scispace - formally typeset
Journal ArticleDOI

Chaos based video encryption using maps and Ikeda time delay system

D. Valli, +1 more
- 01 Dec 2017 - 
- Vol. 132, Iss: 12, pp 542
Reads0
Chats0
TLDR
Two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme.
Abstract
Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.

read more

Citations
More filters
Journal ArticleDOI

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

TL;DR: The features of quantum walk are utilized to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies and a new robust video encryption mechanism is proposed.
Journal ArticleDOI

A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications

TL;DR: A novel hybrid cryptosystem combining DNA (Deoxyribonucleic Acid) sequences, Arnold chaotic map, and Mandelbrot sets is suggested for secure streaming of compressed HEVC streams, which reveals astonishing robustness and security accomplishment in contrast to the literature cryptosSystems.
Journal ArticleDOI

Implementation and practical problems of chaos-based cryptography revisited

TL;DR: This paper highlights some of the problems which deter the practical application of chaos-based cryptosystems, and discusses a number of possible solutions that can be explored to overcome these problems.
Journal ArticleDOI

A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.

TL;DR: This work proposes novel chaotic-based multimedia encryption schemes utilizing 2D alteration models for high secure data transmission and a novel perturbation-based data encryption for both confusion and diffusion rounds.
Journal ArticleDOI

Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps

TL;DR: Both theoretical analysis and experimental results demonstrate that IEC-BPMC is insecure against chosen-plaintext attack with low data complexity and computational complexity.
References
More filters
Journal ArticleDOI

A new 1D chaotic system for image encryption

TL;DR: Simulations and performance evaluations show that the proposed system is able to produce many 1D chaotic maps with larger chaotic ranges and better chaotic behaviors compared with their seed maps.
Journal ArticleDOI

Chaos and cryptography: block encryption ciphers based on chaotic maps

TL;DR: Using the well-known principles in the cryptanalysis it is shown that these ciphers do not behave worse than the standard ones, opening in this way a novel approach to the design of block encryption cipher.
Journal ArticleDOI

A fast image encryption algorithm based on chaotic map

TL;DR: A new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity.
Journal ArticleDOI

High-dimensional chaotic behavior in systems with time-delayed feedback

TL;DR: In this article, the Lyapunov analysis is used to study the high-dimensional chaotic states of a class of delay-differential equations with time delayed feedback such as nonlinear optical resonators.
Book

Chaos-based Cryptography: Theory, Algorithms and Applications

TL;DR: This chapter discusses the design and implementation of chaos based cipher: Design of embedded systems for security applications, and the lessons learnt from the cryptanalysis of chaos-based ciphers.
Related Papers (5)