Video chaos encryption method based on quantum cellular neural network
A neural network and chaotic encryption technology, applied in biological neural network models, secure communication through chaotic signals, neural architecture, etc., can solve the problems of corrupted video encoding format, poor real-time video transmission, slow encryption speed, etc., and achieve huge key Space, huge anti-attack performance, and high encryption efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0023] Specific implementation mode one, combination Figure 1 to Figure 6 Explain this embodiment, a video chaotic encryption method based on quantum cellular neural network, figure 1 This is a schematic diagram of the key generation of the encryption method in this embodiment, and the key generation process is described in steps A1 to F1 as follows.
[0024] According to the H.264 video coding standard, the encryption process of the video encryption method of the present invention is as follows: figure 2 As shown, the specific implementation details of the key generation module are as follows figure 1 , Which is realized by step A1 to step F1.
[0025] A1. Take a two-cell quantum cellular neural network hyperchaotic system, and its state equation is:
[0026]
[0027] Where x 1 ,x 2 ,x 3 ,x 4 Is the state variable; ω 1 , Ω 3 It is proportional to the energy between quantum dots in each cell, ω 2 , Ω 4 Represents the weighted effect of the difference in polarizability of adjacent c...
specific Embodiment approach 2
[0074] Specific implementation mode two, combination figure 2 , Figure 5 with Image 6 To describe this embodiment, this embodiment is another example of the first embodiment: the key generation process and the encryption process in the embodiment are the same as those in the first embodiment.
[0075] Combine Figure 5 To explain this embodiment, select the "person" video data in the cif format with a size of 352*288. This embodiment runs in the JM8.6 basic mode of H.264, the video length is 30 frames, and the I frame interval is 8, where extract Figure 5 The original image in the 20th frame.
[0076] Image 6 This is the ciphertext image of the 20th frame image of the "person" video data in this embodiment after being encrypted by the video encryption method of the present invention.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



