Font Size: a A A

Design Of Network Video Monitoring System Based On ARM And Chaotic Cryptographic

Posted on:2013-10-15Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2248330395962400Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, people pay more and more attention to safety problems. As an important part of the security industry, video monitoring used widely in the national defense construction, intelligent traffic, family security and many other fields. Video monitoring technology, through simulation video monitoring, digital video monitoring and now network video monitoring, the latest technology, is developing in the direction of the digital and networked.Keep the information security is an inevitable and important subject in the development of science and technology, the rise of cryptography is study how through encrypt information to ensure the safety of the information. For some sensitive sites in monitoring, such as banks, family and military, because of just the designated authorized users can used it, so it need put monitor information to encrypt. Research in the video and other large quantity of data information encryption technology, the sequential cipher is gradually replacing traditional cryptography algorithms which are high strength, to ensure safety in the premise of the real-time get higher. Chaotic cryptographic algorithm as a new branch of cryptography, with its extreme parameter sensitivity, fast sequences generation is gradually cause the attention of people.In these application background, this paper combine network video monitoring and chaos cryptographic algorithm, design a network video monitoring system with chaos encryption based on ARM. Use chaos encryption algorithm in video monitoring, to enhance the safety of monitoring information. The main work includes the following aspects:(1) Discussed cryptography and chaotic cryptography basic theory, mainly studied the connection between the chaos and cryptography. And through the Logistic chaotic system, analyzed the basic characteristics of chaos. On this basis, we studied the realization process of chaotic sequence cryptographic algorithm, Laid theoretical foundation for the chaotic cryptographic algorithm applied to video information encryption.(2) Based on Lorenz chaotic system bring forward a improved chaotic system model, and analyzed including the dissipative, balance point, bifurcation diagram, Lyapunov index, and other aspects of the dynamic analysis in this model. Based on this chaotic system designed a chaos pseudo random sequence generator, used standard test method provided by NIST to test performance of sequence produced by the generator. And in the DSP system used the chaotic system to produce chaotic sequence on the voice data encryption, verify the sequence of encryption performance. (3) Completed the design of network video monitoring system in the ARM hardware platform based on the Linux operating system. Include embedded Linux system of transplantation, the file system building, the realization of the device driver, web server load and so on. System used USB cameras, with the characteristics of plug and play. Through the V4L programming got video data, studied image compression coding to reduced data redundancy, and used the TCP/IP protocol to achieve the transmission of images. In the aspect of information security through analyzed the image data, realized encrypted image data by chaotic algorithm. And we showed the encryption results with the proposed algorithm. Video monitoring terminal we designed the login page and video monitoring page based on browser, Used CGI technology realized the logical interaction between monitoring terminal and collecting terminal.(4) Validated the logic function of the network video monitoring system, and analyzed the security of the system from the angle of key space and key sensitivity. The results show that the system has a convenient use, high security, friendly interface and so on, suitable for general safety monitoring field use.
Keywords/Search Tags:Chaos, Chaotic Cipher, Network Video Monitoring, Video Encryption, Chaotic Numeral Sequence
PDF Full Text Request
Related items