Chaotic Encryption Scheme for Real-Time Digital Video

@inproceedings{Li2002ChaoticES,
  title={Chaotic Encryption Scheme for Real-Time Digital Video},
  author={Shujun Li and Xuan Zheng and Xuanqin Mou and Y. Cai},
  year={2002}
}
In this paper, we propose a novel video encryption scheme based on multiple digital chaotic systems, which is called CVES (Chaotic Video Encryption Scheme). CVES is independent of any video compression algorithms, and can provide high security for real-time digital video with fast encryption speed, and can be simply realized both by hardware and software. What’s more, CVES can be extended to support random retrieval of cipher-video with considerable maximal time-out; the extended CVES is called… CONTINUE READING
Highly Cited
This paper has 111 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 66 extracted citations

Chaos-Based Video Encryption Algorithms

Chaos-Based Cryptography • 2011
View 7 Excerpts
Highly Influenced

A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system

IEEE Transactions on Circuits and Systems I: Regular Papers • 2006
View 5 Excerpts
Highly Influenced

Hybrid image encryption and steganography using SCAN pattern for secure communication

2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON) • 2017

Security of Wireless Mesh Network from Denial of Service Attack

Sunita Rani, Shweta Nijhawan, +11 authors Haroon Shakirat Oluwatosin
2017

A scrambling and encryption algorithm for selective block of identification photo

2016 8th International Conference on Wireless Communications & Signal Processing (WCSP) • 2016
View 2 Excerpts

112 Citations

01020'02'05'09'13'17
Citations per Year
Semantic Scholar estimates that this publication has 112 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 43 references

Perturbance-based algorithm to expand cycle length of chaotic key stream,

S. Tao, W. Ruili, Y. Yixun
Electronics Letters • 1998
View 5 Excerpts
Highly Influenced

Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding,

S. Li, Q. Li, W. Li, X. Mou, Y. Cai
in Cryptography and Coding - 8th IMA Int. Conf. Proc., Lecture Notes in Computer Science • 2001
View 2 Excerpts

Chosen DCT coefficients attack on MPEG encryption schemes,

T. Uehara, R. Safavi-Naini
in Proc. IEEE Pacific Rim Conf. Multimedia, • 2000

Similar Papers

Loading similar papers…