메뉴 건너뛰기




Volumn 57, Issue , 2007, Pages 51-78

Multimedia content protection based on chaotic neural networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34248372374     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-540-71078-3_2     Document Type: Article
Times cited : (6)

References (69)
  • 1
    • 0000451936 scopus 로고
    • Evidence for Chaotic Dynamics of Brain Activity during the Sleep Cycle
    • Babloyantz A, Salazar J, Nicolis C (1985) Evidence for Chaotic Dynamics of Brain Activity during the Sleep Cycle. Phys Lett 111:152-156
    • (1985) Phys Lett , vol.111 , pp. 152-156
    • Babloyantz, A.1    Salazar, J.2    Nicolis, C.3
  • 2
    • 34248336345 scopus 로고    scopus 로고
    • Wasserman P (1993) Advanced Methods in Neural Computing. New York: Van Nostrand Reinhold, New York
    • Wasserman P (1993) Advanced Methods in Neural Computing. New York: Van Nostrand Reinhold, New York
  • 3
    • 0027808213 scopus 로고
    • Evolution of Periodic States and Chaos in Two Types of Neural Models
    • Ditto Wed, Washington: SPIE
    • Chay T, Fan Y (1993) Evolution of Periodic States and Chaos in Two Types of Neural Models. In: Ditto W(ed.) Chaos in Biology and Medicine, Proc SPIE, Washington: SPIE, 2036:100-114
    • (1993) Chaos in Biology and Medicine, Proc SPIE
    • Chay, T.1    Fan, Y.2
  • 5
    • 17444414088 scopus 로고
    • A Chaos Neuro-computer
    • Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Physical Letter A 158(8):373-376
    • (1991) Physical Letter A , vol.158 , Issue.8 , pp. 373-376
    • Inoue, M.1    Nagayoshi, A.2
  • 9
    • 0032687653 scopus 로고    scopus 로고
    • A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural networks
    • Guo D, Cheng L, Cheng L (1999) A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural networks. Applied Intelligence 10(1):71-84
    • (1999) Applied Intelligence , vol.10 , Issue.1 , pp. 71-84
    • Guo, D.1    Cheng, L.2    Cheng, L.3
  • 10
    • 29544432540 scopus 로고    scopus 로고
    • A novel block cryptosystem based on iterating a chaotic map
    • Xiang T, Liao X, Tang G, Chen Y, Wong K (2006) A novel block cryptosystem based on iterating a chaotic map. Physics Letters A 349(1-4):109-115
    • (2006) Physics Letters A , vol.349 , Issue.1-4 , pp. 109-115
    • Xiang, T.1    Liao, X.2    Tang, G.3    Chen, Y.4    Wong, K.5
  • 11
    • 9644303109 scopus 로고    scopus 로고
    • One-way Hash function construction based on the chaotic map with changeable-parameter
    • Xiao D, Liao X, Deng S (2005) One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24(1):65-71
    • (2005) Chaos, Solitons & Fractals , vol.24 , Issue.1 , pp. 65-71
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 12
    • 0142120725 scopus 로고    scopus 로고
    • Rachel M, Einat K, Wolfgang K (2003) Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps. Physical Review Letters 91(11):118701/1-118701/4
    • Rachel M, Einat K, Wolfgang K (2003) Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps. Physical Review Letters 91(11):118701/1-118701/4
  • 14
    • 0035271446 scopus 로고    scopus 로고
    • The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
    • Chan C, Cheng L (2001) The convergence properties of a clipped Hopfield network and its application in the design of keystream generator. IEEE Transactions on Neural Networks 12(2):340-348
    • (2001) IEEE Transactions on Neural Networks , vol.12 , Issue.2 , pp. 340-348
    • Chan, C.1    Cheng, L.2
  • 15
    • 0038355068 scopus 로고    scopus 로고
    • On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
    • Karras D, Zorkadis V (2003) On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators. Neural Networks 16(5-6):899-905
    • (2003) Neural Networks , vol.16 , Issue.5-6 , pp. 899-905
    • Karras, D.1    Zorkadis, V.2
  • 18
    • 0009599372 scopus 로고    scopus 로고
    • A Chaotic Neural Network for Signal Encryption/ Decryption and Its VLSI Architecture
    • Yen J, Guo J (1999) A Chaotic Neural Network for Signal Encryption/ Decryption and Its VLSI Architecture. In: Proc. 10th (Taiwan) VLSI Design/CAD Symposium, 319-322
    • (1999) Proc. 10th (Taiwan) VLSI Design/CAD Symposium , pp. 319-322
    • Yen, J.1    Guo, J.2
  • 19
    • 24944525903 scopus 로고    scopus 로고
    • A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images
    • Proceedings of 2004 IEEE Symposium on Neural Networks ISNN2004
    • Lian S, Chen G, Cheung A, Wang Z (2004) A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In Proceedings of 2004 IEEE Symposium on Neural Networks (ISNN2004),Springer LNCS, 3174:627-632
    • (2004) Springer LNCS , vol.3174 , pp. 627-632
    • Lian, S.1    Chen, G.2    Cheung, A.3    Wang, Z.4
  • 22
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon C (1949) Communication theory of secrecy systems. Bell System Technical Journal 28:656-715
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.1
  • 23
    • 35048844681 scopus 로고    scopus 로고
    • Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
    • Proceedings of the 2004 Pacific-Rim Conference on Multimedia PCM2004
    • Li C, Li S, Zhang D, Chen G (2004) Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. In Proceedings of the 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer LNCS, 3333:418-425
    • (2004) Springer LNCS , vol.3333 , pp. 418-425
    • Li, C.1    Li, S.2    Zhang, D.3    Chen, G.4
  • 24
    • 0032089417 scopus 로고    scopus 로고
    • Symmetric ciphers based on two-dimensional chaotic maps
    • Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8(6):1259-1284
    • (1998) Int. J. Bifurcation and Chaos , vol.8 , Issue.6 , pp. 1259-1284
    • Fridrich, J.1
  • 25
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3D chaotic cat maps
    • Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 12:749-761
    • (2004) Chaos, Solitons and Fractals , vol.12 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Chui, C.3
  • 26
    • 0036404061 scopus 로고    scopus 로고
    • Li S, Zheng X, Mou X, Cai Y (2002) Chaotic Encryption Scheme for Real-time Digital Video. In Proceedings of SPIE, Electronic Imaging, Real-time Imaging V1, 4666:149-160
    • Li S, Zheng X, Mou X, Cai Y (2002) Chaotic Encryption Scheme for Real-time Digital Video. In Proceedings of SPIE, Electronic Imaging, Real-time Imaging V1, 4666:149-160
  • 27
    • 0034197739 scopus 로고    scopus 로고
    • Synchronization of chaotic neural network and its application in secure communication
    • Ren X, Hu G, Tan Z (2000) Synchronization of chaotic neural network and its application in secure communication. Journal of Shanghai Jiaotong University 34(6):744-747
    • (2000) Journal of Shanghai Jiaotong University , vol.34 , Issue.6 , pp. 744-747
    • Ren, X.1    Hu, G.2    Tan, Z.3
  • 28
    • 26444565569 scopus 로고
    • Finding structure in time
    • Elman J (1990) Finding structure in time. Cognitive Science 14:179-211
    • (1990) Cognitive Science , vol.14 , pp. 179-211
    • Elman, J.1
  • 29
    • 34250315551 scopus 로고
    • Continuous control of chaos by self controlling feedback
    • Pyragas K (1992)Continuous control of chaos by self controlling feedback. Phys Lett A 170:421-428
    • (1992) Phys Lett A , vol.170 , pp. 421-428
    • Pyragas, K.1
  • 30
    • 0002535932 scopus 로고
    • Chaotic synchronization and controlling chaos based on contraction maps
    • Ushio T (1995) Chaotic synchronization and controlling chaos based on contraction maps. Phys Lett A 198:14-22
    • (1995) Phys Lett A , vol.198 , pp. 14-22
    • Ushio, T.1
  • 31
    • 11944272386 scopus 로고
    • General approach for chaotic synchronization with application to communication
    • Kocarev L, Parlitz U (1995) General approach for chaotic synchronization with application to communication. Phys Rev Lett 74(25):5028-5031
    • (1995) Phys Rev Lett , vol.74 , Issue.25 , pp. 5028-5031
    • Kocarev, L.1    Parlitz, U.2
  • 32
  • 34
    • 45149135778 scopus 로고
    • Clustering, coding, switching, hierarchical ordering and control in a network of chaotic elements
    • Kaneko K (1990) Clustering, coding, switching, hierarchical ordering and control in a network of chaotic elements. Physics D 41(22):137-172
    • (1990) Physics D , vol.41 , Issue.22 , pp. 137-172
    • Kaneko, K.1
  • 35
  • 36
    • 17444414088 scopus 로고
    • A Chaos Neuro-computer
    • Inoue M, Nagayoshi A (1991) A Chaos Neuro-computer. Phys Lett A 158(8):373-376
    • (1991) Phys Lett A , vol.158 , Issue.8 , pp. 373-376
    • Inoue, M.1    Nagayoshi, A.2
  • 40
    • 33746978693 scopus 로고
    • Method for scrambling and unscrambling a video signal
    • United States Patent 5375168
    • Kudelski A (1994) Method for scrambling and unscrambling a video signal. United States Patent 5375168
    • (1994)
    • Kudelski, A.1
  • 41
    • 34248370278 scopus 로고    scopus 로고
    • Access control system for the MAC/packet family: EUROCRYPT. European Standard EN 50094, CENELEC (1992)
    • Access control system for the MAC/packet family: EUROCRYPT. European Standard EN 50094, CENELEC (1992)
  • 42
    • 1542316660 scopus 로고    scopus 로고
    • Image and video encryption using SCAN patterns
    • Maniccam S, Bourbakis N (2004) Image and video encryption using SCAN patterns. Pattern Recognition 37(4):725-737
    • (2004) Pattern Recognition , vol.37 , Issue.4 , pp. 725-737
    • Maniccam, S.1    Bourbakis, N.2
  • 44
    • 0013170052 scopus 로고    scopus 로고
    • Cryptosystem architectures for very high throughput multimedia encryption: The RPK solution
    • Romeo R, Romdotti G, Mattavelli M, Mlynek D (1999) Cryptosystem architectures for very high throughput multimedia encryption: The RPK solution. In Proceedings of ICECS'99, 1:261-264
    • (1999) Proceedings of ICECS'99 , vol.1 , pp. 261-264
    • Romeo, R.1    Romdotti, G.2    Mattavelli, M.3    Mlynek, D.4
  • 51
    • 0038273965 scopus 로고    scopus 로고
    • Efficient frequency domain selective scrambling of digital video
    • Zeng W, Lei S (2003) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimedia 5(1):118-129
    • (2003) IEEE Trans Multimedia , vol.5 , Issue.1 , pp. 118-129
    • Zeng, W.1    Lei, S.2
  • 52
    • 0034992482 scopus 로고    scopus 로고
    • Fast encryption methods for audiovisual data confidentiality. In SPIE International Symposia on Information Technologies 2000
    • Wu C, Kuo C (2000) Fast encryption methods for audiovisual data confidentiality. In SPIE International Symposia on Information Technologies 2000, Proceedings of SPIE 4209:284-295
    • (2000) Proceedings of SPIE , vol.4209 , pp. 284-295
    • Wu, C.1    Kuo, C.2
  • 56
    • 29244491993 scopus 로고    scopus 로고
    • On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps
    • Li S, Chen G, Mou X (2005) On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. International Journal of Bifurcation and Chaos 15(10):3119-3151
    • (2005) International Journal of Bifurcation and Chaos , vol.15 , Issue.10 , pp. 3119-3151
    • Li, S.1    Chen, G.2    Mou, X.3
  • 57
    • 34248372994 scopus 로고    scopus 로고
    • Security Requirements for Cryptographic Modules (Change Notice). Federal Information Processing Standards Publication (FIPS PUB) 140-1 (2001)
    • Security Requirements for Cryptographic Modules (Change Notice). Federal Information Processing Standards Publication (FIPS PUB) 140-1 (2001)
  • 58
    • 34248382233 scopus 로고    scopus 로고
    • ITU-T Rec. H.264/ISO/IEC 11496-10. Advanced Video Coding. Final Committee Draft, Document JVT-E022 (2002)
    • ITU-T Rec. H.264/ISO/IEC 11496-10. Advanced Video Coding. Final Committee Draft, Document JVT-E022 (2002)
  • 59
    • 33645966853 scopus 로고    scopus 로고
    • Digital Video Scrambling Method Using Intra Prediction Mode. PCM2004, Springer
    • Ahn J, Shim H, Jeon B, Choi I (2004) Digital Video Scrambling Method Using Intra Prediction Mode. PCM2004, Springer, LNCS 3333:386-393
    • (2004) LNCS , vol.3333 , pp. 386-393
    • Ahn, J.1    Shim, H.2    Jeon, B.3    Choi, I.4
  • 60
    • 34447252956 scopus 로고    scopus 로고
    • A Selective Image Encryption Scheme Based on JPEG2000 Codec
    • Proceedings of 2004 Pacific-Rim Conference on Multimedia
    • Lian S, Sun J, Zhang D, Wang Z (2004) A Selective Image Encryption Scheme Based on JPEG2000 Codec. In Proceedings of 2004 Pacific-Rim Conference on Multimedia, Springer LNCS 3332:65-72
    • (2004) Springer LNCS , vol.3332 , pp. 65-72
    • Lian, S.1    Sun, J.2    Zhang, D.3    Wang, Z.4
  • 66
  • 67
    • 34248366641 scopus 로고    scopus 로고
    • A Combined Hash and Encryption Scheme by Chaotic Neural Network
    • Xiao D, Liao X (2004) A Combined Hash and Encryption Scheme by Chaotic Neural Network. In Proceedings of ISNN2004, 2:633-638
    • (2004) Proceedings of ISNN2004 , vol.2 , pp. 633-638
    • Xiao, D.1    Liao, X.2
  • 68
    • 0031378592 scopus 로고    scopus 로고
    • An Invisible Watermarking Technique for Image Verification
    • Santa Barbara, California
    • Yeung M, Mintzer F (1997) An Invisible Watermarking Technique for Image Verification. In: Proceeding of ICIP'97, Santa Barbara, California, 2:680-683
    • (1997) Proceeding of ICIP'97 , vol.2 , pp. 680-683
    • Yeung, M.1    Mintzer, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.