.org

Due to the strong correlation between adjacent pixels, most image encryption
schemes perform multiple rounds of confusion and diffusion to protect the image
against attacks. Such operations, however, are time-consuming, cannot meet the
real-time requirements of video encryption. Existing works, therefore, realize
video encryption by simplifying the encryption process or encrypting specific
parts of video frames, which results in lower security compared to image
encryption. To solve the problem, this paper proposes a real-time chaotic video
encryption strategy based on …

attacks consuming correlation encryption multithreaded operations process protect requirements results security video

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens