Design and Implementation of Secured Video Transmission in Data Link Applications
Mohamed Mohamed Ismail Elkholy;
Abstract
Video transmission is required in many applications, especially in military application, such as the transmission of video from unmanned aerial vehicle (UAV) to a ground station. Since video streams are important data, so it is importantto protect these data from intruders. In recent years, chaos theory has attracted much interest in the engineering community.One of the great achievements of the chaos theory is its application in secure communications.
There are many features of chaotic systems such as aperiodicity, extreme sensitivity to variation of parameters or initial conditions, and structure complexity. These features meet cryptography requirements such as diffusion, confusion, randomness and complexity of the algorithm.
In addition to chaotic-based cryptography, many techniques such as chaotic masking, chaotic shift keying (CSK) and chaotic parameter modulation are used to implement secure communication systems. These techniques have wide attention after achieving synchronization between two chaotic systems.
Recently, there are different chaotic systems have been proposed to be applicable for securing different types of data such as images, video streams and audio data. In order to obtain more complex chaotic generators for more secured schemes, hyper chaoticsystems are constructed.Hyper chaotic systems have more parameters and more complex attractors than nominal chaotic systems.According to thesecharacteristics, the design and implementation of secure communication systems to send different types of data based on hyper chaotic systems will be proposed.
There are many features of chaotic systems such as aperiodicity, extreme sensitivity to variation of parameters or initial conditions, and structure complexity. These features meet cryptography requirements such as diffusion, confusion, randomness and complexity of the algorithm.
In addition to chaotic-based cryptography, many techniques such as chaotic masking, chaotic shift keying (CSK) and chaotic parameter modulation are used to implement secure communication systems. These techniques have wide attention after achieving synchronization between two chaotic systems.
Recently, there are different chaotic systems have been proposed to be applicable for securing different types of data such as images, video streams and audio data. In order to obtain more complex chaotic generators for more secured schemes, hyper chaoticsystems are constructed.Hyper chaotic systems have more parameters and more complex attractors than nominal chaotic systems.According to thesecharacteristics, the design and implementation of secure communication systems to send different types of data based on hyper chaotic systems will be proposed.
Other data
| Title | Design and Implementation of Secured Video Transmission in Data Link Applications | Other Titles | " تصميم وتنفيذ وحدة تأمين الإشارات المرئية فى تطبيقات نقل البيانات" | Authors | Mohamed Mohamed Ismail Elkholy | Issue Date | 2016 |
Attached Files
| File | Size | Format | |
|---|---|---|---|
| G14087.pdf | 540.57 kB | Adobe PDF | View/Open |
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.