Research Article

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment

Figure 5

Sample results of decryption with incorrect keys . Modify the secret keys in α (a), (b), (c), and the decrypted frame using the correct secret key (d).
(a)
(b)
(c)
(d)