Chaotic encryption method based on Logistic mapping

A chaotic encryption, encryption and decryption technology, applied in the field of video encryption technology, can solve problems such as immature encryption algorithm

Active Publication Date: 2020-05-01
BEIJING ELECTRONICS SCI & TECH INST
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are a large number of chaotic encryption algorithms available

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic encryption method based on Logistic mapping
  • Chaotic encryption method based on Logistic mapping
  • Chaotic encryption method based on Logistic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] According to one embodiment of the present invention, propose a kind of lightweight chaotic encryption method, comprise the steps:

[0040] Involved in the technical solution of video transmission prototype system:

[0041] (1) Design of the scheme:

[0042] (1.1) server end: at first the technical scheme of the present invention will utilize the camera of notebook to gather video, capture video frame then, by data query, this function can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chaotic encryption method based on Logistic mapping, which is applied to video encryption and decryption transmission. A server and a client are included, the server is usedas a sending end, the client is used as a collecting end, and the method comprises the following steps: 1, collecting a video and capturing a video frame by the sending end; 2, setting a video frame acquisition frame rate, and encoding the acquired video frames; 3, encrypting the encoded video by using a chaotic encryption algorithm of Logistic mapping; 4, establishing a real-time transmission network transmission protocol RTP session, and sending encrypted data; 5, creating a thread by the collection end, and receiving a data packet by using a network transmission protocol RTP session for creating real-time transmission; step 6, decrypting the received video by using a Logistic mapping chaotic encryption algorithm; 7, decoding the received video; and 8, displaying the video frame by usinga picture display control.

Description

technical field [0001] The invention is a chaotic encryption method based on Logistic mapping, which can efficiently and safely encrypt real-time video. Background technique [0002] In recent years, video has become an important carrier of information, and the content of video in transmitted information is becoming larger and larger. Therefore, the security of video during transmission has aroused people's attention and thinking, and has become an important research field. Video encryption is an important means to protect the security of video during transmission, and researching a high-performance encryption algorithm suitable for real-time video information is the key to solving the problem of online video security. Video information has the characteristics of large data volume, special coding structure, and strong real-time requirements. These characteristics put forward new requirements for existing encryption algorithms: while ensuring its security, real-time video en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N21/2347H04N21/4405H04N21/6437H04N21/266
CPCH04N21/2347H04N21/4405H04N21/6437H04N21/26613
Inventor 李晓东刘北圣金鑫
Owner BEIJING ELECTRONICS SCI & TECH INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products