Abstract
The sharing, distribution and transmission of proliferated digital multimedia contents over the insecure worldwide available Internet and wired/wireless networks has encouraged the copyright fraud, unauthorized access and illegal usage. This brings new technical challenges to provide the end-to-end security to multimedia contents for establishing ownership rights, ensuring authorized access, preventing illegal replication etc. To address the above mentioned requirements, a visual multimedia content protection technique is proposed. The technique is based on the high dynamic responses of multiple high-dimensional chaotic systems. The multimedia encryption is achieved by randomly picking the actual encryption keys out of numbers of hybridized keys that are extracted from complex sequences of three high dimensional chaotic systems. Accordingly, a high encryption effect is turned up in the encrypted content. The proposed technique is experimented on the multimedia color imagery. The decomposed R, G, B components of color plain-image are initially diffused with their self, before diffusing with encryption keys. It is experimentally verified that the proposed technique has great encryption performance and achieves high confidential security. Eventually, the statistical results confirm the practicability and suitability of the approach for visual multimedia content protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Izquierdo, E., Hyoung, J.K., Macq, B.: Introduction to the Special issue on Authentication, Copyright Protection, and Information Hiding. Special Issue IEEE Transactions on Circuits and Systems for Video Technology 13(8), 729–731 (2003)
Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE 92(6), 918–932 (2004)
Furht, B., Kirovski, D.: Multimedia Security Handbook. CRC Press, Boca Raton (2005)
Lin, E.I., Eskicioglu, A.M., Lagendijk, R.L., Delp, E.J.: Advances in Digital Video Content Protection. Proceedings of the IEEE 93(1), 171–183 (2005)
Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)
Fu, C., Zhang, Z., Cao, Y.: An Improved Image Encryption Algorithm Based on Chaotic Maps. In: International Conference on Natural Computation, pp. 189–193 (2007)
Dang, P.P., Chau, P.M.: Image Encryption for Secure Internet Multimedia Applications. IEEE Transactions on Consumer Electronics 46(3), 395–403 (2000)
Zhou, Y., Panetta, K., Aagaian, S.: Partial Multimedia Encryption with Different Security Levels. In: IEEE Conference on Technologies for Homeland Security, pp. 513–518 (2008)
Hasimoto-Beltrán, R.: High Performance Multimedia Encryption System based on Chaos. CHAOS  18, 023110:1-8 (2008)
Hamdi, M., Boudriga, N.: Secret-Image Sharing for Multimedia Chaotic Encryption. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications, pp. 1–6 (2008)
Francia, G.A., Yang, M., Trifas, M.: Applied Image Processing to Multimedia Information Security. In: International Conference on Image Analysis and Signal Processing, pp. 104–107 (2009)
Corron, N.J., Reed, B.R., Blakely, J.N., Myneni, K., Pethel, S.D.: Chaotic Scrambling for Wireless Analog Video. Communication in Nonlinear Science and Numerical Simulation 15(9), 2504–2513 (2010)
Ahmad, M., Farooq, O.: A Multi-Level Blocks Scrambling Based Chaotic Image Cipher. In: Ranka, S., Banerjee, A., Biswas, K.K., Dua, S., Mishra, P., Moona, R., Poon, S.-H., Wang, C.-L. (eds.) IC3 2010. CCIS, vol. 94, pp. 171–182. Springer, Heidelberg (2010)
Chen, Z., Ip, W.H., Cha, C.Y., Yung, K.: Two-level Chaos based Video Cryptosystem on H. 263 Codec. Nonlinear Dynamics 62(3), 647–664 (2010)
Lian, S.: Efficient Image or Video Encryption based on Spatiotemporal Chaos System. Chaos, Solitons & Fractals 40(5), 2509–2519 (2009)
Ahmad, M., Farooq, O.: Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 257–264. Springer, Heidelberg (2011)
Shannon, C.E.: A Mathematical Theory of Communication. Bell Systems Technical Journal 27(3), 379–423 (1948)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmad, M., Ahmad, T., Gupta, C. (2012). Multiple 3D Chaotic Systems Based Approach for Visual Multimedia Content Protection. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-29216-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29215-6
Online ISBN: 978-3-642-29216-3
eBook Packages: Computer ScienceComputer Science (R0)