首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
本文基于具有FPGA+ARM架构的Zynq芯片,提出了一种新的实时视频混沌保密通信系统的设计方案.阐述了一种三维视频混沌加密算法的原理并且加以应用,详细介绍了系统设计方法和软硬件实现过程.利用Zynq的FPGA资源实现视频的采集和显示,ARM处理器实现混沌加密与解密和网络收发功能.最终在局域网内实现了视频的实时采集加密和自同步解密,获得了良好的安全性和实时性,为混沌保密通信的应用提供了新方向.  相似文献   

2.

The fast development of communication and technology has created new challenges to transfer data securely. The techniques widely used to secure the data are cryptography and steganography. This paper presents a video steganography method to secure the information to be transmitted. Information transmitted can be an image, audio, text or video. This article presents a new technique that embeds data in the spatial domain of the cover video frame. The method employs chaotic maps to generate Random Positions (RP) to hide the information bits, random numbers for selecting the frames at which the information to be hidden and confusion order to encrypt the cover frame. The video frame is first selected based on Frame Selection (FS) is encrypted by applying Confusion Order (CO) and then embedding is carried out on the random positions generated. After embedding, the decrypted cover frame is replaced in a video sequence for transmission. This method provides three-level security in extracting the hidden secret information and also 25% of embedding capacity. Experimental outcomes (PSNR and payload) confirm that the method is competent.

  相似文献   

3.
研究一种多翼统一混沌系统的同步及反同步问题,这种统一混沌系统将多种多翼混沌系统结合起来,通过调节系统参数可产生不同类型的混沌吸引子。分析多翼混沌系统中新发现的四维混沌系统的动力学特性,这种四维混沌系统可以产生一种形状似蝙蝠的吸引子。通过对系统的相图、李雅普诺夫指数谱和分岔图等动力学行为进行分析和数值仿真,验证了该系统具有丰富的混沌特性。通过Lyapunov稳定性理论和自适应控制方法,设计合适的非线性反馈控制器以及参数自适应率,实现该混沌系统的自适应同步。利用扩维的方法,实现不同维数的非同族混沌系统间的自适应反同步,在MATLAB中进行数值仿真,验证了所设计控制器和给出的参数自适应率的有效性和可行性。  相似文献   

4.
提出了一个新的三维自治混沌系统,通过分析系统的李亚普诺夫指数谱和分岔图可得新系统具有如下性质: 双恒李亚普诺夫指数谱混沌锁定,锁定后的混沌系统的幅值和相位可调节.根据该混沌系统的平衡点和吸引子的拓扑结构,通过构造偶对称多分段平方函数族,可实现在某一方向上扩展指标2的鞍焦平衡点,从而实现多翅膀的扩展.设计了混沌电路实现,验证了电路实现与仿真结果的一致性.最后针对扩展后的多翅膀混沌系统,通过选取合适的驱动信号,达到响应系统与驱动系统混沌同步,并通过仿真验证了所得的结果.  相似文献   

5.
混沌数字保密通信实现的关键是混沌严格同步技术。该文以网络混沌语音保密通信系统为平台,从网络通信协议的思路出发,在混沌脉冲同步理论及应用的启发下,提出并研究了混沌协议同步技术,解决了混沌数字保密通信的关键技术难题,对混沌协议同步技术进行了改进,形成了初步的协议同步机制。此技术可方便地嵌入到现有的通信系统中,提高其保密性,实用性很强。  相似文献   

6.
基于混沌同步技术和自适应观测器,设计一种保密通信系统。使用Lorenz混沌系统对原信号进行加密,利用自适应观测器对加密信号进行解密,以实现保密通信。仿真实验表明,该系统的算法简单、响应速度快,能实现响应系统与驱动系统的同步,提高混沌保密通信的质量和安全性。  相似文献   

7.
The nonlinear autonomous Sprott94 Case A chaotic equations are algebraically simple but can generate a complex chaotic attractor. In this paper, the Sprott94 Case A system is found suitable for chaotic synchronization circuits and chaotic masking communication circuits using Matlab–Simulink® and Orcad–PSpice® programs. Simulation results are used to visualize and illustrate the effectiveness of Sprott94 Case A chaotic system in synchronization and secure communication. The applicability of chaos to secure communication is verified by all simulation results performed on Sprott94 Case A chaotic system.  相似文献   

8.

Real-time multimedia applications are increasingly achieving success in the everyday world. Thereby, multimedia information relies on security to protect private life. The Advanced Encryption Standard (AES) has been designed to secure different applications. Yet, some limitations are given, making it inappropriate for secure video storation and transmission. The limitations are the time complexity, the multiple iterations, and the predefined substitution box. Thus, any user can use it to break the encryption. Moreover, the multiple iterations augment the need for CPU usage, and so the overall run time. Hence, it is necessary to modify the AES algorithm to make it more appropriate for securing video frames transmission over insecure channel. In this paper, an Improved AES (IAES) is put forward, which improves both diffusion and confusion in ciphered video. Our work consists in the following two main points: First, we propose to eliminate both shift-row and sub-byte transformations and replace them with a mix-row operation. This task reduces the run time, which presents a significant factor for real-time video transmission. Equally important, we propose to use the henon chaotic map in the key generation procedure, which provides more randomness. The Hash Algorithm SHA-3 is used to generate the initial conditions of the chaotic attractor. The video encryption procedure is verified with success, and the experimental results confirm that the novel algorithm combining chaos and IAES augments the entropy of the ciphered video by 15% and reduces the complexity time for both encryption and decryption compared to the standard one. Security analysis is successfully performed, and the results prove that our suggested technique provides the basics of cryptography with more correctness. The PRNG is tested by NIST 800–22 test suit, which indicates that it is suitable for secure image encryption. It provides a large key space of 2128 which resists the brute-force attack. All in all, the findings confirm that the novel security approach eliminates the limitation of the existing AES and provides a trade-off between speed and safety levels to secure video transmission.

  相似文献   

9.

Mixed Reality (MR) surgery has not been effectively implemented in telemedicine due to strict requirements of security and delay minimization during real-time video transmission. Hence, this paper aims to propose a novel solution for Surgical Telepresence with highly secured and faster real-time video transmission. The proposed system consists of three components: Authentication (Pre-surgery), Data transmission (During-Surgery), and Storage (Post-Surgery). For Authentication, Pass-Matrix technique is used at both ends to provide graphical passwords. During the surgery, a hybrid system is used to provide highly secured and faster real-time video transmission. This system includes a Feistel Encryption System (FES), Modified Scaled Zhongtang Chaotic System (M-SCZS), and Modified Advanced Encryption System (M-AES) algorithm. After Surgery, the transmitted data are stored using the Information Accountability Framework (IAF) for future purposes. The results are obtained from the during-surgery stage for jaw, breast, and bowel surgery. Both solutions are simulated in MATLAB on a personal computer with average processing capability. The proposed solution improves the entropy from 7.733~7.782 to 7.798–7.996 and reduces the processing time from 8.642~9.911 s/frames to 5.071~6.563 s/frames. The proposed focus on reducing the total processing time for the encryption and decryption process with improving security during the surgery process. Finally, this solution provides a fast security system for surgical telepresence that helps both local and remote surgeons for secure real-time communication. The complexity for this work need to know the used chaotic method, the values of the chaotic parameters and for which this method was used, in addition to the complexity of state of the art.

  相似文献   

10.

Data hiding in video is a method used to hide secret information within the video which is useful for secure multimedia data communication. The main goal of any video steganographic system is to reduce distortion of video and to secure the embedded data. A novel approach of hiding data using Oppositional Grey Wolf Optimization (OGWO) is proposed to minimize distortion and to enhance security so as to get superior video quality. In this work, scene changes are used to identify the key frames to hide the secret data. The scene changes are detected using Discrete Cosine Transform (DCT). Once the key frames are detected, OGWO is used at this stage to select the optimal region to embed the secret data. Lastly, the optimal region for entrenching is construed to embed the secret data using Discrete Wavelet Transform (DWT). Then, the payload and video are normalized using Inverse DWT to boost the video quality. The performance of the proposed system is measured using Peak Signal to Noise Ratio (PSNR), Embedding Capacity and Normalized Correlation (NC). The comparison results show that the proposed method delivers more security and minimizes distortions for improved video quality.

  相似文献   

11.

The Secret Sharing Scheme plays a vital role in cryptography which allows to transmit the secret digital information (image, video, audio, handwriting, etc.,) over a communication channel. This cryptographic technique involves encrypting the secret images into noisy shares and transmitted. The transmitted image shares are reconstructed using simple logical computation. In this paper, we propose a secure (n, n)- Multi-Secret-Sharing (MSS) scheme using image scrambling algorithm which is based on the logistic chaotic sequence generated using the secret key which is retrieved from the geometric pattern named as spirograph which drawn by the users with their private values. Also, decomposition and recombination of image pixels which points to change the position and values of the pixels. The experimental results estimate that the standard metrics NPCR, UACI, Entropy, Coefficient Correlation values proves the rigidness of the implemented algorithm.

  相似文献   

12.
基于多涡卷混沌系统的数字保密通信方案   总被引:1,自引:0,他引:1  
为增强传统的混沌保密通信系统抗干扰能力和提高其保密性,提出了一种基于多涡卷混沌系统同步的数字保密通信方案.在该加密方案中,利用多涡卷混沌系统的特点来构造流密码.数值模拟结果表明:该保密通信系统具有很高的抗差函数攻击能力,在同步信号被干扰时,保密通信系统具有一定的抗误码率.  相似文献   

13.
Ma  Kaiyun  Teng  Lin  Wang  Xingyuan  Meng  Juan 《Multimedia Tools and Applications》2021,80(16):24737-24757

In order to obtain a more secure and effective image encryption scheme, a color image encryption scheme based on Fisher-Yates scrambling algorithm and chaos theory is proposed. First, the (secure hash algorithm) SHA-384 is used to generate the key by combining the plaintext image and the encrypted time point. Then, three groups of chaotic sequences are obtained by iterating the three-dimensional Chen chaotic system, and three groups of pseudo-random sequences are obtained by processing with the key. The first group of pseudo-random sequences combined with the Fisher’s algorithm for image pixel position scrambling. A new pixel value substitution method is proposed using the second group of sequences to control each pixel value substitution of the image. The last group generated the matrix after pixel substitution was used for diffusion transformation to obtain the final encrypted image. The test results show that the scheme has broad application prospects.

  相似文献   

14.

In this paper, a new image encryption algorithm is introduced for encrypting grayscale digital images of any size. To improve the encryption evaluation parameters, we suggested that the value of the plain image correlation coefficient be effective in the cryptographic process, so plain images with different properties and correlation coefficient rates are encrypted in different ways. According to the average absolute value of correlation coefficient of plain image, Logistic or Tent maps is selected to generate chaotic sequences to expand plain image matrix. As the first step of the diffusion phase, the plain image matrix is developed with larger size by proper selected chaotic sequences, and simultaneously a chaotic matrix with the same size is generated by chaotic Sine map sequences. In confusion phase, the modified Lorenz map changes pixel locations of new developed matrix by means of certain equations. Then bitwise XOR is applied between developed matrix include plain image and Sine map chaotic matrix, as second step of diffusion phase. Finally, encrypted image is generated after applying exchange operations on the content of pixels, as third step of diffusion phase. Experimental results and comparisons with some of the existing methods, show that the proposed image cryptosystem is able to resist common cryptanalytic attacks and can be used as a secure method for encrypting digital images.

  相似文献   

15.

Multimedia data such as: images, audio and video have become significantly more important, since the exchange of digital data over the network (wired/wireless) has expanded. Therefore an increasing need to secure the important data many techniques are used to such purpose. Cryptography remains an important and wide used mean to secure data. In this aim we propose a new rapid hyperchaotic system with higher confusion and a unique equilibrium point. Detailed mathematical study based on dynamic tests such as lyapunov exponents, Poincare map, the Lyapunov Dimension computing, Dissipation and the study of an attractor existence. In addition an electronic implementation is realized to simulate the attractor behavior. The developed system is injected in a new proposed encryption algorithm to introduce high randomness and hyperchaotic behavior to its output applied on digital images. Tests and simulation results on many images kinds prove the efficiency and higher velocity of processing time of the proposed algorithm.

  相似文献   

16.

This paper uses a combination of a logistic map and a five-term chaotic oscillator to develop a secure speech communication technique. Firstly, an active controller is designed to synchronize the five terms chaotic oscillators at the transmitter and receiver sides. Then, the first encryption level of row-column shift and a bit XOR operation are performed using the chaotic oscillator. It is followed by a bit-level permutation using the combined key, generated by the chaotic oscillator and the logistic map to enhance the security. Various security analysis methods, such as spectrogram analysis, histogram analysis, correlation test, periodogram analysis, SNR analysis, etc. are used to assess the claim of higher security made in this paper. The simulation results confirm that the proposed technique is more secured than some similar available techniques. The proposed technique’s ability to resist various attacks is tested and found to have adequate resistance to various attacks.

  相似文献   

17.
This paper presents a novel secure communication system for digital signal transmissions. It contains four important parts: modulation, chaotic transmitter, chaotic receiver, and demodulation. The modulation mechanism is to modulate each of delivered bit information to be a carrier signal in the continuous form. Then this carrier signal is taken as a parameter of the chaotic system, called the unified chaotic system. Such a system possesses three different types of chaos characterizations depending on its system's parameter, and this guarantees the communication security more. In the public channel, only three chaotic state variables are delivered and this means that the important carrier information is efficiently screened. According to chaotic states received in the receiver terminal, the continuous carrier signal is decrypted using certain adaptation mechanisms. Finally, the proposed demodulation method can successfully recover the original bit information which is embedded in the communication systems. Some simulation results are provided to verify the efficiency of the proposed secure communication system.  相似文献   

18.
统一混沌系统同步及在保密通信中的应用   总被引:4,自引:0,他引:4  
对统一混沌系统的同步控制和在保密通信中的应用进行了研究.基于李亚普诺夫稳定性理论和线性矩阵不等式方法,设计出一种结构简单、反馈增益小、保守性小的输出反馈控制器;解决了状态不可测情况下统一混沌系统的同步控制问题,实现了性能良好的混沌同步.进而用混沌掩盖的方法将该同步方法应用于保密通信.最后以统一混沌系统的特殊情况洛伦兹系统为例进行了仿真.仿真结果表明可以实现渐近同步,应用于保密通信可以达到掩盖有用信号的目的,并且可以无失真地恢复有用信号.  相似文献   

19.
混沌系统被广泛应用于军事保密通信和信息安全领域,该文在Liu混沌系统基础上设计了一个新型混沌系统,并重点对新型混沌系统的基本动力学特性进行了分析,包括系统的分岔图、相图、Lyapunov指数图分析。在保留了Liu混沌系统的优点基础上,增加了参数个数,扩大了参数范围,最后利用DSP实现了该新型混沌系统,并对Liu混沌系统生成的数字序列和改进后的序列进行NIST测试,对比测试结果表明改进后的数字序列性能更优。  相似文献   

20.
为了解决保密通信的问题,在研究混沌同步的基础上,设计一种基于状态观测器的超混沌保密通信系统。混沌系统采用超混沌Liu系统作为基础模型,有效地提高系统的保密性;通过对n×n阶矩阵是否满秩求解,完成对2个超混沌系统能否达到同步的判定,避免计算高维系统的Lyapunov指数,具有广泛的适用性;混沌系统选择en(t)=y2+(1+x2)p(t)作为加密函数,保证该保密通信方案的灵活性。实验表明,本文设计的超混沌保密通信系统,具有比较高的安全性、广泛的适应性、能够支持一定的动态调整等特点。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号