Network video makes communication much easier. But data security becomes a troublesome issue. Fully using the characteristic of chaotic systems, the embedded system gets designed to enhance the security of network video. The FPGA and uclinux are adopted as the platform. The Qi hyper chaotic, Logistic mapping, Baker mapping and Cat mapping algorithm is applied to video encryption. Combination of on-line and off-line encryption, random encryption and double encryption methods make the security of data stronger. The system has been tested to run a long time and proved to be stable with a high security. As a platform, the system implements the complex algorithms at a very low cost: a 87MHz processor and 10M memory. But it still has the potential to develop more complex algorithms and applications. So the system has a broad prospect both in the area of application and research. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Zhang, Z., Tong, J., Chen, Z., Ip, W. H., Chan, C. Y., & Yung, K. L. (2010). Application of chaos in network video security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6377 LNCS, pp. 229–236). https://doi.org/10.1007/978-3-642-16167-4_30
Mendeley helps you to discover research relevant for your work.