Multimedia Content Protection Based on Chaotic Neural Networks

  • Shiguo Lian
Part of the Studies in Computational Intelligence book series (SCI, volume 57)


Hash Function Encryption Algorithm Block Cipher Cellular Neural Network Stream Cipher 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Babloyantz A, Salazar J, Nicolis C (1985) Evidence for Chaotic Dynamics of Brain Activity during the Sleep Cycle. Phys Lett 111:152-156.CrossRefGoogle Scholar
  2. 2.
    Wasserman P (1993) Advanced Methods in Neural Computing. New York: Van Nostrand Reinhold, New York.zbMATHGoogle Scholar
  3. 3.
    Chay T, Fan Y (1993) Evolution of Periodic States and Chaos in Two Types of Neural Models. In: Ditto W(ed.) Chaos in Biology and Medicine, Proc SPIE, Washington: SPIE, 2036:100-114.Google Scholar
  4. 4.
    Aibara K (1990) Chaotic Neural Networks. Physical Letter A 144(6,7):334-340.Google Scholar
  5. 5.
    Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Physical Letter A 158(8):373-376.CrossRefGoogle Scholar
  6. 6.
    Inoue M, Nakamoto K (1993) Epilepsy in a Chaos Neuro-computer Model. In SPIE Proceeding, Chaos in Biology and Medicine, 2306:77-84.Google Scholar
  7. 7.
    Chan C, Cheng L (1998) Pseudorandom Generator Based on Clipped Hopfield Neural Network. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, 3:183-186.Google Scholar
  8. 8.
    Chan C, Chan C, Cheng L (2001) Software Generation of Random Number by using Neural Network. In Proceeding of 5th International Conference on Ar- tificial Neural Networks and Genetic Algorithms (ICANNGA), Pragus, Czech Republic.Google Scholar
  9. 9.
    Guo D, Cheng L, Cheng L (1999) A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural networks. Applied Intelligence 10(1):71-84.CrossRefGoogle Scholar
  10. 10.
    Xiang T, Liao X, Tang G, Chen Y, Wong K (2006) A novel block cryptosystem based on iterating a chaotic map. Physics Letters A 349(1-4):109-115.CrossRefGoogle Scholar
  11. 11.
    Xiao D, Liao X, Deng S (2005) One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24(1):65-71.zbMATHMathSciNetGoogle Scholar
  12. 12.
    Rachel M, Einat K, Wolfgang K (2003) Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps. Physical Review Letters 91(11):118701/1-118701/4.Google Scholar
  13. 13.
    Cauwenberghs G (1999) Delta-sigma cellular automata for analog VLSI random vector generation. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 46(3):240-250.CrossRefGoogle Scholar
  14. 14.
    Chan C, Cheng L (2001) The convergence properties of a clipped Hopfield network and its application in the design of keystream generator. IEEE Trans- actions on Neural Networks 12(2):340-348.CrossRefGoogle Scholar
  15. 15.
    Karras D, Zorkadis V (2003) On neural network techniques in the secure man- agement of communication systems through improving and quality assessing pseudorandom stream generators. Neural Networks 16(5-6):899-905.CrossRefGoogle Scholar
  16. 16.
    Caponetto R, Lavorgna M, Occhipinti L (1996) Cellular neural networks in se- cure transmission applications. In Proceedings of the IEEE International Work- shop on Cellular Neural Networks and their Applications, 411-416.Google Scholar
  17. 17.
    Yue T, Chiang S (2000) A neural network approach for visual cryptography. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks 5:494-499.Google Scholar
  18. 18.
    Yen J, Guo J (1999) A Chaotic Neural Network for Signal Encryption/Decryption and Its VLSI Architecture. In: Proc. 10th (Taiwan) VLSI De- sign/CAD Symposium, 319-322.Google Scholar
  19. 19.
    Lian S, Chen G, Cheung A, Wang Z (2004) A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In Proceedings of 2004 IEEE Symposium on Neural Networks (ISNN2004),Springer LNCS, 3174:627- 632.Google Scholar
  20. 20.
    Yee L, Silva D (2002) Application of multilayer perception networks in sym- metric block ciphers. In Proceedings of the 2002 International Joint Conference on Neural Networks, 2:1455-1458.Google Scholar
  21. 21.
    Vanstone S, Menezes A, Oorschot P (1996) Handbook of Applied Cryptography. CRC Press.Google Scholar
  22. 22.
    Shannon C (1949) Communication theory of secrecy systems. Bell System Technical Journal 28:656-715.zbMATHMathSciNetGoogle Scholar
  23. 23.
    Li C, Li S, Zhang D, Chen G (2004) Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. In Proceedings of the 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer LNCS, 3333:418-425.Google Scholar
  24. 24.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8(6):1259-1284.zbMATHCrossRefMathSciNetGoogle Scholar
  25. 25.
    Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 12:749-761.CrossRefMathSciNetGoogle Scholar
  26. 26.
    Li S, Zheng X, Mou X, Cai Y (2002) Chaotic Encryption Scheme for Real-time Digital Video. In Proceedings of SPIE, Electronic Imaging, Real-time Imaging V1, 4666:149-160.Google Scholar
  27. 27.
    Ren X, Hu G, Tan Z (2000) Synchronization of chaotic neural network and its application in secure communication. Journal of Shanghai Jiaotong University 34(6):744-747.Google Scholar
  28. 28.
    Elman J (1990) Finding structure in time. Cognitive Science 14:179-211.CrossRefGoogle Scholar
  29. 29.
    Pyragas K (1992)Continuous control of chaos by self controlling feedback. Phys Lett A 170:421-428.CrossRefGoogle Scholar
  30. 30.
    Ushio T (1995) Chaotic synchronization and controlling chaos based on contraction maps. Phys Lett A 198:14-22.zbMATHCrossRefMathSciNetGoogle Scholar
  31. 31.
    Kocarev L, Parlitz U (1995) General approach for chaotic synchronization with application to communication. Phys Rev Lett 74(25):5028-5031.CrossRefGoogle Scholar
  32. 32.
    Zou F, Nossek J (1991) A Chaotic Attractor with Cellular Neural Networks. IEEE Transaction on Circuits and Systems 38(7):811-812.CrossRefGoogle Scholar
  33. 33.
    Zou F, Joset A (1993) Nossek. Bifurcation and chaos in Cellular Neural Net- works. IEEE Transaction on Circuits and Systems-I: Fundamental Theory and Applications 40(3):166-173.zbMATHCrossRefGoogle Scholar
  34. 34.
    Kaneko K (1990) Clustering, coding, switching, hierarchical ordering and control in a network of chaotic elements. Physics D 41(22):137-172.zbMATHCrossRefGoogle Scholar
  35. 35.
    Aihara K, Takabe T, Toyoda M (1990) Chaotic Neural Networks. Phys Lett A 144(6):333-340.CrossRefMathSciNetGoogle Scholar
  36. 36.
    Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Phys Lett A 158(8):373-376.CrossRefGoogle Scholar
  37. 37.
    Addison P (1997) Fractals and Chaos - an illustrated course, Institute of physics publishing.Google Scholar
  38. 38.
    Fang Y, Yu Y (1993) Dynamic analysis of chaotic neurons. In Proceedings of Chinese Conference on Neural Networks, 199-203.Google Scholar
  39. 39.
    Nagayama I (1995) Spectral Analysis of the Chaotic Behavior Obtained by Neural Networks. In Proceedings of 1995 International Conference on Neural Networks, 28-31.Google Scholar
  40. 40.
    Kudelski A (1994) Method for scrambling and unscrambling a video signal. United States Patent 5375168.Google Scholar
  41. 41.
    Access control system for the MAC/packet family: EUROCRYPT. European Standard EN 50094, CENELEC (1992)Google Scholar
  42. 42.
    Maniccam S, Bourbakis N (2004) Image and video encryption using SCAN patterns. Pattern Recognition 37(4):725-737.CrossRefGoogle Scholar
  43. 43.
    Qiao L, Nahrstedt K (1997) A new algorithm for MPEG video encryption. In Proceeding of the First International Conference on Imaging Science, Systems and Technology (CISST’97),21-29.Google Scholar
  44. 44.
    Romeo R, Romdotti G, Mattavelli M, Mlynek D (1999) Cryptosystem architectures for very high throughput multimedia encryption: the RPK solution. In Proceedings of ICECS’99, 1:261-264.Google Scholar
  45. 45.
    Shi C, Wang S, Bhargava, B (1999) MPEG video encryption in real-time using secret key cryptography. In Proc. of International Conference of Parallel and Distributed Processing Techniques and Applications (PDPTA’99), 2822-2828.Google Scholar
  46. 46.
    Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A New Chaotic Algorithm for Video Encryption. IEEE Transactions on Consumer Electronics 48(4):838-844.CrossRefGoogle Scholar
  47. 47.
    Yen J, Guo J (1999) A new MPEG encryption system and its VLSI architecture. In Proceeding of IEEE Workshop on Signal Processing Systems,430-437.Google Scholar
  48. 48.
    Tosum A, Feng W (2000) Efficient multi-layer coding and encryption of MPEG video streams. In Proceedings of IEEE International Conference on Multimedia and Expo (I), 119-122.Google Scholar
  49. 49.
    Qiao L, Nahrstedt K, Tam I (1997) Is MPEG encryption by using random list instead of zigzag order secure. In Proceeding of IEEE International Symposium on Consumer Electronics, 226-229.Google Scholar
  50. 50.
    Shi C, Bhargava B (1998) A fast MPEG video encryption algorithm. In Proceedings of the 6th ACM International Multimedia Conference, 81-88.Google Scholar
  51. 51.
    Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimedia 5(1):118-129.CrossRefGoogle Scholar
  52. 52.
    Wu C, Kuo C (2000) Fast encryption methods for audiovisual data confiden- tiality. In SPIE International Symposia on Information Technologies 2000, Proceedings of SPIE 4209:284-295.Google Scholar
  53. 53.
    Wu C, Kuo C (2001) Efficient multimedia encryption via entropy codec design. In SPIE International Symposium on Electronic Imaging 2001, Proceedings of SPIE 4314.Google Scholar
  54. 54.
    Lian S, Sun J, Wang Z (2004) Perceptual Cryptography on SPIHT Compressed Images or Videos. In Proceedings of 2004 IEEE Conference on Multimedia & Expo (ICME2004), 3:2195-2198.Google Scholar
  55. 55.
    Lian S, Sun J, Wang Z (2004) A Novel Image Encryption Scheme Based-on JPEG Encoding. In Proceedings of the Eighth International Conference on Information Visualization (IV), 217-220.Google Scholar
  56. 56.
    Li S, Chen G, Mou X (2005) On the Dynamical Degradation of Digital Piece-wise Linear Chaotic Maps. International Journal of Bifurcation and Chaos 15(10):3119-3151.zbMATHCrossRefMathSciNetGoogle Scholar
  57. 57.
    Security Requirements for Cryptographic Modules (Change Notice). Federal Information Processing Standards Publication (FIPS PUB) 140-1 (2001).Google Scholar
  58. 58.
    ITU-T Rec. H.264/ISO/IEC 11496-10. Advanced Video Coding. Final Committee Draft, Document JVT-E022 (2002).Google Scholar
  59. 59.
    Ahn J, Shim H, Jeon B, Choi I (2004) Digital Video Scrambling Method Using Intra Prediction Mode. PCM2004, Springer, LNCS 3333:386-393.Google Scholar
  60. 60.
    Lian S, Sun J, Zhang D, Wang Z (2004) A Selective Image Encryption Scheme Based on JPEG2000 Codec. In Proceedings of 2004 Pacific-Rim Conference on Multimedia, Springer LNCS 3332:65-72.Google Scholar
  61. 61.
    Podesser M, Schmidt H, Uhl A (2002) Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002). Tromso-Trondheim, Norway.Google Scholar
  62. 62.
    Fridrich J, Goljan M, Du R (2001) Invertible Authentication. In: Proceeding of SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, 3971:197-208.Google Scholar
  63. 63.
    Fridrich J (2000) Visual Hash Functions for Obvious Watermarking. In: Proceeding of SPIE Photonic West Electronic Imaging 2000, Security and Water-marking of Multimedia Contents, San Jose, California, 286-294.Google Scholar
  64. 64.
    Fridrich J, Goljan M (2000) Robust Hash Functions for Digital Watermarking. The International Conference on Information Technology: Coding and Computing Las Vegas, Nevada, 178-183.Google Scholar
  65. 65.
    Lin C, Chang S (1998) A Robust Image Authentication Method Surviving JPEG Lossy Compression. In: Proceedings of SPIE Storage and Retrieval of Image/Video Databases, San Jose, 3312:296-307.Google Scholar
  66. 66.
    Rivest R (1992) The MD5 Message Digest Algorithm. RFC 1321.Google Scholar
  67. 67.
    Xiao D, Liao X (2004) A Combined Hash and Encryption Scheme by Chaotic Neural Network. In Proceedings of ISNN2004, 2:633-638.Google Scholar
  68. 68.
    Yeung M, Mintzer F (1997) An Invisible Watermarking Technique for Image Verification. In: Proceeding of ICIP’97, Santa Barbara, California, 2:680-683.Google Scholar
  69. 69.
    Zhusubaliyev Z, Mosekilde E (2003) Bifurcations and Chaos in Piecewise-Smooth Dynamical Systems. World Scientific, Singapore.zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Shiguo Lian
    • 1
  1. 1.SAMI LabFrance Telecom R&D BeijingBeijingChina

Personalised recommendations