Using hyper chaos in secure video transmission

This work presents a hardware implementation of hyper chaotic-based encryption algorithm utilized for video transmission in a secured way. Eight-dimensional hyper chaotic system is realized to generate a secret sequence used in both confusion and diffusion processes. The proposed scheme utilizes the hyper chaotic output to shuffle the pixel positions and change pixel values for each video frame in order to obtain totally changed video frames. The proposed system is experimentally verified on hardware module (NI-MyRIO) based on field programmable gate array (FPGA) and ARM processor. The encrypted video frames are sent to the receiver side through wireless fidelity (WiFi), the receiver has the same hyper chaotic generator with identical initial conditions and control parameters. The security analysis will be investigated to evaluate the performance of the proposed system.

[1]  O. Rössler An equation for hyperchaos , 1979 .

[2]  Mohamed M. Elkholy,et al.  Design and implementation of hyper chaotic masking system for secured audio transmission , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).

[3]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[4]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[5]  L. Chua,et al.  Hyper chaos: Laboratory experiment and numerical confirmation , 1986 .

[6]  Kamlesh Gupta,et al.  New Approach for Fast Color Image Encryption Using Chaotic Map , 2011, J. Information Security.

[7]  Min Long,et al.  A Chaos-Based Data Encryption Algorithm for Image/Video , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[8]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[9]  Sodeif Ahadpour,et al.  A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices , 2012, ArXiv.

[10]  Asem Mohammad Al-Najjar,et al.  Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table , 2011 .

[12]  H. El Hennawy,et al.  Simulation and Digital Implementation of Eight Dimensional Hyper Chaotic System for Secured Chaotic Communication , 2015 .

[13]  Feng Liu,et al.  Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners , 2011, IET Inf. Secur..