Design and Implementation of Secured Video Transmission in Data Link Applications

Mohamed Mohamed Ismail Elkholy;

Abstract


Video transmission is required in many applications, especially in military application, such as the transmission of video from unmanned aerial vehicle (UAV) to a ground station. Since video streams are important data, so it is importantto protect these data from intruders. In recent years, chaos theory has attracted much interest in the engineering community.One of the great achievements of the chaos theory is its application in secure communications.
There are many features of chaotic systems such as aperiodicity, extreme sensitivity to variation of parameters or initial conditions, and structure complexity. These features meet cryptography requirements such as diffusion, confusion, randomness and complexity of the algorithm.
In addition to chaotic-based cryptography, many techniques such as chaotic masking, chaotic shift keying (CSK) and chaotic parameter modulation are used to implement secure communication systems. These techniques have wide attention after achieving synchronization between two chaotic systems.
Recently, there are different chaotic systems have been proposed to be applicable for securing different types of data such as images, video streams and audio data. In order to obtain more complex chaotic generators for more secured schemes, hyper chaoticsystems are constructed.Hyper chaotic systems have more parameters and more complex attractors than nominal chaotic systems.According to thesecharacteristics, the design and implementation of secure communication systems to send different types of data based on hyper chaotic systems will be proposed.


Other data

Title Design and Implementation of Secured Video Transmission in Data Link Applications
Other Titles " تصميم وتنفيذ وحدة تأمين الإشارات المرئية فى تطبيقات نقل البيانات"
Authors Mohamed Mohamed Ismail Elkholy
Issue Date 2016

Attached Files

File SizeFormat
G14087.pdf540.57 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 4 in Shams Scholar
downloads 8 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.