Application of chaos in network video security

Zhenxin Zhang, Jigang Tong, Zengqiang Chen, W. H. Ip, Ching Yuen Chan, Kai Leung Yung

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

Network video makes communication much easier. But data security becomes a troublesome issue. Fully using the characteristic of chaotic systems, the embedded system gets designed to enhance the security of network video. The FPGA and uclinux are adopted as the platform. The Qi hyper chaotic, Logistic mapping, Baker mapping and Cat mapping algorithm is applied to video encryption. Combination of on-line and off-line encryption, random encryption and double encryption methods make the security of data stronger. The system has been tested to run a long time and proved to be stable with a high security. As a platform, the system implements the complex algorithms at a very low cost: a 87MHz processor and 10M memory. But it still has the potential to develop more complex algorithms and applications. So the system has a broad prospect both in the area of application and research.
Original languageEnglish
Title of host publicationInformation Computing and Applications - First International Conference, ICICA 2010, Proceedings
Pages229-236
Number of pages8
EditionM4D
DOIs
Publication statusPublished - 3 Dec 2010
Event1st International Conference on Information Computing and Applications, ICICA 2010 - Tangshan, China
Duration: 15 Oct 201018 Oct 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberM4D
Volume6377 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Information Computing and Applications, ICICA 2010
Country/TerritoryChina
CityTangshan
Period15/10/1018/10/10

Keywords

  • Chaos
  • Encryption
  • FPGA
  • Video in network

ASJC Scopus subject areas

  • General Computer Science
  • Theoretical Computer Science

Fingerprint

Dive into the research topics of 'Application of chaos in network video security'. Together they form a unique fingerprint.

Cite this