{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:47:44Z","timestamp":1773773264026,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11554-022-01244-w","type":"journal-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T11:06:10Z","timestamp":1661339170000},"page":"1049-1062","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A new hardware architecture of lightweight and efficient real-time video chaos-based encryption algorithm"],"prefix":"10.1007","volume":"19","author":[{"given":"Mahieddine Anouar","family":"Hadjadj","sequence":"first","affiliation":[]},{"given":"Said","family":"Sadoudi","sequence":"additional","affiliation":[]},{"given":"Mohamed Salah","family":"Azzaz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8686-240X","authenticated-orcid":false,"given":"Hichem","family":"Bendecheche","sequence":"additional","affiliation":[]},{"given":"Redouane","family":"Kaibou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"issue":"39","key":"1244_CR1","doi-asserted-by":"publisher","first-page":"29161","DOI":"10.1007\/s11042-020-09448-7","volume":"79","author":"Y Li","year":"2020","unstructured":"Li, Y., Li, Z., Ma, M., Wang, M.: Generation of grid multi-wing chaotic attractors and its application in video secure communication system. Multimed. Tools Appl. 79(39), 29161 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"1244_CR2","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/TMM.2017.2764330","volume":"20","author":"C Long","year":"2017","unstructured":"Long, C., Cao, Y., Jiang, T., Zhang, Q.: Edge computing framework for cooperative video processing in multimedia IoT systems. IEEE Trans. Multimed. 20(5), 1126 (2017)","journal-title":"IEEE Trans. Multimed."},{"issue":"5","key":"1244_CR3","doi-asserted-by":"publisher","first-page":"3377","DOI":"10.1007\/s11276-019-02200-6","volume":"27","author":"H Gao","year":"2021","unstructured":"Gao, H., Duan, Y., Shao, L., Sun, X.: Transformation-based processing of typed resources for multimedia sources in the IoT environment. Wirel. Netw. 27(5), 3377 (2021)","journal-title":"Wirel. Netw."},{"key":"1244_CR4","doi-asserted-by":"crossref","unstructured":"Ignatov, A., Romero, A., Kim, H., Timofte, R., Real-time video super-resolution on smartphones with deep learning, mobile ai,: challenge: Report. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021, 2535\u20132544 (2021)","DOI":"10.1109\/CVPRW53098.2021.00287"},{"issue":"4","key":"1244_CR5","doi-asserted-by":"publisher","first-page":"2801","DOI":"10.1109\/COMST.2020.3006999","volume":"22","author":"A Yaqoob","year":"2020","unstructured":"Yaqoob, A., Bi, T., Muntean, G.M.: A survey on adaptive 360 video streaming: Solutions, challenges and opportunities. IEEE Commun. Surveys Tutor. 22(4), 2801 (2020)","journal-title":"IEEE Commun. Surveys Tutor."},{"issue":"10","key":"1244_CR6","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1080\/10447318.2019.1706288","volume":"36","author":"M Wu","year":"2020","unstructured":"Wu, M., Gao, Q.: Using live video streaming in online tutoring: Exploring factors affecting social interaction. Int. J. Hum. Comput. Interact. 36(10), 964 (2020)","journal-title":"Int. J. Hum. Comput. Interact."},{"issue":"1","key":"1244_CR7","first-page":"189","volume":"15","author":"M Lynch","year":"2020","unstructured":"Lynch, M.: E-Learning during a global pandemic. Asian J. Dist. Educ. 15(1), 189 (2020)","journal-title":"Asian J. Dist. Educ."},{"key":"1244_CR8","doi-asserted-by":"crossref","unstructured":"Cui, C., Zhang, J., Liu, J., Wang, T.: Practical analysis of integrated multimedia technology in medical imaging teaching. J. Phys. Conf. Ser. 1915 (IOP Publishing, 2021), vol. 1915, p. 042075","DOI":"10.1088\/1742-6596\/1915\/4\/042075"},{"key":"1244_CR9","volume-title":"English Teaching and Learning Pedagogies by Songs","author":"GHC Lin","year":"2020","unstructured":"Lin, G.H.C.: English Teaching and Learning Pedagogies by Songs. Movies, Games and Cell Phones, Online Submission (2020)"},{"issue":"4","key":"1244_CR10","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/s00530-020-00680-7","volume":"27","author":"S Khattak","year":"2021","unstructured":"Khattak, S., Jan, S., Ahmad, I., Wadud, Z., Khan, F.Q.: An effective security assessment approach for Internet banking services via deep analysis of multimedia data. Multimed. Syst. 27(4), 733 (2021)","journal-title":"Multimed. Syst."},{"issue":"2","key":"1244_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.001.2000852","volume":"59","author":"F Mehmeti","year":"2021","unstructured":"Mehmeti, F., Felemban, N., Lu, Z., Wheatman, K., Cirincione, G., La Porta, T.F.: IEEE Commun. Mag. 59(2), 50 (2021)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"1244_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MWC.001.1900045","volume":"26","author":"HM Wang","year":"2019","unstructured":"Wang, H.M., Zhang, X., Jiang, J.C.: UAV-involved wireless physical-layer secure communications: Overview and research directions. IEEE Wirel. Commun. 26(5), 32 (2019)","journal-title":"IEEE Wirel. Commun."},{"key":"1244_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, L., Xu, J., Obaidat, MS., Li, X., Vijayakumar, P.: A PUF-based lightweight authentication and key agreement protocol for smart UAV networks. IET Commun. (2021)","DOI":"10.1049\/cmu2.12295"},{"key":"1244_CR14","doi-asserted-by":"crossref","unstructured":"Subero, A.: Embedded systems overview. In: Programming Microcontrollers with Python (Springer, 2021), 77\u2013105","DOI":"10.1007\/978-1-4842-7058-5_3"},{"key":"1244_CR15","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jnca.2015.06.021","volume":"59","author":"C Xiao","year":"2016","unstructured":"Xiao, C., Wang, L., Zhu, M., Wang, W.: A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft. J. Netw. Comput. Appl. 59, 117 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"10","key":"1244_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4211","volume":"33","author":"MS Azzaz","year":"2020","unstructured":"Azzaz, M.S., Tanougast, C., Maali, A., Benssalah, M.: An efficient and lightweight multi-scroll chaos-based hardware solution for protecting fingerprint biometric templates. Int. J. Commun. Syst. 33(10), e4211 (2020)","journal-title":"Int. J. Commun. Syst."},{"key":"1244_CR17","doi-asserted-by":"crossref","unstructured":"Kaibou, R., Azzaz, M.S., Benssalah, M., Teguig, D., Hamil, H., Merah, A., Akrour, M.T.: Real-time FPGA implementation of a secure chaos-based digital crypto-watermarking system in the DWT domain using co-design approach. J. Real Time Image Process. 1\u201317 (2021)","DOI":"10.1007\/s11554-021-01073-3"},{"key":"1244_CR18","unstructured":"Askar, M., Egemen, T.: Design and SystemC Implementation of a Crypto Processor for AES and DES Algorithms. in Information Security and Cryptology Conference with International Participation (Citeseer, 2007)"},{"key":"1244_CR19","doi-asserted-by":"crossref","unstructured":"Spanos, G.A., Maples, T.B.: Performance study of a selective encryption scheme for the security of networked, real-time video, in Computer Communications and Networks, International Conference on (IEEE Computer Society, 1995), 2\u201310","DOI":"10.1109\/ICCCN.1995.540095"},{"issue":"2","key":"1244_CR20","first-page":"81","volume":"2","author":"T Yang","year":"2004","unstructured":"Yang, T.: A survey of chaotic secure communication systems. Int. J. Comput. Cognit. 2(2), 81 (2004)","journal-title":"Int. J. Comput. Cognit."},{"key":"1244_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/179290","volume":"2008","author":"A Massoudi","year":"2008","unstructured":"Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.J.: Overview on selective encryption of image and video: challenges and perspectives. Euras. J. Inf. Secur. 2008, 1 (2008)","journal-title":"Euras. J. Inf. Secur."},{"key":"1244_CR22","doi-asserted-by":"crossref","unstructured":"Ranasinghe, D.C., Cole, P.H.: Confronting security and privacy threats in modern RFID systems, in 2006 Fortieth Asilomar Conference on Signals, Systems and Computers (IEEE, 2006), 2058\u20132064","DOI":"10.1109\/ACSSC.2006.355129"},{"issue":"1","key":"1244_CR23","first-page":"113","volume":"4","author":"R Pakshwar","year":"2013","unstructured":"Pakshwar, R., Trivedi, V.K., Richhariya, V.: A survey on different image encryption and decryption techniques. Int. J. Comput. Sci. Inf. Technol. 4(1), 113 (2013)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"issue":"3","key":"1244_CR24","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract 21(3), 749 (2004)","journal-title":"Chaos Solitons Fract"},{"issue":"08","key":"1244_CR25","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifur. Chaos 16(08), 2129 (2006)","journal-title":"Int. J. Bifur. Chaos"},{"key":"1244_CR26","doi-asserted-by":"crossref","unstructured":"Alvarez, G., Li, S.: A generalized Lorenz system. Commun. Math. Phys. 60(03), (1978)","DOI":"10.1007\/BF01612888"},{"issue":"12","key":"1244_CR27","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.1142\/S021812740200631X","volume":"12","author":"J L\u00fc","year":"2002","unstructured":"L\u00fc, J., Chen, G., Cheng, D., Celikovsky, S.: Bridge the gap between the Lorenz system and the Chen system. Int. J. Bifur. Chaos 12(12), 2917 (2002)","journal-title":"Int. J. Bifur. Chaos"},{"key":"1244_CR28","doi-asserted-by":"crossref","unstructured":"Ioannidis, Y.: The history of histograms (abridged). In Proceedings 2003 VLDB Conference (Elsevier, 2003), 19\u201330","DOI":"10.1016\/B978-012722442-8\/50011-2"},{"issue":"1","key":"1244_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-020-00301-7","volume":"21","author":"FS Hasan","year":"2020","unstructured":"Hasan, F.S., Saffo, M.A.: FPGA hardware co-simulation of image encryption using stream cipher based on chaotic maps. Sens. Imaging 21(1), 1 (2020)","journal-title":"Sens. Imaging"},{"key":"1244_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110044","volume":"139","author":"X Peng","year":"2020","unstructured":"Peng, X., Zeng, Y.: Image encryption application in a system for compounding self-excited and hidden attractors. Chaos Solitons Fract 139, 110044 (2020)","journal-title":"Chaos Solitons Fract"},{"key":"1244_CR31","doi-asserted-by":"crossref","unstructured":"Hafsa, A., Gafsi, M., Malek, J., Machhout, M.: FPGA implementation of improved security approach for medical image encryption and decryption. Sci. Program. 2021 (2021)","DOI":"10.1155\/2021\/6610655"},{"issue":"9","key":"1244_CR32","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1109\/TCSVT.2017.2703946","volume":"28","author":"S Chen","year":"2017","unstructured":"Chen, S., Yu, S., L\u00fc, J., Chen, G., He, J.: Design and FPGA-based realization of a chaotic secure video communication system. IEEE Trans. Circ. Syst. Video Technol. 28(9), 2359 (2017)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"1244_CR33","doi-asserted-by":"crossref","unstructured":"Azzaz, M., Krimil, M., Labiod, F., Kadir, A., Teguig, D.: FPGA hardware design of a unified chaotic system for CTRNG. in 2018 International Conference on Signal, Image, Vision and their Applications (SIVA) (IEEE, 2018), 1\u20134","DOI":"10.1109\/SIVA.2018.8661042"},{"key":"1244_CR34","doi-asserted-by":"crossref","unstructured":"Elrefaey, A., Sarhan, A., El-Shennawy, N.M.: Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU. J. Real-Time Image Process 1\u201310 (2021)","DOI":"10.1007\/s11554-020-01064-w"},{"issue":"05","key":"1244_CR35","doi-asserted-by":"publisher","first-page":"2050075","DOI":"10.1142\/S0218127420500753","volume":"30","author":"B Chen","year":"2020","unstructured":"Chen, B., Yu, S., Chen, P., Xiao, L., L\u00fc, J.: Design and virtex-7-based implementation of video chaotic secure communications. Int. J. Bifur. Chaos 30(05), 2050075 (2020)","journal-title":"Int. J. Bifur. Chaos"},{"key":"1244_CR36","doi-asserted-by":"crossref","unstructured":"X.\u00a0Zhang, S.\u00a0Yu, P.\u00a0Chen, J.\u00a0L\u00fc, J.\u00a0He, Z.\u00a0Lin, Design and ARM-embedded implementation of a chaotic secure communication scheme based on H. 264 selective encryption. Nonlinear Dyn. 89(3), 1949 (2017)","DOI":"10.1007\/s11071-017-3563-5"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-022-01244-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-022-01244-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-022-01244-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T13:41:05Z","timestamp":1666791665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-022-01244-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,24]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["1244"],"URL":"https:\/\/doi.org\/10.1007\/s11554-022-01244-w","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,24]]},"assertion":[{"value":"22 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}