基于DM642的多重混沌视频加密系统

Xiangzhu Long, Jishen Li, Youjun Hu
{"title":"基于DM642的多重混沌视频加密系统","authors":"Xiangzhu Long, Jishen Li, Youjun Hu","doi":"10.1109/CIS.2013.66","DOIUrl":null,"url":null,"abstract":"In order to transmit the encrypted video signal on the TI Company's digital signal processor DM642, we put forward a video encrypted algorithm based on the multiple logistic mapping. It combines H. 264 coding standard and use the chaotic sequences produced by three logistic mapping to scramble and transform the quantitative data. Moreover, it ensures that different frames have different encrypted sequences. The results of the practical operation on DM642 show that the algorithm has better initial value sensitivity and larger key space and can resist exhaustive attack, differential attack, and chosen-plaintext attack effectively. It can also meet the need of real-time very well with safety guarantee.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Multiple Chaotic Video Encryption System Based on DM642\",\"authors\":\"Xiangzhu Long, Jishen Li, Youjun Hu\",\"doi\":\"10.1109/CIS.2013.66\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to transmit the encrypted video signal on the TI Company's digital signal processor DM642, we put forward a video encrypted algorithm based on the multiple logistic mapping. It combines H. 264 coding standard and use the chaotic sequences produced by three logistic mapping to scramble and transform the quantitative data. Moreover, it ensures that different frames have different encrypted sequences. The results of the practical operation on DM642 show that the algorithm has better initial value sensitivity and larger key space and can resist exhaustive attack, differential attack, and chosen-plaintext attack effectively. It can also meet the need of real-time very well with safety guarantee.\",\"PeriodicalId\":294223,\"journal\":{\"name\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2013.66\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2013.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

为了在TI公司的数字信号处理器DM642上传输加密的视频信号,我们提出了一种基于多重逻辑映射的视频加密算法。它结合H. 264编码标准,利用三次逻辑映射产生的混沌序列对定量数据进行置乱和变换。并且保证了不同的帧具有不同的加密序列。在DM642上的实际运行结果表明,该算法具有更好的初值灵敏度和更大的密钥空间,能够有效抵御穷举攻击、差分攻击和选择明文攻击。它能很好地满足实时性的要求,并有安全保障。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Multiple Chaotic Video Encryption System Based on DM642
In order to transmit the encrypted video signal on the TI Company's digital signal processor DM642, we put forward a video encrypted algorithm based on the multiple logistic mapping. It combines H. 264 coding standard and use the chaotic sequences produced by three logistic mapping to scramble and transform the quantitative data. Moreover, it ensures that different frames have different encrypted sequences. The results of the practical operation on DM642 show that the algorithm has better initial value sensitivity and larger key space and can resist exhaustive attack, differential attack, and chosen-plaintext attack effectively. It can also meet the need of real-time very well with safety guarantee.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信