Abstract
Network video makes communication much easier. But data security becomes a troublesome issue. Fully using the characteristic of chaotic systems, the embedded system gets designed to enhance the security of network video. The FPGA and uclinux are adopted as the platform. The Qi hyper chaotic, Logistic mapping, Baker mapping and Cat mapping algorithm is applied to video encryption. Combination of on-line and off-line encryption, random encryption and double encryption methods make the security of data stronger. The system has been tested to run a long time and proved to be stable with a high security. As a platform, the system implements the complex algorithms at a very low cost: a 87MHz processor and 10M memory. But it still has the potential to develop more complex algorithms and applications. So the system has a broad prospect both in the area of application and research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Meng, Z., Zhongxin, L., Qinglin, S., Zengqiang, C., Zhuzhi, Y.: Chaos Based Video Compression and Encryption Algorithms. Control Engineering of China 12(5), 482–485 (2005)
Alvarez, G., Li, S.: Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation and Chaos 16(8), 2129–2151 (2006)
Mao, Y., Chen, G., Lian, S.: A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps. International Journal of Bifurcation and Chaos 14(10), 3613–3624 (2004)
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A New Chaotic Algorithm For Video Encryption. IEEE Transactions on Consumer Electronics 48(4) (2002)
Wang, Y.-h., Wang, l.-p.: A Blind Digital Watermarking Embedding Technology Based on Chaotic Sequences and DCT. Journal of Hengshui University 12(1), 33–35 (2010)
Lin, J.-q., Si, X.-c., Meng, W.-x., Zhao, J.-y.: Image encryption algorithm based on chaotic system. Application Research of Computers 2, 697–698, 703 (2010)
Liao, X.: New Efficient Algorithm of Image Encryption Based on Combined Chaotic Maps. Journal of Wenzhou University Natural Science 1, 33–40 (2010)
Ye, R.-s., Wu, S.-x.: A 4D Symmetric Chaotic System and Its Application on Image Hiding. Computer Technology and Development 1, 93–96 (2010)
Richard Stevens, W.: Advanced Programming in the UNIX Environment. Posts & Telecom Press, Beijing (2008)
Corbet, J., Rubini, A., Kroab-Hartman, G.: LINUX Device Driver. China Electric Power Press, Beijing (2006)
Yang, H.: Embedded system development of FPGA based on EDK tools. Machinery Industry Press, Beijing (2008)
Xue, X., Ge, Y.: Design Guide on Xilinx ISE9.X PFGA/CPLD. Posts & Telecom Press, Beijing (2007)
Getting Started with the MicroBlaze Development Kit - Spartan-3E 1600E Edition, http://china.xilinx.com/
Embedded Linux/Microcontroller Project, http://www.uclinux.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Z., Tong, J., Chen, Z., Ip, W.H., Chan, C.Y., Yung, K.L. (2010). Application of Chaos in Network Video Security. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds) Information Computing and Applications. ICICA 2010. Lecture Notes in Computer Science, vol 6377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16167-4_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-16167-4_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16166-7
Online ISBN: 978-3-642-16167-4
eBook Packages: Computer ScienceComputer Science (R0)