2008
DOI: 10.1063/1.2903758
|View full text |Cite
|
Sign up to set email alerts
|

High-performance multimedia encryption system based on chaos

Abstract: Current chaotic encryption systems in the literature do not fulfill security and performance demands for real-time multimedia communications. To satisfy these demands, we propose a generalized symmetric cryptosystem based on N independently iterated chaotic maps (N-map array) periodically perturbed with a three-level perturbation scheme and a double feedback (global and local) to increase the system's robustness to attacks. The first- and second-level perturbations make cryptosystem extremely sensitive to chan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…Perturbation-based schemes transform stable chaotic cycles into non-stable ones by perturbing the trajectory, as performed in [3]. A network of chaotic maps or coupled map lattices (CML), on the other hand, considers an array of chaotic maps governed by a coupling transformation over some defined neighborhood in the array [20]. In this work, we use CML to develop a PRNG that is robust to ciphertext, known/chosen plain text and differential attacks.…”
Section: Secure Random Number Generator Based On Chaotic Mapsmentioning
confidence: 99%
See 1 more Smart Citation
“…Perturbation-based schemes transform stable chaotic cycles into non-stable ones by perturbing the trajectory, as performed in [3]. A network of chaotic maps or coupled map lattices (CML), on the other hand, considers an array of chaotic maps governed by a coupling transformation over some defined neighborhood in the array [20]. In this work, we use CML to develop a PRNG that is robust to ciphertext, known/chosen plain text and differential attacks.…”
Section: Secure Random Number Generator Based On Chaotic Mapsmentioning
confidence: 99%
“…We also chose the earlier AES implementation by Gladman [30] and PolarSSL [25]. For chaotic encryption, we chose the Hasimoto [20] scheme. We did not compare our scheme with other selective encryption schemes, as they require the modification of media encoders/decoders.…”
Section: Performance Evaluation Setupmentioning
confidence: 99%
“…Energy consumption of traditional encryption schemes such as DES, RC, IDEA, GOST, and (different implementations of) AES has been analyzed in [2][3][4][5]. The energy consumption of for DES, GOST, and IDEA was evaluated in [2], and found to be proportional to the number of rounds used in the encryption process.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional encryption schemes have also been evaluated on a joint effort between security and wireless network throughput in order to decrease the overall energy consumption during transmission [4]. Recently, nontraditional encryptions schemes, particularly those based on Chaotic Maps [5] have been proposed. While such schemes --shown to be equally robust in terms of security properties--have not been formally tested and compared against the traditional ones.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation