Network security in video communications using chaotic systems

Qurban A. Memon, Zahid Ali

Research output: Contribution to journalConference articlepeer-review

Abstract

In this paper, we report implementation of encryption of the signal in networked environment using synchronized chaos. The science of chaos has successfully been explored and implemented in hardware for communication signals by Cuomo et all in 1993, although he (author himself) claimed that the mathematics behind the phenomenon was still obscure and not very clear. We are utilizing this unpredictable, random phenomenon called chaos to code our information by superimposing it on a chaotic signal. We applied this technique to different formats of data and results were 100% in the sense that decoded files were run without error. This testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if sender and receiver have compatible scramblers and descramblers, and the key is also known to the receiver.

Original languageEnglish
Pages (from-to)II/-
JournalProceedings of SPIE - The International Society for Optical Engineering
Volume4067
Publication statusPublished - 2000
Externally publishedYes
EventVisual Communications and Image Processing 2000 - Perth, Aust
Duration: Jun 20 2000Jun 23 2000

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Network security in video communications using chaotic systems'. Together they form a unique fingerprint.

Cite this