Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 57))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Babloyantz A, Salazar J, Nicolis C (1985) Evidence for Chaotic Dynamics of Brain Activity during the Sleep Cycle. Phys Lett 111:152-156.

    Article  Google Scholar 

  2. Wasserman P (1993) Advanced Methods in Neural Computing. New York: Van Nostrand Reinhold, New York.

    MATH  Google Scholar 

  3. Chay T, Fan Y (1993) Evolution of Periodic States and Chaos in Two Types of Neural Models. In: Ditto W(ed.) Chaos in Biology and Medicine, Proc SPIE, Washington: SPIE, 2036:100-114.

    Google Scholar 

  4. Aibara K (1990) Chaotic Neural Networks. Physical Letter A 144(6,7):334-340.

    Google Scholar 

  5. Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Physical Letter A 158(8):373-376.

    Article  Google Scholar 

  6. Inoue M, Nakamoto K (1993) Epilepsy in a Chaos Neuro-computer Model. In SPIE Proceeding, Chaos in Biology and Medicine, 2306:77-84.

    Google Scholar 

  7. Chan C, Cheng L (1998) Pseudorandom Generator Based on Clipped Hopfield Neural Network. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, 3:183-186.

    Google Scholar 

  8. Chan C, Chan C, Cheng L (2001) Software Generation of Random Number by using Neural Network. In Proceeding of 5th International Conference on Ar- tificial Neural Networks and Genetic Algorithms (ICANNGA), Pragus, Czech Republic.

    Google Scholar 

  9. Guo D, Cheng L, Cheng L (1999) A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural networks. Applied Intelligence 10(1):71-84.

    Article  Google Scholar 

  10. Xiang T, Liao X, Tang G, Chen Y, Wong K (2006) A novel block cryptosystem based on iterating a chaotic map. Physics Letters A 349(1-4):109-115.

    Article  Google Scholar 

  11. Xiao D, Liao X, Deng S (2005) One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24(1):65-71.

    MATH  MathSciNet  Google Scholar 

  12. Rachel M, Einat K, Wolfgang K (2003) Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps. Physical Review Letters 91(11):118701/1-118701/4.

    Google Scholar 

  13. Cauwenberghs G (1999) Delta-sigma cellular automata for analog VLSI random vector generation. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 46(3):240-250.

    Article  Google Scholar 

  14. Chan C, Cheng L (2001) The convergence properties of a clipped Hopfield network and its application in the design of keystream generator. IEEE Trans- actions on Neural Networks 12(2):340-348.

    Article  Google Scholar 

  15. Karras D, Zorkadis V (2003) On neural network techniques in the secure man- agement of communication systems through improving and quality assessing pseudorandom stream generators. Neural Networks 16(5-6):899-905.

    Article  Google Scholar 

  16. Caponetto R, Lavorgna M, Occhipinti L (1996) Cellular neural networks in se- cure transmission applications. In Proceedings of the IEEE International Work- shop on Cellular Neural Networks and their Applications, 411-416.

    Google Scholar 

  17. Yue T, Chiang S (2000) A neural network approach for visual cryptography. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks 5:494-499.

    Google Scholar 

  18. Yen J, Guo J (1999) A Chaotic Neural Network for Signal Encryption/Decryption and Its VLSI Architecture. In: Proc. 10th (Taiwan) VLSI De- sign/CAD Symposium, 319-322.

    Google Scholar 

  19. Lian S, Chen G, Cheung A, Wang Z (2004) A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In Proceedings of 2004 IEEE Symposium on Neural Networks (ISNN2004),Springer LNCS, 3174:627- 632.

    Google Scholar 

  20. Yee L, Silva D (2002) Application of multilayer perception networks in sym- metric block ciphers. In Proceedings of the 2002 International Joint Conference on Neural Networks, 2:1455-1458.

    Google Scholar 

  21. Vanstone S, Menezes A, Oorschot P (1996) Handbook of Applied Cryptography. CRC Press.

    Google Scholar 

  22. Shannon C (1949) Communication theory of secrecy systems. Bell System Technical Journal 28:656-715.

    MATH  MathSciNet  Google Scholar 

  23. Li C, Li S, Zhang D, Chen G (2004) Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. In Proceedings of the 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer LNCS, 3333:418-425.

    Google Scholar 

  24. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8(6):1259-1284.

    Article  MATH  MathSciNet  Google Scholar 

  25. Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 12:749-761.

    Article  MathSciNet  Google Scholar 

  26. Li S, Zheng X, Mou X, Cai Y (2002) Chaotic Encryption Scheme for Real-time Digital Video. In Proceedings of SPIE, Electronic Imaging, Real-time Imaging V1, 4666:149-160.

    Google Scholar 

  27. Ren X, Hu G, Tan Z (2000) Synchronization of chaotic neural network and its application in secure communication. Journal of Shanghai Jiaotong University 34(6):744-747.

    Google Scholar 

  28. Elman J (1990) Finding structure in time. Cognitive Science 14:179-211.

    Article  Google Scholar 

  29. Pyragas K (1992)Continuous control of chaos by self controlling feedback. Phys Lett A 170:421-428.

    Article  Google Scholar 

  30. Ushio T (1995) Chaotic synchronization and controlling chaos based on contraction maps. Phys Lett A 198:14-22.

    Article  MATH  MathSciNet  Google Scholar 

  31. Kocarev L, Parlitz U (1995) General approach for chaotic synchronization with application to communication. Phys Rev Lett 74(25):5028-5031.

    Article  Google Scholar 

  32. Zou F, Nossek J (1991) A Chaotic Attractor with Cellular Neural Networks. IEEE Transaction on Circuits and Systems 38(7):811-812.

    Article  Google Scholar 

  33. Zou F, Joset A (1993) Nossek. Bifurcation and chaos in Cellular Neural Net- works. IEEE Transaction on Circuits and Systems-I: Fundamental Theory and Applications 40(3):166-173.

    Article  MATH  Google Scholar 

  34. Kaneko K (1990) Clustering, coding, switching, hierarchical ordering and control in a network of chaotic elements. Physics D 41(22):137-172.

    Article  MATH  Google Scholar 

  35. Aihara K, Takabe T, Toyoda M (1990) Chaotic Neural Networks. Phys Lett A 144(6):333-340.

    Article  MathSciNet  Google Scholar 

  36. Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Phys Lett A 158(8):373-376.

    Article  Google Scholar 

  37. Addison P (1997) Fractals and Chaos - an illustrated course, Institute of physics publishing.

    Google Scholar 

  38. Fang Y, Yu Y (1993) Dynamic analysis of chaotic neurons. In Proceedings of Chinese Conference on Neural Networks, 199-203.

    Google Scholar 

  39. Nagayama I (1995) Spectral Analysis of the Chaotic Behavior Obtained by Neural Networks. In Proceedings of 1995 International Conference on Neural Networks, 28-31.

    Google Scholar 

  40. Kudelski A (1994) Method for scrambling and unscrambling a video signal. United States Patent 5375168.

    Google Scholar 

  41. Access control system for the MAC/packet family: EUROCRYPT. European Standard EN 50094, CENELEC (1992)

    Google Scholar 

  42. Maniccam S, Bourbakis N (2004) Image and video encryption using SCAN patterns. Pattern Recognition 37(4):725-737.

    Article  Google Scholar 

  43. Qiao L, Nahrstedt K (1997) A new algorithm for MPEG video encryption. In Proceeding of the First International Conference on Imaging Science, Systems and Technology (CISST’97),21-29.

    Google Scholar 

  44. Romeo R, Romdotti G, Mattavelli M, Mlynek D (1999) Cryptosystem architectures for very high throughput multimedia encryption: the RPK solution. In Proceedings of ICECS’99, 1:261-264.

    Google Scholar 

  45. Shi C, Wang S, Bhargava, B (1999) MPEG video encryption in real-time using secret key cryptography. In Proc. of International Conference of Parallel and Distributed Processing Techniques and Applications (PDPTA’99), 2822-2828.

    Google Scholar 

  46. Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A New Chaotic Algorithm for Video Encryption. IEEE Transactions on Consumer Electronics 48(4):838-844.

    Article  Google Scholar 

  47. Yen J, Guo J (1999) A new MPEG encryption system and its VLSI architecture. In Proceeding of IEEE Workshop on Signal Processing Systems,430-437.

    Google Scholar 

  48. Tosum A, Feng W (2000) Efficient multi-layer coding and encryption of MPEG video streams. In Proceedings of IEEE International Conference on Multimedia and Expo (I), 119-122.

    Google Scholar 

  49. Qiao L, Nahrstedt K, Tam I (1997) Is MPEG encryption by using random list instead of zigzag order secure. In Proceeding of IEEE International Symposium on Consumer Electronics, 226-229.

    Google Scholar 

  50. Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In Proceedings of the 6th ACM International Multimedia Conference, 81-88.

    Google Scholar 

  51. Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimedia 5(1):118-129.

    Article  Google Scholar 

  52. Wu C, Kuo C (2000) Fast encryption methods for audiovisual data confiden- tiality. In SPIE International Symposia on Information Technologies 2000, Proceedings of SPIE 4209:284-295.

    Google Scholar 

  53. Wu C, Kuo C (2001) Efficient multimedia encryption via entropy codec design. In SPIE International Symposium on Electronic Imaging 2001, Proceedings of SPIE 4314.

    Google Scholar 

  54. Lian S, Sun J, Wang Z (2004) Perceptual Cryptography on SPIHT Compressed Images or Videos. In Proceedings of 2004 IEEE Conference on Multimedia & Expo (ICME2004), 3:2195-2198.

    Google Scholar 

  55. Lian S, Sun J, Wang Z (2004) A Novel Image Encryption Scheme Based-on JPEG Encoding. In Proceedings of the Eighth International Conference on Information Visualization (IV), 217-220.

    Google Scholar 

  56. Li S, Chen G, Mou X (2005) On the Dynamical Degradation of Digital Piece-wise Linear Chaotic Maps. International Journal of Bifurcation and Chaos 15(10):3119-3151.

    Article  MATH  MathSciNet  Google Scholar 

  57. Security Requirements for Cryptographic Modules (Change Notice). Federal Information Processing Standards Publication (FIPS PUB) 140-1 (2001).

    Google Scholar 

  58. ITU-T Rec. H.264/ISO/IEC 11496-10. Advanced Video Coding. Final Committee Draft, Document JVT-E022 (2002).

    Google Scholar 

  59. Ahn J, Shim H, Jeon B, Choi I (2004) Digital Video Scrambling Method Using Intra Prediction Mode. PCM2004, Springer, LNCS 3333:386-393.

    Google Scholar 

  60. Lian S, Sun J, Zhang D, Wang Z (2004) A Selective Image Encryption Scheme Based on JPEG2000 Codec. In Proceedings of 2004 Pacific-Rim Conference on Multimedia, Springer LNCS 3332:65-72.

    Google Scholar 

  61. Podesser M, Schmidt H, Uhl A (2002) Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002). Tromso-Trondheim, Norway.

    Google Scholar 

  62. Fridrich J, Goljan M, Du R (2001) Invertible Authentication. In: Proceeding of SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, 3971:197-208.

    Google Scholar 

  63. Fridrich J (2000) Visual Hash Functions for Obvious Watermarking. In: Proceeding of SPIE Photonic West Electronic Imaging 2000, Security and Water-marking of Multimedia Contents, San Jose, California, 286-294.

    Google Scholar 

  64. Fridrich J, Goljan M (2000) Robust Hash Functions for Digital Watermarking. The International Conference on Information Technology: Coding and Computing Las Vegas, Nevada, 178-183.

    Google Scholar 

  65. Lin C, Chang S (1998) A Robust Image Authentication Method Surviving JPEG Lossy Compression. In: Proceedings of SPIE Storage and Retrieval of Image/Video Databases, San Jose, 3312:296-307.

    Google Scholar 

  66. Rivest R (1992) The MD5 Message Digest Algorithm. RFC 1321.

    Google Scholar 

  67. Xiao D, Liao X (2004) A Combined Hash and Encryption Scheme by Chaotic Neural Network. In Proceedings of ISNN2004, 2:633-638.

    Google Scholar 

  68. Yeung M, Mintzer F (1997) An Invisible Watermarking Technique for Image Verification. In: Proceeding of ICIP’97, Santa Barbara, California, 2:680-683.

    Google Scholar 

  69. Zhusubaliyev Z, Mosekilde E (2003) Bifurcations and Chaos in Piecewise-Smooth Dynamical Systems. World Scientific, Singapore.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lian, S. (2007). Multimedia Content Protection Based on Chaotic Neural Networks. In: Nedjah, N., Abraham, A., Mourelle, L.d.M. (eds) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71078-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71078-3_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71077-6

  • Online ISBN: 978-3-540-71078-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics