{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:11Z","timestamp":1750309571419,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711642","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"146-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Real-Time Secure Video Streaming System Based on FPGA and CUDA Technology"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8224-6517","authenticated-orcid":false,"given":"Ziyang","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4451-6343","authenticated-orcid":false,"given":"Zongxia","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6220-4119","authenticated-orcid":false,"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4196-7858","authenticated-orcid":false,"given":"Haoran","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9645-3539","authenticated-orcid":false,"given":"Jingxuan","family":"Fan","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3802-402X","authenticated-orcid":false,"given":"Chang","family":"Ren","sequence":"additional","affiliation":[{"name":"The 6th Research Institute of China Electronics Corporation, China Electronics Corporation, Bejing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"R.\u00a0Mirajkar N.\u00a0Sable D.\u00a0Palve et\u00a0al. Advanced encryption and decryption techniques for video protection. In 2023 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) pages 1\u20135 New Raipur India 2023.","DOI":"10.1109\/ICBDS58040.2023.10346581"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Q.\u00a0Zhang. An overview and analysis of hybrid encryption: The combination of symmetric encryption and asymmetric encryption. In 2021 2nd International Conference on Computing and Data Science (CDS) pages 616\u2013622 Stanford CA USA 2021.","DOI":"10.1109\/CDS52072.2021.00111"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"S.\u00a0Qiu and G.\u00a0Bai. Power analysis of a fpga implementation of sm4. In Fifth International Conference on Computing Communications and Networking Technologies (ICCCNT) pages 1\u20136 Hefei China 2014.","DOI":"10.1109\/ICCCNT.2014.6963131"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"S.\u00a0Ibrahim A.\u00a0M. Abbas A.\u00a0A. Alharbi and M.\u00a0A. Albahar. A new 12-bit chaotic image encryption scheme using a 12 \u00d7 12 dynamic s-box. IEEE Access 12:37631\u201337642 2024.","DOI":"10.1109\/ACCESS.2024.3374218"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"T.\u00a0K. Battula H.\u00a0Neerukattu and A.\u00a0Kukkala. Drpe image encryption with watermarking using 2d-frft and its invariance property: A fusion-based hybrid approach. In 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN) pages 17\u201322 Dhulikhel Nepal 2024.","DOI":"10.1109\/ICIPCN63822.2024.00012"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"S.\u00a0S. Lv B.\u00a0Li X.\u00a0Chen et\u00a0al. High-performance optimization of sm4-gcm based on fpga. In 2021 International Conference on Advanced Computing and Endogenous Security pages 1\u20135 Nanjing China 2022.","DOI":"10.1109\/IEEECONF52377.2022.10013330"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"L.\u00a0Li F.\u00a0Yang Y.\u00a0Pan et\u00a0al. An implementation method for sm4-gcm on fpga. In 2017 IEEE 2nd Advanced Information Technology Electronic and Automation Control Conference (IAEAC) pages 1921\u20131925 Chongqing China 2017.","DOI":"10.1109\/IAEAC.2017.8054348"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Zhou J.\u00a0Zhang Liu et\u00a0al. Video encryption transmission in gcm mode based on sm4 algorithm. In 13th International Conference on Computer Engineering and Networks. CENet 2023. Lecture Notes in Electrical Engineering vol 1125. Springer Singapore 2023.","DOI":"10.1007\/978-981-99-9239-3_15"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"A.\u00a0Hafsa M.\u00a0Fradi A.\u00a0Sghaier et\u00a0al. Real-time video security system using chaos-improved advanced encryption standard (iaes). Multimed Tools Appl 81:2275\u20132298 2022.","DOI":"10.1007\/s11042-021-11668-4"},{"key":"e_1_3_3_1_11_2","unstructured":"Jia-Qi Zhai Bin Li Qing-Lei Zhou et\u00a0al. Implementation of fpga-based high-performance and scalable sm4-gcm algorithm. Computer Science 49(10):74\u201382 2022."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"X.\u00a0Ma M.\u00a0Li H.\u00a0Wang et\u00a0al. Design and implementation of video image encryption system based on fpga. In 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE) pages 68\u201372 Zhangjiajie China 2012.","DOI":"10.1109\/CSAE.2012.6272910"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"H.\u00a0Xiao J.\u00a0Xia G.\u00a0Tang et\u00a0al. Design of encrypted secure wireless video real-time transmission and storage system based on 5g network. In 2022 IEEE 11th Data Driven Control and Learning Systems Conference (DDCLS) pages 238\u2013243 Chengdu China 2022.","DOI":"10.1109\/DDCLS55054.2022.9858430"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"D.\u00a0M. Dumbere and N.\u00a0J. Janwe. Video encryption using aes algorithm. In Second International Conference on Current Trends In Engineering and Technology - ICCTET 2014 pages 332\u2013337 Coimbatore India 2014.","DOI":"10.1109\/ICCTET.2014.6966311"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"J.\u00a0Zheng and Q.\u00a0Zeng. An image encryption algorithm using a dynamic s-box and chaotic maps. Appl Intell 52:15703\u201315717 2022.","DOI":"10.1007\/s10489-022-03174-3"}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:19:14Z","timestamp":1750295954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":14,"alternative-id":["10.1145\/3711618.3711642","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711642","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}