Introduction
In recent years, with the development of network technology and multimedia technology, multimedia data, especially video data, are used more and more widely in human society. Some multimedia data applied in entertainment, politics, economics, militaries, industries or education, etc., are necessary to be protected by providing confidentiality, integrity, and ownership or identity. To protect video contents, cryptology, which appears to be an effective way for information security, has been employed in many practical applications[1][2][3]. However, traditional ciphers like DES [4], IDEA [5], RSA[6] and AES[7], are often used for text or binary data, while not suitable for direct video encryption because of the following reasons.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Lian, S.: Multimedia Content Encryption: Techniques and Applications. Auerbach Publication, Taylor & Francis Group (2008)
Lian, S., Zhang, Y.: Handbook of research on secure multimedia distribution. IGI Global (formerly Idea Group, Inc.), Hershey, Pennsylvania (2009)
Lian, S., Wang, Z.: Compare of Several Wavelet Coefficient Confusion Methods Applied in Multimedia Encryption. In: Proceedings of the 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2003), pp. 372–376. IEEE Computer Society, Shanghai (2003)
Tuchman, W.: A brief history of the data encryption standard. ACM Press, Addison-Wesley Publishing Co., New York (1997)
Dang, P.P., Chau, P.M.: Implementation IDEA algorithm for image encryption. In: Mathematics and Applications of Data/Image Coding, Compression, and Encryption III. Proceedings of SPIE, vol. 4122, pp. 1–9 (2000)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms, 2nd edn. MIT Press, McGraw-Hill, Cambridge (2001)
Zeghid, M., Machhout, M., Khriji, L., Baganne, A., et al.: A modified AES based algorithm for image encryption. International Journal of Computer Science and Engineering 1(1), 70–75 (2007)
Furht, B., Muharemagic, E., Socek, D.: Multimedia encryption and watermarking. Springer, Heidelberg (2005)
Ballest, A.M.: Real-time pay-per-view of protected multimedia content v:2.0. Ph.D.Dissertation, Universitat Polit‘ecnica de Catalunya, Barcelona (2004)
Devaney, R.L.: An introduction to chaotic dynamical systems, 2nd edn. Westview Press, San Francisco (2003)
Alligood, K.T., Sauer, T., Yorke, J.A.: Chaos: an introduction to dynamical systems. Springer, Heidelberg (1997)
Yang, T., Wu, C.W., Chua, L.O.: Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 44, 469–472 (1997)
Solak, E.: Cryptanalysis of observer based discrete-time chaotic encryption schemes. International Journal of Bifurcation and Chaos 15(2), 653–658 (2005)
He, J., Qian, H., Zhou, Y., Li, Z.: Cryptanalysis and improvement of a block cipher based on multiple chaotic systems. Mathematical Problems in Engineering 2010, 1–14 (2010)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Breaking two secure communication systems based on chaotic masking. IEEE Transaction on Circuit and SystemsII: Express Briefs 51, 505–506 (2004)
Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, Heidelberg (2009)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16, 2129–2151 (2006)
Lian, S., Sun, J., Liu, G., Wang, Z.: Efficient video encryption scheme based on advanced video coding. Multimed. Tools Appl. 38, 75–89 (2008)
Gschwandtner, M., Uhl, A., Wild, P.: Transmission error and compression robustness of 2D chaotic map image encryption schemes. EURASIP Journal on Information Security 2007, 1–16 (2007)
Lin, C.F., Chung, C.H., Chen, Z.L., et al.: A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. Wseas Transactions on Systems 7(2), 49–55 (2008)
Li, Y., Cai, M.: H.264-based multiple security levels net video encryption scheme. In: Proceedings of International Conference on Electronic Computer Technology, pp. 8–11. IEEE press, Macau (2009)
Rohwer, K., Krout, T.: Multiple levels of security in support of highly mobile tactical internets-ELB ACTD. In: Proceedings of Military Communications Conference on Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 81–86. IEEE press, McLean (2001)
Chariglione, L.: MPEG and Multimedia Communications. IEEE Transactions on Circuits and Systems for Video Technology 7(1), 5–18 (1997)
Srinivasan, U., Pfeiffer, S., Nepal, S., Lee, M., Gu, L., Barrass, S.: A survey of MPEG-1 audio, video and semantic analysis techniques. Multimedia Tools and Applications 27(1), 105–141 (2005)
Kleihorst, R.P., Vander Werf, A., Bruls, W.H.A., Verhaegh, W.F.J., Waterlander, E.: MPEG2 video encoding in consumer electronics. Journal of Vlsi Signal Processing Systems 15, 5–20 (1997)
Pan, D.: A tutorial on mpeg/audio compression. IEEE MultiMedia 2, 60–74 (1995)
Richardson Iain, E.G.: H.264 and MPEG-4 video compression: video coding for next-generation multimedia. John Wiley & Sons, Ltd., New York City (2003)
Girod, B., Steinbach, E., Faerber, N.: Comparison of the H.263 and H.261 video compression standards. In: Rao, K.R. (ed.) Standards and Common Interfaces for Video Information Systems. Critical Reviews of Optical Science and Technology, Philadelphia, Pennsylvania (1995)
Vetrivel, S., Suba, K., Athisha, G.: An overview of h.26x series and its applications. International Journal of Engineering Science and Technology 2(9), 4622–4631 (2010)
Girod, B., Steinbach, E., Faerber, N.: Performance of the H.263 video compression standard. The Journal of VLSI Signal Processing 17(2-3), 101–111 (1997)
Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC Video Coding Standard. IEEE Transactions on Circuits and Systems for Video Technology 13(7), 560–576 (2003)
Li, S.J., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, San Jose, CA, USA. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)
Ganesan, K., Singh, I., Narain, M.: Public key encryption of images and videos in real time using chebyshev maps. In: Proceedings of the 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, pp. 211–216. IEEE Computer Society, Washington, DC, USA (2008)
Kezia, H., Sudha, G.F.: Encryption of Digital Video Based on Lorenz Chaotic System. In: Proceedings of the 16th International Conference on Advanced Computing and Communications, pp. 40–45. IEEE Computer Society Press, Tamilnadu (2008)
Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on the 3d chaotic baker map. International Journal of Bifurcation and Chaos 14(10), 3613–3624 (2004)
Lian, S., Mao, Y., Wang, Z.: The 3-dimension extension of baker map and its application in multimedia encryption. Chinese Journal of Control & Decision 19(6), 714–717 (2004) (Chinese)
Sang, T., Wang, R., Yan, Y.: Perturbance-based algorithm to expand cycle length of chaotic key stream. Electronics Letters 34(9), 873–874 (1998)
Bergamo, P., D’Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems-I 52, 1382–1393 (2005)
Prasad, V.V.R., Kurupati, R.: Secure image watermarking in frequency domain using arnold scrambling and filtering. Advances in Computational Sciences and Technology 3(2), 236–244 (2010)
Nishchal, N.K., Joseph, J., Singh, K.: Fully phase based encryption using fractional Fourier transform. Opt. Eng. 42, 1583–1588 (2003)
Tzouveli, P., Ntalianis, K., Kollias, S.: Security of human video objects by incorporating a chaos-based feedback cryptographic scheme. ACM Multimedia, 10–16 (2004)
Ntalianis, K.S., Kollias, S.D.: Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes. In: Proceedings of ICIP (2) 2005, pp. 1110–1113. IEEE, Genoa (2005)
Yang, S., Sun, S.: A video encryption method based on chaotic maps in DCT domain. Progress in Natural Science 18(10), 1299–1304 (2008)
Lian, S.: Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons and Fractals 40, 2509–2519 (2009)
Lian, S., Wang, Z., Sun, J.: A fast video encryption scheme suitable for network applications. In: Proceedings of 2004 International Conference on Communications, Circuits and Systems (ICCCAS 2004), pp. 566–570. IEEE press, Chengdu (2004)
Hamdi, M., Boudriga, N.: A progressive chaotic mpeg-4 video encryption scheme for wireless networks. In: Proceedings of the 2009 IEEE International Conference on Communications, pp. 5420–5424. IEEE Press, Piscataway (2009)
Wang, S., Kuang, J., Li, J., et al.: Chaos-based communication in a large community. Phys. Rev. 66(6), 1–4
Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proceedings of IEEE International Conference on Security Technology, pp. 149–153. IEEE press, Taipei (1991)
Su, Z., Jiang, J., Lian, S., et al.: Hierarchical Selective Encryption for G.729 Speech Based on Bit Sensitivity. Journal of Internet Technology 11(5), 599–607 (2010)
Hamdi, M., Boudriga, N.: Four dimensional chaotic ciphers for secure image transmission. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 437–440. IEEE press, Hannover (2008)
Jian, H., Mao, Y., Wang, Z.: A novel chaos-based video encryption algorithm. Applied Computational Intelligence, 641–648 (2004)
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Transactions on Consumer Electronics 48(4), 833–844 (2002)
Freitas, A.C.M.: Statistics of the maximum for the tent map. Chaos. Solitons & Fractals 42(1), 604–608 (2009)
Bird, N., Vivaldi, F.: Periodic orbits of the sawtooth maps. Physica D: Nonlinear Phenomena 30(1-2), 164–176 (1988)
Lian, S., Sun, J., Wang, J., Wang, Z.: A chaotic stream cipher and the usage in video protection. Chaos, Solitons and Fractals 34, 851–859 (2007)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure Media Distribution Scheme Based on Chaotic Neural Network. In: Liu, D., Fei, S., Hou, Z., Zhang, H., Sun, C. (eds.) ISNN 2007. LNCS, vol. 4492, pp. 79–87. Springer, Heidelberg (2007)
Qian, Q., Chen, Z., Yuan, Z.: Video compression and encryption based-on multiple chaotic system. In: Proceedings of the 3rd International Conference on Innovative Computing Information and Control, pp. 561–564. IEEE Computer Society, Washington, DC, USA (2008)
Papadimitriou, S., Bountis, T., Mavroudi, S., Bezerianos, A.: A probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference. Int. J. Bifurcat Chaos 11(12), 3107–3115 (2001)
Socek, D., Culibrk, D.: On the security of a clipped. Hopfield neural network-based cryptosystem. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 71–76. ACM press, New York (2005)
Xiao, D., Liao, X.-F.: A combined hash and encryption scheme by chaotic neural network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 13–28. Springer, Heidelberg (2004)
Lian, S., Chen, G., Cheung, A., Wang, Z.: A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 627–632. Springer, Heidelberg (2004)
Lian, S.: Multimedia Content Protection Based on Chaotic Neural Networks. In: Nedjah, N., Abraham, A., de Macedo Mourelle, L. (eds.) Computational Intelligence in Information Assurance and Security. Springer, Heidelberg (2007)
Su, Z., Jiang, J., Lian, S., et al.: Selective encryption for g.729 speech using chaotic maps. In: Proceedings of International Conference on Multimedia Information Networking and Security, vol. 1, pp. 488–492. IEEE computer society, Wuhan (2009)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)
Li, Y.X., Tang, W.K.S., Chen, G.R.: Generating hyperchaos via state feedback control. Int. J. of Bifurcation and Chaos 15(10), 3367–3375 (2005)
Millerioux, G., Bloch, G., Amigo, J.M., Bastos, A., Anstett, F.: Real-time video communication secured by a chaotic key stream cipher. In: Proceedings of the European Conference on Circuit Theory and Design ECCTD 2003, pp. 245–248. IEEE, Krakow (2003)
Rueppel, R.A.: Analysis and design of stream ciphers. Springer, Heidelberg (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Su, Z., Lian, S., Zhang, G., Jiang, J. (2011). Chaos-Based Video Encryption Algorithms. In: Kocarev, L., Lian, S. (eds) Chaos-Based Cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-20542-2_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20541-5
Online ISBN: 978-3-642-20542-2
eBook Packages: EngineeringEngineering (R0)