{"id":"https://openalex.org/W3193818044","doi":"https://doi.org/10.1155/2021/6518743","title":"BSVMS: Novel Autonomous Trustworthy Scheme for Video Monitoring","display_name":"BSVMS: Novel Autonomous Trustworthy Scheme for Video Monitoring","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3193818044","doi":"https://doi.org/10.1155/2021/6518743","mag":"3193818044"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6518743","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6518743","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6518743.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2021/6518743.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101898193","display_name":"Xuan Wang","orcid":"https://orcid.org/0000-0002-6520-1319"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Wang","raw_affiliation_strings":["School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101419465","display_name":"Jingjing Xu","orcid":"https://orcid.org/0000-0002-2202-3030"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingjing Xu","raw_affiliation_strings":["School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377449","display_name":"Jiaxin Wang","orcid":"https://orcid.org/0000-0003-4423-2543"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaxin Wang","raw_affiliation_strings":["School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084652886","display_name":"Wei Ou","orcid":"https://orcid.org/0000-0002-3230-7563"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Ou","raw_affiliation_strings":["School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078674769","display_name":"Jungyoon Kim","orcid":"https://orcid.org/0000-0002-2396-9514"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]},{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN","KR"],"is_corresponding":true,"raw_author_name":"Jung Yoon Kim","raw_affiliation_strings":["Graduate School of Game, Gachon University, 1342 Seongnamdaero, Sujeong-gu, Seongnam, 461-701 Gyeonggi-do, Republic of Korea","School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China"],"affiliations":[{"raw_affiliation_string":"Graduate School of Game, Gachon University, 1342 Seongnamdaero, Sujeong-gu, Seongnam, 461-701 Gyeonggi-do, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]},{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013350223","display_name":"Wenbao Han","orcid":"https://orcid.org/0000-0001-8955-8489"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbao Han","raw_affiliation_strings":["School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, 570228 Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5078674769","https://openalex.org/A5084652886"],"corresponding_institution_ids":["https://openalex.org/I12832649","https://openalex.org/I20942203"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.0961,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.38681373,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.916153609752655},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.7732797265052795},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7228370308876038},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4130431115627289},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33813583850860596},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33472153544425964}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.916153609752655},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.7732797265052795},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7228370308876038},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4130431115627289},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33813583850860596},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33472153544425964},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/6518743","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6518743","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6518743.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0939a098cbb34e2fac4ced7049aa2fee","is_oa":true,"landing_page_url":"https://doaj.org/article/0939a098cbb34e2fac4ced7049aa2fee","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/6518743","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6518743","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6518743.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3193818044.pdf","grobid_xml":"https://content.openalex.org/works/W3193818044.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1980122784","https://openalex.org/W2013077883","https://openalex.org/W2023280646","https://openalex.org/W2075993593","https://openalex.org/W2142058898","https://openalex.org/W2150781689","https://openalex.org/W2937054116","https://openalex.org/W2987695188","https://openalex.org/W3015615481","https://openalex.org/W3033429809","https://openalex.org/W3090865871","https://openalex.org/W3118879517","https://openalex.org/W3133489250","https://openalex.org/W3134498674","https://openalex.org/W3137672894","https://openalex.org/W3174632475","https://openalex.org/W7014950494"],"related_works":["https://openalex.org/W2076536433","https://openalex.org/W90316445","https://openalex.org/W4327743613","https://openalex.org/W2965447900","https://openalex.org/W3199750033","https://openalex.org/W2374509987","https://openalex.org/W3163373470","https://openalex.org/W3005856188","https://openalex.org/W1898221464","https://openalex.org/W4289783037"],"abstract_inverted_index":{"With":[0],"the":[1,15,79,92,102,113,118,121,125,129,132,160,166,172,189,196,199,214,220,225,227,231,243,257],"continuous":[2],"development":[3],"and":[4,37,87,137,150,201,210,216,230,247,255],"application":[5,135],"of":[6,49,53,63,91,105,120,191,198,213,219],"monitoring":[7,20,28,41,74,93,134,157,168],"technology,":[8],"which":[9,58],"involves":[10],"increasingly":[11],"more":[12],"sensitive":[13],"information,":[14],"global":[16],"demand":[17],"for":[18,184],"video":[19,27,40,73,122,133,156],"systems":[21,42],"has":[22,30],"surged.":[23],"As":[24],"a":[25,71,108,154,180],"result,":[26],"technology":[29],"received":[31],"widespread":[32],"attention":[33],"both":[34],"at":[35],"home":[36],"abroad.":[38],"Traditional":[39],"experience":[43],"security":[44,88,119,173,190,211],"threats,":[45],"with":[46],"differing":[47],"levels":[48],"severity,":[50],"in":[51,60,112,175,224,239],"terms":[52],"attack,":[54],"storage,":[55],"transmission,":[56,177,194],"etc.,":[57],"results":[59,236],"different":[61],"degrees":[62],"damage":[64],"to":[65,100,141,152,187],"users\u2019":[66],"rights.":[67],"Therefore,":[68],"we":[69,95,143,178],"propose":[70],"blockchain\u2010SM\u2010based":[72],"system":[75,241],"called":[76],"BSVMS.":[77],"For":[78],"front\u2010end":[80],"device":[81],"invasion":[82],"risk,":[83,86],"internal":[84],"attack":[85],"storage":[89],"problem":[90,130],"system,":[94,161,200,226],"use":[96,144,179],"commercial":[97,181],"cryptography":[98,182],"algorithms":[99,254],"complete":[101],"encryption":[103,186,215,246],"processing":[104],"images":[106],"through":[107],"visual":[109],"change":[110],"network":[111,176],"imaging":[114],"process,":[115],"thereby":[116],"ensuring":[117],"data":[123,138,192],"from":[124],"source.":[126],"To":[127,170],"address":[128,171],"that":[131,147,238,256],"software":[136],"are":[139,148],"vulnerable":[140],"damage,":[142],"blockchain":[145,228,258],"technologies":[146],"tamper\u2010proof":[149],"traceable":[151],"build":[153],"trustworthy":[155],"system.":[158],"In":[159],"no":[162],"member":[163],"can":[164],"query":[165],"original":[167],"data.":[169],"issues":[174],"algorithm":[183,222,245],"multilayer":[185],"ensure":[188],"during":[193],"guarantee":[195],"confidentiality":[197],"realize":[202],"domestic":[203],"autonomous":[204],"control.":[205],"We":[206],"then":[207],"conduct":[208],"tests":[209],"analysis":[212],"decryption":[217,248],"efficiency":[218,249],"SM4":[221,244],"used":[223,259],"performance,":[229],"overall":[232],"performance.":[233],"The":[234],"experimental":[235],"show":[237],"this":[240],"environment,":[242],"is":[250],"better":[251],"than":[252],"other":[253],"meets":[260],"industry":[261],"standards.":[262]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
