Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Babloyantz A, Salazar J, Nicolis C (1985) Evidence for Chaotic Dynamics of Brain Activity during the Sleep Cycle. Phys Lett 111:152-156.
Wasserman P (1993) Advanced Methods in Neural Computing. New York: Van Nostrand Reinhold, New York.
Chay T, Fan Y (1993) Evolution of Periodic States and Chaos in Two Types of Neural Models. In: Ditto W(ed.) Chaos in Biology and Medicine, Proc SPIE, Washington: SPIE, 2036:100-114.
Aibara K (1990) Chaotic Neural Networks. Physical Letter A 144(6,7):334-340.
Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Physical Letter A 158(8):373-376.
Inoue M, Nakamoto K (1993) Epilepsy in a Chaos Neuro-computer Model. In SPIE Proceeding, Chaos in Biology and Medicine, 2306:77-84.
Chan C, Cheng L (1998) Pseudorandom Generator Based on Clipped Hopfield Neural Network. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, 3:183-186.
Chan C, Chan C, Cheng L (2001) Software Generation of Random Number by using Neural Network. In Proceeding of 5th International Conference on Ar- tificial Neural Networks and Genetic Algorithms (ICANNGA), Pragus, Czech Republic.
Guo D, Cheng L, Cheng L (1999) A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural networks. Applied Intelligence 10(1):71-84.
Xiang T, Liao X, Tang G, Chen Y, Wong K (2006) A novel block cryptosystem based on iterating a chaotic map. Physics Letters A 349(1-4):109-115.
Xiao D, Liao X, Deng S (2005) One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24(1):65-71.
Rachel M, Einat K, Wolfgang K (2003) Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps. Physical Review Letters 91(11):118701/1-118701/4.
Cauwenberghs G (1999) Delta-sigma cellular automata for analog VLSI random vector generation. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 46(3):240-250.
Chan C, Cheng L (2001) The convergence properties of a clipped Hopfield network and its application in the design of keystream generator. IEEE Trans- actions on Neural Networks 12(2):340-348.
Karras D, Zorkadis V (2003) On neural network techniques in the secure man- agement of communication systems through improving and quality assessing pseudorandom stream generators. Neural Networks 16(5-6):899-905.
Caponetto R, Lavorgna M, Occhipinti L (1996) Cellular neural networks in se- cure transmission applications. In Proceedings of the IEEE International Work- shop on Cellular Neural Networks and their Applications, 411-416.
Yue T, Chiang S (2000) A neural network approach for visual cryptography. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks 5:494-499.
Yen J, Guo J (1999) A Chaotic Neural Network for Signal Encryption/Decryption and Its VLSI Architecture. In: Proc. 10th (Taiwan) VLSI De- sign/CAD Symposium, 319-322.
Lian S, Chen G, Cheung A, Wang Z (2004) A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In Proceedings of 2004 IEEE Symposium on Neural Networks (ISNN2004),Springer LNCS, 3174:627- 632.
Yee L, Silva D (2002) Application of multilayer perception networks in sym- metric block ciphers. In Proceedings of the 2002 International Joint Conference on Neural Networks, 2:1455-1458.
Vanstone S, Menezes A, Oorschot P (1996) Handbook of Applied Cryptography. CRC Press.
Shannon C (1949) Communication theory of secrecy systems. Bell System Technical Journal 28:656-715.
Li C, Li S, Zhang D, Chen G (2004) Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. In Proceedings of the 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer LNCS, 3333:418-425.
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8(6):1259-1284.
Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 12:749-761.
Li S, Zheng X, Mou X, Cai Y (2002) Chaotic Encryption Scheme for Real-time Digital Video. In Proceedings of SPIE, Electronic Imaging, Real-time Imaging V1, 4666:149-160.
Ren X, Hu G, Tan Z (2000) Synchronization of chaotic neural network and its application in secure communication. Journal of Shanghai Jiaotong University 34(6):744-747.
Elman J (1990) Finding structure in time. Cognitive Science 14:179-211.
Pyragas K (1992)Continuous control of chaos by self controlling feedback. Phys Lett A 170:421-428.
Ushio T (1995) Chaotic synchronization and controlling chaos based on contraction maps. Phys Lett A 198:14-22.
Kocarev L, Parlitz U (1995) General approach for chaotic synchronization with application to communication. Phys Rev Lett 74(25):5028-5031.
Zou F, Nossek J (1991) A Chaotic Attractor with Cellular Neural Networks. IEEE Transaction on Circuits and Systems 38(7):811-812.
Zou F, Joset A (1993) Nossek. Bifurcation and chaos in Cellular Neural Net- works. IEEE Transaction on Circuits and Systems-I: Fundamental Theory and Applications 40(3):166-173.
Kaneko K (1990) Clustering, coding, switching, hierarchical ordering and control in a network of chaotic elements. Physics D 41(22):137-172.
Aihara K, Takabe T, Toyoda M (1990) Chaotic Neural Networks. Phys Lett A 144(6):333-340.
Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Phys Lett A 158(8):373-376.
Addison P (1997) Fractals and Chaos - an illustrated course, Institute of physics publishing.
Fang Y, Yu Y (1993) Dynamic analysis of chaotic neurons. In Proceedings of Chinese Conference on Neural Networks, 199-203.
Nagayama I (1995) Spectral Analysis of the Chaotic Behavior Obtained by Neural Networks. In Proceedings of 1995 International Conference on Neural Networks, 28-31.
Kudelski A (1994) Method for scrambling and unscrambling a video signal. United States Patent 5375168.
Access control system for the MAC/packet family: EUROCRYPT. European Standard EN 50094, CENELEC (1992)
Maniccam S, Bourbakis N (2004) Image and video encryption using SCAN patterns. Pattern Recognition 37(4):725-737.
Qiao L, Nahrstedt K (1997) A new algorithm for MPEG video encryption. In Proceeding of the First International Conference on Imaging Science, Systems and Technology (CISST’97),21-29.
Romeo R, Romdotti G, Mattavelli M, Mlynek D (1999) Cryptosystem architectures for very high throughput multimedia encryption: the RPK solution. In Proceedings of ICECS’99, 1:261-264.
Shi C, Wang S, Bhargava, B (1999) MPEG video encryption in real-time using secret key cryptography. In Proc. of International Conference of Parallel and Distributed Processing Techniques and Applications (PDPTA’99), 2822-2828.
Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A New Chaotic Algorithm for Video Encryption. IEEE Transactions on Consumer Electronics 48(4):838-844.
Yen J, Guo J (1999) A new MPEG encryption system and its VLSI architecture. In Proceeding of IEEE Workshop on Signal Processing Systems,430-437.
Tosum A, Feng W (2000) Efficient multi-layer coding and encryption of MPEG video streams. In Proceedings of IEEE International Conference on Multimedia and Expo (I), 119-122.
Qiao L, Nahrstedt K, Tam I (1997) Is MPEG encryption by using random list instead of zigzag order secure. In Proceeding of IEEE International Symposium on Consumer Electronics, 226-229.
Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In Proceedings of the 6th ACM International Multimedia Conference, 81-88.
Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimedia 5(1):118-129.
Wu C, Kuo C (2000) Fast encryption methods for audiovisual data confiden- tiality. In SPIE International Symposia on Information Technologies 2000, Proceedings of SPIE 4209:284-295.
Wu C, Kuo C (2001) Efficient multimedia encryption via entropy codec design. In SPIE International Symposium on Electronic Imaging 2001, Proceedings of SPIE 4314.
Lian S, Sun J, Wang Z (2004) Perceptual Cryptography on SPIHT Compressed Images or Videos. In Proceedings of 2004 IEEE Conference on Multimedia & Expo (ICME2004), 3:2195-2198.
Lian S, Sun J, Wang Z (2004) A Novel Image Encryption Scheme Based-on JPEG Encoding. In Proceedings of the Eighth International Conference on Information Visualization (IV), 217-220.
Li S, Chen G, Mou X (2005) On the Dynamical Degradation of Digital Piece-wise Linear Chaotic Maps. International Journal of Bifurcation and Chaos 15(10):3119-3151.
Security Requirements for Cryptographic Modules (Change Notice). Federal Information Processing Standards Publication (FIPS PUB) 140-1 (2001).
ITU-T Rec. H.264/ISO/IEC 11496-10. Advanced Video Coding. Final Committee Draft, Document JVT-E022 (2002).
Ahn J, Shim H, Jeon B, Choi I (2004) Digital Video Scrambling Method Using Intra Prediction Mode. PCM2004, Springer, LNCS 3333:386-393.
Lian S, Sun J, Zhang D, Wang Z (2004) A Selective Image Encryption Scheme Based on JPEG2000 Codec. In Proceedings of 2004 Pacific-Rim Conference on Multimedia, Springer LNCS 3332:65-72.
Podesser M, Schmidt H, Uhl A (2002) Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002). Tromso-Trondheim, Norway.
Fridrich J, Goljan M, Du R (2001) Invertible Authentication. In: Proceeding of SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, 3971:197-208.
Fridrich J (2000) Visual Hash Functions for Obvious Watermarking. In: Proceeding of SPIE Photonic West Electronic Imaging 2000, Security and Water-marking of Multimedia Contents, San Jose, California, 286-294.
Fridrich J, Goljan M (2000) Robust Hash Functions for Digital Watermarking. The International Conference on Information Technology: Coding and Computing Las Vegas, Nevada, 178-183.
Lin C, Chang S (1998) A Robust Image Authentication Method Surviving JPEG Lossy Compression. In: Proceedings of SPIE Storage and Retrieval of Image/Video Databases, San Jose, 3312:296-307.
Rivest R (1992) The MD5 Message Digest Algorithm. RFC 1321.
Xiao D, Liao X (2004) A Combined Hash and Encryption Scheme by Chaotic Neural Network. In Proceedings of ISNN2004, 2:633-638.
Yeung M, Mintzer F (1997) An Invisible Watermarking Technique for Image Verification. In: Proceeding of ICIP’97, Santa Barbara, California, 2:680-683.
Zhusubaliyev Z, Mosekilde E (2003) Bifurcations and Chaos in Piecewise-Smooth Dynamical Systems. World Scientific, Singapore.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lian, S. (2007). Multimedia Content Protection Based on Chaotic Neural Networks. In: Nedjah, N., Abraham, A., Mourelle, L.d.M. (eds) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71078-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-71078-3_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71077-6
Online ISBN: 978-3-540-71078-3
eBook Packages: EngineeringEngineering (R0)