Skip to main content

Application of Chaos in Network Video Security

  • Conference paper
Information Computing and Applications (ICICA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6377))

Included in the following conference series:

Abstract

Network video makes communication much easier. But data security becomes a troublesome issue. Fully using the characteristic of chaotic systems, the embedded system gets designed to enhance the security of network video. The FPGA and uclinux are adopted as the platform. The Qi hyper chaotic, Logistic mapping, Baker mapping and Cat mapping algorithm is applied to video encryption. Combination of on-line and off-line encryption, random encryption and double encryption methods make the security of data stronger. The system has been tested to run a long time and proved to be stable with a high security. As a platform, the system implements the complex algorithms at a very low cost: a 87MHz processor and 10M memory. But it still has the potential to develop more complex algorithms and applications. So the system has a broad prospect both in the area of application and research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Meng, Z., Zhongxin, L., Qinglin, S., Zengqiang, C., Zhuzhi, Y.: Chaos Based Video Compression and Encryption Algorithms. Control Engineering of China 12(5), 482–485 (2005)

    Google Scholar 

  2. Alvarez, G., Li, S.: Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation and Chaos 16(8), 2129–2151 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  3. Mao, Y., Chen, G., Lian, S.: A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps. International Journal of Bifurcation and Chaos 14(10), 3613–3624 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  4. Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A New Chaotic Algorithm For Video Encryption. IEEE Transactions on Consumer Electronics 48(4) (2002)

    Google Scholar 

  5. Wang, Y.-h., Wang, l.-p.: A Blind Digital Watermarking Embedding Technology Based on Chaotic Sequences and DCT. Journal of Hengshui University 12(1), 33–35 (2010)

    Google Scholar 

  6. Lin, J.-q., Si, X.-c., Meng, W.-x., Zhao, J.-y.: Image encryption algorithm based on chaotic system. Application Research of Computers 2, 697–698, 703 (2010)

    Google Scholar 

  7. Liao, X.: New Efficient Algorithm of Image Encryption Based on Combined Chaotic Maps. Journal of Wenzhou University Natural Science 1, 33–40 (2010)

    Google Scholar 

  8. Ye, R.-s., Wu, S.-x.: A 4D Symmetric Chaotic System and Its Application on Image Hiding. Computer Technology and Development 1, 93–96 (2010)

    Google Scholar 

  9. Richard Stevens, W.: Advanced Programming in the UNIX Environment. Posts & Telecom Press, Beijing (2008)

    Google Scholar 

  10. Corbet, J., Rubini, A., Kroab-Hartman, G.: LINUX Device Driver. China Electric Power Press, Beijing (2006)

    Google Scholar 

  11. Yang, H.: Embedded system development of FPGA based on EDK tools. Machinery Industry Press, Beijing (2008)

    Google Scholar 

  12. Xue, X., Ge, Y.: Design Guide on Xilinx ISE9.X PFGA/CPLD. Posts & Telecom Press, Beijing (2007)

    Google Scholar 

  13. Getting Started with the MicroBlaze Development Kit - Spartan-3E 1600E Edition, http://china.xilinx.com/

  14. Embedded Linux/Microcontroller Project, http://www.uclinux.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Z., Tong, J., Chen, Z., Ip, W.H., Chan, C.Y., Yung, K.L. (2010). Application of Chaos in Network Video Security. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds) Information Computing and Applications. ICICA 2010. Lecture Notes in Computer Science, vol 6377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16167-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16167-4_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16166-7

  • Online ISBN: 978-3-642-16167-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics