Research Article
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment
Figure 5
Sample results of decryption with incorrect keys . Modify the secret keys in α (a), (b), (c), and the decrypted frame using the correct secret key (d).
(a) |
(b) |
(c) |
(d) |