Paper
30 May 2000 Network security in video communications using chaotic systems
Qurban A. Memon, Zahid Ali
Author Affiliations +
Proceedings Volume 4067, Visual Communications and Image Processing 2000; (2000) https://doi.org/10.1117/12.386647
Event: Visual Communications and Image Processing 2000, 2000, Perth, Australia
Abstract
IN this paper, we report implementation of encryption of the signal in networked environment using synchronized chaos. The science of chaos has successfully been explored and implemented in hardware for communication signals by Cuomo et al in 1993, although he claimed that the mathematics behind the phenomenon was still obscure and not very clear. We are utilizing this unpredictable, random phenomenon called chaos to code our information by superimposing it on a chaotic signal. We applied this technique to different formats of data and results were 100% in the sense that decoded files were run without error. This testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if sender and receiver have compatible scramblers and descramblers, and the key is also known to the receiver.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Qurban A. Memon and Zahid Ali "Network security in video communications using chaotic systems", Proc. SPIE 4067, Visual Communications and Image Processing 2000, (30 May 2000); https://doi.org/10.1117/12.386647
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Chaos

Network security

Receivers

Computer security

Internet

Complex systems

Video

RELATED CONTENT

Media rights and media security
Proceedings of SPIE (March 14 2005)
BREAD: a European coordination action for broadband for all
Proceedings of SPIE (October 02 2006)
Using overlays to improve network security
Proceedings of SPIE (July 08 2002)
A new mechanism for constrained-based multicast
Proceedings of SPIE (September 28 2006)

Back to Top