{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T00:16:02Z","timestamp":1775088962125,"version":"3.50.1"},"reference-count":16,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","funder":[{"name":"The National Key Research and Development Program of China under","award":["2020YFC2004003"],"award-info":[{"award-number":["2020YFC2004003"]}]},{"name":"The National Key Research and Development Program of China under","award":["No. 2020YFC2004002"],"award-info":[{"award-number":["No. 2020YFC2004002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Inter. Net."],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:p> In order to be able to achieve state maintenance, keep historical data of the operation of each system, improve the precision of computer room management, improve work efficiency, reduce the work intensity of computer room managers, and reduce manual errors and potential accidents, this paper combines the Internet of Things technology to construct an image encryption transmission method that can be used for power monitoring. Moreover, this paper constructs a power system intelligent monitoring system based on the Internet of Things, and encrypts relevant data. In addition, this paper proposes a surveillance video encryption algorithm based on foreground and background separation. This video encryption algorithm is different from ordinary video encryption methods. It fully taps the characteristics of the surveillance video taken by a still camera. According to the experimental research results, it can be seen that the power monitoring image encryption transmission system based on the Internet of Things constructed in this paper has good performance in power monitoring image processing, image encryption, image transmission, etc. The evaluation results of the three functional parameters are all above 80%, which have great advantages compared with traditional algorithms. Therefore, the method proposed in this paper has good practical effects. <\/jats:p>","DOI":"10.1142\/s0219265921450146","type":"journal-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T15:42:57Z","timestamp":1649864577000},"source":"Crossref","is-referenced-by-count":4,"title":["Power Monitoring Image Encryption Transmission Method Based on Internet of Things"],"prefix":"10.1142","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5362-5686","authenticated-orcid":false,"given":"Pengfei","family":"Wang","sequence":"first","affiliation":[{"name":"Information and Telecommunication Branch, State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210000, P. R. China"}]},{"given":"Ming","family":"Tang","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Branch, State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210000, P. R. China"}]},{"given":"Haodong","family":"Zou","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Branch, State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210000, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2022,4,12]]},"reference":[{"key":"S0219265921450146BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"S0219265921450146BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-05196-w"},{"key":"S0219265921450146BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09880-9"},{"key":"S0219265921450146BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-021-01854-7"},{"key":"S0219265921450146BIB007","doi-asserted-by":"publisher","DOI":"10.48161\/qaj.v1n2a38"},{"key":"S0219265921450146BIB008","doi-asserted-by":"publisher","DOI":"10.1021\/acsami.1c00402"},{"key":"S0219265921450146BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-020-00739-8"},{"key":"S0219265921450146BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00460-4"},{"issue":"7","key":"S0219265921450146BIB011","first-page":"2414","volume":"15","author":"Kshirsagar P. R.","year":"2021","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"S0219265921450146BIB012","doi-asserted-by":"publisher","DOI":"10.1177\/1545968316680490"},{"key":"S0219265921450146BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/s13755-018-0049-x"},{"issue":"4","key":"S0219265921450146BIB015","first-page":"240","volume":"12","author":"Joyia G. J.","year":"2017","journal-title":"J. Commun."},{"key":"S0219265921450146BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2016.11.002"},{"key":"S0219265921450146BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2018.2844282"},{"key":"S0219265921450146BIB018","doi-asserted-by":"publisher","DOI":"10.1021\/acs.chemrev.8b00719"},{"key":"S0219265921450146BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"}],"container-title":["Journal of Interconnection Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219265921450146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T08:16:25Z","timestamp":1653552985000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219265921450146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,12]]},"references-count":16,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["10.1142\/S0219265921450146"],"URL":"https:\/\/doi.org\/10.1142\/s0219265921450146","relation":{},"ISSN":["0219-2659","1793-6713"],"issn-type":[{"value":"0219-2659","type":"print"},{"value":"1793-6713","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,12]]},"article-number":"2145014"}}