Chaotic Encryption-Based Network Robot for Indoor Security and Remote Video Monitoring
DOI:
https://doi.org/10.31449/inf.v48i14.6073Abstract
As society develops and living standards improve, people are putting forward higher and higher requirements for their living environment. In order to meet the needs of indoor security, fire security and building automation, intelligent robotics has come into being. Video data under intelligent network remote monitoring is different from traditional data, as video is a kind of data with a large amount of information, highly complex coding and decoding, difficult to process and requires real-time operation. Therefore, it is important to focus on the format characteristics of H.264 when designing the encryption scheme. Due to the heavy computational burden caused by the large amount of video data, it is not possible to encrypt all data when encrypting video data, and at the same time to ensure that the The traditional encryption algorithms, such as DES and RSA, are no longer suitable for video encryption applications in order to ensure that the format specificity and good operability are not compromised. Therefore, the aim of this paper is to design a sufficiently secure and practical video encryption scheme for remote monitoring of network robots based on the H.264 codec standard by introducing a chaotic iterative system, and finally to design and implement an indoor security method for remote monitoring of video technology based on chaotic encryption for network robots with certain practical application value.Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika