30 May 2000 Network security in video communications using chaotic systems
Author Affiliations +
Proceedings Volume 4067, Visual Communications and Image Processing 2000; (2000); doi: 10.1117/12.386647
Event: Visual Communications and Image Processing 2000, 2000, Perth, Australia
Abstract
IN this paper, we report implementation of encryption of the signal in networked environment using synchronized chaos. The science of chaos has successfully been explored and implemented in hardware for communication signals by Cuomo et al in 1993, although he claimed that the mathematics behind the phenomenon was still obscure and not very clear. We are utilizing this unpredictable, random phenomenon called chaos to code our information by superimposing it on a chaotic signal. We applied this technique to different formats of data and results were 100% in the sense that decoded files were run without error. This testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if sender and receiver have compatible scramblers and descramblers, and the key is also known to the receiver.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Qurban A. Memon, Zahid Ali, "Network security in video communications using chaotic systems", Proc. SPIE 4067, Visual Communications and Image Processing 2000, (30 May 2000); doi: 10.1117/12.386647; https://doi.org/10.1117/12.386647
PROCEEDINGS
11 PAGES


SHARE
KEYWORDS
Chaos

Network security

Receivers

Computer security

Internet

Complex systems

Video

RELATED CONTENT


Back to Top