Chaos-Based Video Encryption for Network Coded Wireless Systems

被引:0
作者
Fawaz, Zeinab [1 ]
Zbib, Zeinab [1 ]
Khalil, Ayman [1 ]
Abdul-Nabi, Samih [1 ]
机构
[1] Lebanese Int Univ, CCE Dept, Sch Engn, Beirut, Lebanon
来源
2013 25TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM) | 2013年
关键词
generator; Confusion; Diffusion; Network Coding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The ease of sharing information happening today increases the number of data transmissions over the Internet, which started by a simple text transmission, and evolved to more complex formats, such as image, audio and video. This data can then be easily accessed by attackers, hence the need for security. In this paper, we propose a modification to the Enhanced ID Chaotic Key Based Encryption (ECKBA) with cat map that will be applied on video transmission (sequence of images), by changing the confusion and diffusion blocks, in order to en. sure a higher level of security. Moreover, to guarantee the secunty for real-time applications transmitted over an unreliable network, we include a method that combines the new scheme with the Network Coding principle.
引用
收藏
页数:4
相关论文
共 10 条
[1]   A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps [J].
Behnia, S. ;
Akhshani, A. ;
Ahadpour, S. ;
Mahmodi, H. ;
Akhavan, A. .
PHYSICS LETTERS A, 2007, 366 (4-5) :391-396
[2]  
Chetto M, 2012, INT CONF INTERNET, P40
[3]   Confusion/diffusion capabilities of some robust hash functions [J].
Coskun, Baris ;
Memon, Nasir .
2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, :1188-1193
[4]   Design and Analyses of Efficient chaotic Generators for Crypto-Systems [J].
El Assad, Safwan ;
Noura, Hassan ;
Taralova, Ina .
WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS, 2009, :3-+
[5]  
El Assad S., 2011, 6 IEEE INT C INT TEC
[6]   Homomorphic image encryption [J].
Elashry, Ibrahim F. ;
Allah, Osama S. Farag ;
Abbas, Alaa M. ;
El-Rabaie, S. ;
Abd El-Samie, Fathi E. .
JOURNAL OF ELECTRONIC IMAGING, 2009, 18 (03)
[7]   Network coding: An instant primer [J].
Fragouli, C ;
Le Boudec, JY ;
Widmer, J .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (01) :63-68
[8]   Security analysis of a chaos-based image encryption algorithm [J].
Lian, SG ;
Sun, JS ;
Wang, ZQ .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) :645-661
[9]  
Matthews R., 1989, Cryptologia, V13, P29, DOI DOI 10.1080/0161-118991863745
[10]  
Shtewi A.A., 2010, INT J COMPUTER SCI N, V10