Font Size: a A A

Multi Chaotic Video Encryption Research Based On H.264

Posted on:2017-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y C MaFull Text:PDF
GTID:2308330503492206Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of multimedia technology, the use of video technology more widely, more in-depth live video use. But the art of image, voice encryption has been very mature, and the security aspects of the transmission of video protection is very weak, so today’s society for video transmission security has become a hot issue of concern. On the one hand, not only for video transmission quality have become increasingly demanding, to ensure that the receiver can restore the original image.On the other hand, video information transmission security and real-time transmission is also put forward higher requirements, and has a strong network of applicability.In terms of compression standard, to calculate the amount of existing compression techniques is large, lower compression ratio, the scope is also low. The H.264 video compression technology has a strong network adaptability, low data rate transmission,while improving coding efficiency, but also to solve the characteristics of real-time transmission. In terms of encryption, chaotic encryption method has the sensitivity to initial conditions, slight differences to the initial value after a few iterations, forming a series of disorganized data. Nor by mathematical statistical method to initial recovery and cracking. However, relying solely on a single chaotic encryption protection for video data is not enough. Some chaotic encryption algorithm to select opportunities plaintext attack caused even high-dimensional chaotic system has been cracked, a simple chaotic encryption has been a great challenge.This topic first studied H.264 compression and chaotic encryption has a different order of the Effect of the conclusion that the first chaotic encryption, then the H.264 compression algorithm compresses better than before, after the chaotic encryption effect.For key space were analyzed experimental data prove the key is safe after the correlation analysis of adjacent pixels, can be chaotic video frames. Finally, experimental testing,analysis of real-time systems, prove this algorithm can guarantee real-time but also to ensure safety.
Keywords/Search Tags:H.264, chaotic encryption, real-time, key space
PDF Full Text Request
Related items