Skip to main content

Chaos-Based Video Encryption Algorithms

  • Chapter
Book cover Chaos-Based Cryptography

Part of the book series: Studies in Computational Intelligence ((SCI,volume 354))

Introduction

In recent years, with the development of network technology and multimedia technology, multimedia data, especially video data, are used more and more widely in human society. Some multimedia data applied in entertainment, politics, economics, militaries, industries or education, etc., are necessary to be protected by providing confidentiality, integrity, and ownership or identity. To protect video contents, cryptology, which appears to be an effective way for information security, has been employed in many practical applications[1][2][3]. However, traditional ciphers like DES [4], IDEA [5], RSA[6] and AES[7], are often used for text or binary data, while not suitable for direct video encryption because of the following reasons.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lian, S.: Multimedia Content Encryption: Techniques and Applications. Auerbach Publication, Taylor & Francis Group (2008)

    Google Scholar 

  2. Lian, S., Zhang, Y.: Handbook of research on secure multimedia distribution. IGI Global (formerly Idea Group, Inc.), Hershey, Pennsylvania (2009)

    Google Scholar 

  3. Lian, S., Wang, Z.: Compare of Several Wavelet Coefficient Confusion Methods Applied in Multimedia Encryption. In: Proceedings of the 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2003), pp. 372–376. IEEE Computer Society, Shanghai (2003)

    Chapter  Google Scholar 

  4. Tuchman, W.: A brief history of the data encryption standard. ACM Press, Addison-Wesley Publishing Co., New York (1997)

    Google Scholar 

  5. Dang, P.P., Chau, P.M.: Implementation IDEA algorithm for image encryption. In: Mathematics and Applications of Data/Image Coding, Compression, and Encryption III. Proceedings of SPIE, vol. 4122, pp. 1–9 (2000)

    Google Scholar 

  6. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms, 2nd edn. MIT Press, McGraw-Hill, Cambridge (2001)

    MATH  Google Scholar 

  7. Zeghid, M., Machhout, M., Khriji, L., Baganne, A., et al.: A modified AES based algorithm for image encryption. International Journal of Computer Science and Engineering 1(1), 70–75 (2007)

    Google Scholar 

  8. Furht, B., Muharemagic, E., Socek, D.: Multimedia encryption and watermarking. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  9. Ballest, A.M.: Real-time pay-per-view of protected multimedia content v:2.0. Ph.D.Dissertation, Universitat Polit‘ecnica de Catalunya, Barcelona (2004)

    Google Scholar 

  10. Devaney, R.L.: An introduction to chaotic dynamical systems, 2nd edn. Westview Press, San Francisco (2003)

    MATH  Google Scholar 

  11. Alligood, K.T., Sauer, T., Yorke, J.A.: Chaos: an introduction to dynamical systems. Springer, Heidelberg (1997)

    Google Scholar 

  12. Yang, T., Wu, C.W., Chua, L.O.: Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 44, 469–472 (1997)

    Article  MATH  Google Scholar 

  13. Solak, E.: Cryptanalysis of observer based discrete-time chaotic encryption schemes. International Journal of Bifurcation and Chaos 15(2), 653–658 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  14. He, J., Qian, H., Zhou, Y., Li, Z.: Cryptanalysis and improvement of a block cipher based on multiple chaotic systems. Mathematical Problems in Engineering 2010, 1–14 (2010)

    Article  MathSciNet  Google Scholar 

  15. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Breaking two secure communication systems based on chaotic masking. IEEE Transaction on Circuit and SystemsII: Express Briefs 51, 505–506 (2004)

    Article  Google Scholar 

  16. Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, Heidelberg (2009)

    Book  MATH  Google Scholar 

  17. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16, 2129–2151 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  18. Lian, S., Sun, J., Liu, G., Wang, Z.: Efficient video encryption scheme based on advanced video coding. Multimed. Tools Appl. 38, 75–89 (2008)

    Article  Google Scholar 

  19. Gschwandtner, M., Uhl, A., Wild, P.: Transmission error and compression robustness of 2D chaotic map image encryption schemes. EURASIP Journal on Information Security 2007, 1–16 (2007)

    Article  Google Scholar 

  20. Lin, C.F., Chung, C.H., Chen, Z.L., et al.: A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. Wseas Transactions on Systems 7(2), 49–55 (2008)

    Google Scholar 

  21. Li, Y., Cai, M.: H.264-based multiple security levels net video encryption scheme. In: Proceedings of International Conference on Electronic Computer Technology, pp. 8–11. IEEE press, Macau (2009)

    Chapter  Google Scholar 

  22. Rohwer, K., Krout, T.: Multiple levels of security in support of highly mobile tactical internets-ELB ACTD. In: Proceedings of Military Communications Conference on Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 81–86. IEEE press, McLean (2001)

    Google Scholar 

  23. Chariglione, L.: MPEG and Multimedia Communications. IEEE Transactions on Circuits and Systems for Video Technology 7(1), 5–18 (1997)

    Article  Google Scholar 

  24. Srinivasan, U., Pfeiffer, S., Nepal, S., Lee, M., Gu, L., Barrass, S.: A survey of MPEG-1 audio, video and semantic analysis techniques. Multimedia Tools and Applications 27(1), 105–141 (2005)

    Article  Google Scholar 

  25. Kleihorst, R.P., Vander Werf, A., Bruls, W.H.A., Verhaegh, W.F.J., Waterlander, E.: MPEG2 video encoding in consumer electronics. Journal of Vlsi Signal Processing Systems 15, 5–20 (1997)

    Google Scholar 

  26. Pan, D.: A tutorial on mpeg/audio compression. IEEE MultiMedia 2, 60–74 (1995)

    Article  Google Scholar 

  27. Richardson Iain, E.G.: H.264 and MPEG-4 video compression: video coding for next-generation multimedia. John Wiley & Sons, Ltd., New York City (2003)

    Google Scholar 

  28. Girod, B., Steinbach, E., Faerber, N.: Comparison of the H.263 and H.261 video compression standards. In: Rao, K.R. (ed.) Standards and Common Interfaces for Video Information Systems. Critical Reviews of Optical Science and Technology, Philadelphia, Pennsylvania (1995)

    Google Scholar 

  29. Vetrivel, S., Suba, K., Athisha, G.: An overview of h.26x series and its applications. International Journal of Engineering Science and Technology 2(9), 4622–4631 (2010)

    Google Scholar 

  30. Girod, B., Steinbach, E., Faerber, N.: Performance of the H.263 video compression standard. The Journal of VLSI Signal Processing 17(2-3), 101–111 (1997)

    Article  Google Scholar 

  31. Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC Video Coding Standard. IEEE Transactions on Circuits and Systems for Video Technology 13(7), 560–576 (2003)

    Article  Google Scholar 

  32. Li, S.J., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, San Jose, CA, USA. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)

    Google Scholar 

  33. Ganesan, K., Singh, I., Narain, M.: Public key encryption of images and videos in real time using chebyshev maps. In: Proceedings of the 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, pp. 211–216. IEEE Computer Society, Washington, DC, USA (2008)

    Chapter  Google Scholar 

  34. Kezia, H., Sudha, G.F.: Encryption of Digital Video Based on Lorenz Chaotic System. In: Proceedings of the 16th International Conference on Advanced Computing and Communications, pp. 40–45. IEEE Computer Society Press, Tamilnadu (2008)

    Chapter  Google Scholar 

  35. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on the 3d chaotic baker map. International Journal of Bifurcation and Chaos 14(10), 3613–3624 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  36. Lian, S., Mao, Y., Wang, Z.: The 3-dimension extension of baker map and its application in multimedia encryption. Chinese Journal of Control & Decision 19(6), 714–717 (2004) (Chinese)

    MathSciNet  MATH  Google Scholar 

  37. Sang, T., Wang, R., Yan, Y.: Perturbance-based algorithm to expand cycle length of chaotic key stream. Electronics Letters 34(9), 873–874 (1998)

    Article  Google Scholar 

  38. Bergamo, P., D’Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems-I 52, 1382–1393 (2005)

    Article  Google Scholar 

  39. Prasad, V.V.R., Kurupati, R.: Secure image watermarking in frequency domain using arnold scrambling and filtering. Advances in Computational Sciences and Technology 3(2), 236–244 (2010)

    Google Scholar 

  40. Nishchal, N.K., Joseph, J., Singh, K.: Fully phase based encryption using fractional Fourier transform. Opt. Eng. 42, 1583–1588 (2003)

    Article  Google Scholar 

  41. Tzouveli, P., Ntalianis, K., Kollias, S.: Security of human video objects by incorporating a chaos-based feedback cryptographic scheme. ACM Multimedia, 10–16 (2004)

    Google Scholar 

  42. Ntalianis, K.S., Kollias, S.D.: Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes. In: Proceedings of ICIP (2) 2005, pp. 1110–1113. IEEE, Genoa (2005)

    Google Scholar 

  43. Yang, S., Sun, S.: A video encryption method based on chaotic maps in DCT domain. Progress in Natural Science 18(10), 1299–1304 (2008)

    Article  Google Scholar 

  44. Lian, S.: Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons and Fractals 40, 2509–2519 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  45. Lian, S., Wang, Z., Sun, J.: A fast video encryption scheme suitable for network applications. In: Proceedings of 2004 International Conference on Communications, Circuits and Systems (ICCCAS 2004), pp. 566–570. IEEE press, Chengdu (2004)

    Google Scholar 

  46. Hamdi, M., Boudriga, N.: A progressive chaotic mpeg-4 video encryption scheme for wireless networks. In: Proceedings of the 2009 IEEE International Conference on Communications, pp. 5420–5424. IEEE Press, Piscataway (2009)

    Google Scholar 

  47. Wang, S., Kuang, J., Li, J., et al.: Chaos-based communication in a large community. Phys. Rev. 66(6), 1–4

    Google Scholar 

  48. Kuo, C.J., Chen, M.S.: A new signal encryption technique and its attack study. In: Proceedings of IEEE International Conference on Security Technology, pp. 149–153. IEEE press, Taipei (1991)

    Google Scholar 

  49. Su, Z., Jiang, J., Lian, S., et al.: Hierarchical Selective Encryption for G.729 Speech Based on Bit Sensitivity. Journal of Internet Technology 11(5), 599–607 (2010)

    Google Scholar 

  50. Hamdi, M., Boudriga, N.: Four dimensional chaotic ciphers for secure image transmission. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 437–440. IEEE press, Hannover (2008)

    Google Scholar 

  51. Jian, H., Mao, Y., Wang, Z.: A novel chaos-based video encryption algorithm. Applied Computational Intelligence, 641–648 (2004)

    Google Scholar 

  52. Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Transactions on Consumer Electronics 48(4), 833–844 (2002)

    Google Scholar 

  53. Freitas, A.C.M.: Statistics of the maximum for the tent map. Chaos. Solitons & Fractals 42(1), 604–608 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  54. Bird, N., Vivaldi, F.: Periodic orbits of the sawtooth maps. Physica D: Nonlinear Phenomena 30(1-2), 164–176 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  55. Lian, S., Sun, J., Wang, J., Wang, Z.: A chaotic stream cipher and the usage in video protection. Chaos, Solitons and Fractals 34, 851–859 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  56. Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure Media Distribution Scheme Based on Chaotic Neural Network. In: Liu, D., Fei, S., Hou, Z., Zhang, H., Sun, C. (eds.) ISNN 2007. LNCS, vol. 4492, pp. 79–87. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  57. Qian, Q., Chen, Z., Yuan, Z.: Video compression and encryption based-on multiple chaotic system. In: Proceedings of the 3rd International Conference on Innovative Computing Information and Control, pp. 561–564. IEEE Computer Society, Washington, DC, USA (2008)

    Chapter  Google Scholar 

  58. Papadimitriou, S., Bountis, T., Mavroudi, S., Bezerianos, A.: A probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference. Int. J. Bifurcat Chaos 11(12), 3107–3115 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  59. Socek, D., Culibrk, D.: On the security of a clipped. Hopfield neural network-based cryptosystem. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 71–76. ACM press, New York (2005)

    Chapter  Google Scholar 

  60. Xiao, D., Liao, X.-F.: A combined hash and encryption scheme by chaotic neural network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 13–28. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  61. Lian, S., Chen, G., Cheung, A., Wang, Z.: A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 627–632. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  62. Lian, S.: Multimedia Content Protection Based on Chaotic Neural Networks. In: Nedjah, N., Abraham, A., de Macedo Mourelle, L. (eds.) Computational Intelligence in Information Assurance and Security. Springer, Heidelberg (2007)

    Google Scholar 

  63. Su, Z., Jiang, J., Lian, S., et al.: Selective encryption for g.729 speech using chaotic maps. In: Proceedings of International Conference on Multimedia Information Networking and Security, vol. 1, pp. 488–492. IEEE computer society, Wuhan (2009)

    Chapter  Google Scholar 

  64. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  65. Li, Y.X., Tang, W.K.S., Chen, G.R.: Generating hyperchaos via state feedback control. Int. J. of Bifurcation and Chaos 15(10), 3367–3375 (2005)

    Article  Google Scholar 

  66. Millerioux, G., Bloch, G., Amigo, J.M., Bastos, A., Anstett, F.: Real-time video communication secured by a chaotic key stream cipher. In: Proceedings of the European Conference on Circuit Theory and Design ECCTD 2003, pp. 245–248. IEEE, Krakow (2003)

    Google Scholar 

  67. Rueppel, R.A.: Analysis and design of stream ciphers. Springer, Heidelberg (1986)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Su, Z., Lian, S., Zhang, G., Jiang, J. (2011). Chaos-Based Video Encryption Algorithms. In: Kocarev, L., Lian, S. (eds) Chaos-Based Cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20542-2_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20541-5

  • Online ISBN: 978-3-642-20542-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics