Application of chaos in network video security

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Network video makes communication much easier. But data security becomes a troublesome issue. Fully using the characteristic of chaotic systems, the embedded system gets designed to enhance the security of network video. The FPGA and uclinux are adopted as the platform. The Qi hyper chaotic, Logistic mapping, Baker mapping and Cat mapping algorithm is applied to video encryption. Combination of on-line and off-line encryption, random encryption and double encryption methods make the security of data stronger. The system has been tested to run a long time and proved to be stable with a high security. As a platform, the system implements the complex algorithms at a very low cost: a 87MHz processor and 10M memory. But it still has the potential to develop more complex algorithms and applications. So the system has a broad prospect both in the area of application and research. © 2010 Springer-Verlag Berlin Heidelberg.

Author supplied keywords

Cite

CITATION STYLE

APA

Zhang, Z., Tong, J., Chen, Z., Ip, W. H., Chan, C. Y., & Yung, K. L. (2010). Application of chaos in network video security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6377 LNCS, pp. 229–236). https://doi.org/10.1007/978-3-642-16167-4_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free