Skip to main content

Secure Media Distribution Scheme Based on Chaotic Neural Network

  • Conference paper
Advances in Neural Networks – ISNN 2007 (ISNN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4492))

Included in the following conference series:

Abstract

A secure media distribution scheme is proposed in this paper, which distributes different copy of media content to different customer in a secure manner. At the sender side, media content is encrypted with a chaotic neural network based cipher under the control of a secret key. At the receiver side, the encrypted media content is decrypted with the same cipher under the control of both a secret key and the customer information. Thus, the decrypted media copy containing customer information is slightly different from the original one. The difference can be detected and used to trace media content’s illegal distribution. The scheme’s performances, including security, imperceptibility and robustness, are analyzed and tested. It is shown that the scheme is suitable for secure media distribution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chan, C., Cheng, L.: Pseudorandom Generator Based on Clipped Hopfield Neural Network. In: Proceedings of IEEE International Symposium on Circuits and Systems, vol. 3, pp. 183–186 (1998)

    Google Scholar 

  2. Guo, D., Cheng, L., Cheng, L.: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural networks. Applied Intelligence 10(1), 71–84 (1999)

    Article  Google Scholar 

  3. Xiang, T., Liao, X., Tang, G., Chen, Y., Wong, K.: A Novel Block Cryptosystem Based on Iterating a Chaotic Map. Physics Letters A 349(1-4), 109–115 (2006)

    Article  Google Scholar 

  4. Lian, S., Sun, J., Wang, Z.: Secure Hash Function Based on Neural Networks. Neurocomputing 69(16-18), 2346–2350 (2006)

    Article  Google Scholar 

  5. Xiao, D., Liao, X., Deng, S.: One-way Hash Function Construction Based on the Chaotic Map with Changeable-parameter. Chaos, Solitons & Fractals 24(1), 65–71 (2005)

    MATH  MathSciNet  Google Scholar 

  6. Rachel, M., Einat, K., Wolfgang, K.: Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps. Physical Review Letters 91(11), 1–4 (2003)

    Google Scholar 

  7. Cauwenberghs, G.: Delta-sigma Cellular Automata for Analog VLSI Random Vector Generation. IEEE Trans. Circuits and Systems II 46(3), 240–250 (1999)

    Article  Google Scholar 

  8. Chan, C., Cheng, L.: The Convergence Properties of a Clipped Hopfield Network and its Application in the Design of Keystream Generator. IEEE Trans. Neural Networks 12(2), 340–348 (2001)

    Article  Google Scholar 

  9. Karras, D., Zorkadis, V.: On Neural Network Techniques in the Secure Management of Communication Systems through Improving and Quality Assessing Pseudorandom Stream Generators. Neural Networks 16(5-6), 899–905 (2003)

    Article  Google Scholar 

  10. Caponetto, R., Lavorgna, M., Occhipinti, L.: Cellular Neural Networks in Secure Transmission Applications. In: Proceedings of the IEEE International Workshop on Cellular Neural Networks and their Applications, pp. 411–416 (1996)

    Google Scholar 

  11. Yen, J., Guo, J.: A Chaotic Neural Network for Signal Encryption/Decryption and Its VLSI Architecture. In: Proc. 10th (Taiwan) VLSI Design/CAD Symposium, pp. 319–322 (1999)

    Google Scholar 

  12. Yee, L., Silva, D.: Application of Multilayer Perception Networks in Symmetric Block Ciphers. In: Proceedings of International Joint Conference on Neural Networks, vol. 2, pp. 1455–1458 (2002)

    Google Scholar 

  13. Yue, T., Chiang, S.: A Neural Network Approach for Visual Cryptography. In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, vol. 5, pp. 494–499 (2000)

    Google Scholar 

  14. Lian, S., Chen, G., Cheung, A., Wang, Z.: A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 627–632. Springer, Heidelberg (2004)

    Google Scholar 

  15. Lian, S., Sun, J., Li, Z., Wang, Z.: A fast MPEG4 video encryption scheme based on chaotic neural network. In: Pal, N.R., Kasabov, N., Mudi, R.K., Pal, S., Parui, S.K. (eds.) ICONIP 2004. LNCS, vol. 3316, pp. 720–725. Springer, Heidelberg (2004)

    Google Scholar 

  16. Wang, S., Kuang, J., Li, J.: Chaos-based Communication in A Large Community. Phys.Rev. 66(6), 1–4 (2002)

    MATH  Google Scholar 

  17. Kuang, J., Deng, K., Huang, R.: An Encryption Approach to Digital Communication by Using Spatiotemporal Chaos Synchronizaiton. Acta Physica 50(10), 1806–1856 (2001)

    Google Scholar 

  18. Lian, S., Sun, J., Wang, J., Wang, Z.: A Chaotic Stream Cipher and the Usage in Video Protection. Chaos, Solitons & Fractals. In Press, Corrected Proof, Available online 14 June (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Derong Liu Shumin Fei Zengguang Hou Huaguang Zhang Changyin Sun

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Lian, S., Liu, Z., Ren, Z., Wang, H. (2007). Secure Media Distribution Scheme Based on Chaotic Neural Network. In: Liu, D., Fei, S., Hou, Z., Zhang, H., Sun, C. (eds) Advances in Neural Networks – ISNN 2007. ISNN 2007. Lecture Notes in Computer Science, vol 4492. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72393-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72393-6_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72392-9

  • Online ISBN: 978-3-540-72393-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics