Share Email Print
cover

Proceedings Paper

Network security in video communications using chaotic systems
Author(s): Qurban A. Memon; Zahid Ali
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

IN this paper, we report implementation of encryption of the signal in networked environment using synchronized chaos. The science of chaos has successfully been explored and implemented in hardware for communication signals by Cuomo et al in 1993, although he claimed that the mathematics behind the phenomenon was still obscure and not very clear. We are utilizing this unpredictable, random phenomenon called chaos to code our information by superimposing it on a chaotic signal. We applied this technique to different formats of data and results were 100% in the sense that decoded files were run without error. This testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if sender and receiver have compatible scramblers and descramblers, and the key is also known to the receiver.

Paper Details

Date Published: 30 May 2000
PDF: 11 pages
Proc. SPIE 4067, Visual Communications and Image Processing 2000, (30 May 2000); doi: 10.1117/12.386647
Show Author Affiliations
Qurban A. Memon, Hamdard Univ. (Pakistan)
Zahid Ali, Hamdard Univ. (Pakistan)


Published in SPIE Proceedings Vol. 4067:
Visual Communications and Image Processing 2000
King N. Ngan; Thomas Sikora; Ming-Ting Sun, Editor(s)

© SPIE. Terms of Use
Back to Top