CHAOS BASED ENCRYPTION NEIL PARMAR DEPARTMENT OF COMPUTER SCIENCE.

Slides:



Advertisements
Similar presentations
Embedded Algorithm in Hardware: A Scalable Compact Genetic Algorithm Prabhas Chongstitvatana Chulalongkorn University.
Advertisements

Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Block Ciphers and the Data Encryption Standard
Unit 13 Analysis of Clocked Sequential Circuits Ku-Yaw Chang Assistant Professor, Department of Computer Science and Information.
Design Technology Center National Tsing Hua University IC-SOC Design Driver Highlights Cheng-Wen Wu.
Efficient Bit Allocation and CTU level Rate Control for HEVC Picture Coding Symposium, 2013, IEEE Junjun Si, Siwei Ma, Wen Gao Insitute of Digital Media,
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Losslessy Compression of Multimedia Data Hao Jiang Computer Science Department Sept. 25, 2007.
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 11, NOVEMBER 2011 Qian Zhang, King Ngi Ngan Department of Electronic Engineering, the Chinese university.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
MIMO-OFDM MIMO MIMO High diversity gain (space-time coding) High diversity gain (space-time coding) High multiplexing gain (BLAST) High multiplexing gain.
1 Real time signal processing SYSC5603 (ELG6163) Digital Signal Processing Microprocessors, Software and Applications Miodrag Bolic.
University of Jyväskylä – Department of Mathematical Information Technology Computer Science Teacher Education ICNEE 2004 Topic Case Driven Approach for.
DSP-FPGA Based Image Processing System Final Presentation Jessica Baxter  Sam Clanton Simon Fung-Kee-Fung Almaaz Karachi  Doug Keen Computer Integrated.
Liquan Shen Zhi Liu Xinpeng Zhang Wenqiang Zhao Zhaoyang Zhang An Effective CU Size Decision Method for HEVC Encoders IEEE TRANSACTIONS ON MULTIMEDIA,
Kinect Player Gender Recognition from Speech Analysis
A Fast and Robust Fingertips Tracking Algorithm for Vision-Based Multi-touch Interaction Qunqun Xie, Guoyuan Liang, Cheng Tang, and Xinyu Wu th.
Introduction to Adaptive Digital Filters Algorithms
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng Computer-Aided Design Vol. 38 (Nov. 2006) 1154–1165 Reporter:
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
 Tsung-Sheng Fu, Hua-Tsung Chen, Chien-Li Chou, Wen-Jiin Tsai, and Suh-Yin Lee Visual Communications and Image Processing (VCIP), 2011 IEEE, 6-9 Nov.
Curtis Kelsey University of Missouri A FINGERPRINTING SYSTEM MOBILE MODEL FOR VIDEO COPY PROTECTION.
Video Tracking Using Learned Hierarchical Features
1 Chaotic Generator in Digital Secure Communication 張 書 銘 交通大學應用數學系 2008 年 12 月 20 日.
Back-Propagation MLP Neural Network Optimizer ECE 539 Andrew Beckwith.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Can Cloud Computing be Used for Planning? An Initial Study Authors: Qiang Lu*, You Xu†, Ruoyun Huang†, Yixin Chen† and Guoliang Chen* from *University.
Virginia Polytechnic Institute and State University Bradley Department of Electrical and Computer Engineering 1.
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,
Sadaf Ahamed G/4G Cellular Telephony Figure 1.Typical situation on 3G/4G cellular telephony [8]
1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV
PRBG Based on Couple Chaotic Systems & its Applications in Stream- Cipher Cryptography Li Shujun, Mou Xuanqin, Cai Yuanlong School of Electronics & Information.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Figure 1.a AVS China encoder [3] Video Bit stream.
Hierarchical Method for Foreground DetectionUsing Codebook Model Jing-Ming Guo, Yun-Fu Liu, Chih-Hsien Hsia, Min-Hsiung Shih, and Chih-Sheng Hsu IEEE TRANSACTIONS.
A Generalized Version Space Learning Algorithm for Noisy and Uncertain Data T.-P. Hong, S.-S. Tseng IEEE Transactions on Knowledge and Data Engineering,
Sequential Monte-Carlo Method -Introduction, implementation and application Fan, Xin

A Social-Network-Aided Efficient Peer-to-Peer Live Streaming System IEEE/ACM TRANSACTIONS ON NETWORKING, JUNE 2015 Haiying Shen, Yuhua Lin Dept. of Electrical.
Overview of MB-OFDM UWB Baseband Channel Codec for MB-OFDM UWB 2006/10/27 Speaker: 蔡佩玲.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
 Plain Text : The original message (text, image,video,… etc.  Cipher Key : Encryption works by running the data (represented as numbers) through a special.
WEB BASED MONITORING AND CONTROLING OF INDUSTRIAL PROCESSES PRESENTED BY: Bhagyawant (3AE07EC018) Kushal (3AE07EC032) Mahantesh (3AE07EC034) Mallinath.
NCTU, CS VLSI Information Processing Research Lab 研究生 : ABSTRACT Introduction NEW Recursive DFT/IDFT architecture Low computation cycle  1/2: Chebyshev.
T EXT D IGITAL W ATERMARKING O F A M ALAYALAM T EXT D OCUMENT B ASED O N F RAGMENTS R EGROUPING S TRATEGY. Guide:Presented by: Mrs.Sreeja Sasinas Alias.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
High-Speed Architectures of the Cryptographic Hash Function BLAKE E.Umashankar, , M.E,VLSI Design Guide By Ms.M.Saroshree,A.P,ECE.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Early termination for tz search in hevc motion estimation
ATM using fingerprint
Pipelined Architectures for High-Speed and Area-Efficient Viterbi Decoders Chen, Chao-Nan Chu, Hsi-Cheng.
Detection of Local Cortical Asymmetry via Discriminant Power Analysis
Source: Signal Processing 109 (2015) 317–333
Chaos in Cryptography What is Chaos in Cryptography Chaos Functions
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Chair Professor Chin-Chen Chang Feng Chia University
Real time signal processing
A new chaotic algorithm for image encryption
Chair Professor Chin-Chen Chang Feng Chia University
Secret Image Sharing Based on Encrypted Pixels
Privacy Protection for E-Health Systems by
Dynamic improved pixel value ordering reversible data hiding
Rich QR Codes With Three-Layer Information Using Hamming Code
How to Use Charm Crypto Lib
Presentation transcript:

CHAOS BASED ENCRYPTION NEIL PARMAR DEPARTMENT OF COMPUTER SCIENCE

ENCRYPTION Medical systems In this paper, Electroencephalograms (EEGs) – brain waves and can be used to detect epilepsy and other diseases – Mood Swings – Cognitive functions of the patients – 16-Channel EEG Visual User Environment Scheme Goal: To create a robust and real-time chaos-based image encryption functionality.

Figure Channel EEG Vue Signals

Chaos Based Encryption System for Encrypting Electroencephalogram Signals 1.Purpose a)Encrypt the medical EEG 16-channel EEG Vue Signals. b)Generate robust and real-time encryption c)Electroencephalograms Visual User Environment Signals are encrypted 2.Unique Approach a)Microsoft Visual development kit and C# Programming language b)Three Level Approach 3.Overview a)C# based Level I, II, III chaos-based encryption algorithm. b)Level I uses bifurcation parameters, chaotic map and initial value to achieve high- speed, real-time encryption. c)Threshold parameters were added in Level II to enhance level of robustness. d)In Level III, moreover to all the above parameters, a bit stream address index assignment strategy is incorporated in order to achieve the most robust level encryption.

Algorithm LEVEL I STEP 1: Enter the starting point x, and bifurcation parameter r STEP 2: Generate a chaotic sequence of (Length of the clinical EEG Vue signal bit stream (EEGS)) length L F c n+1 = CMT (c n ); c 0 = x; n = {1,2,…..L F } (1) i.e., c n+1 = rc n (1-c n ) STEP 3: The A Chaos-based encryption bit streams (CBEBS) are generated as follows CBEBS = {y n } n = {1,2,…..L F } y n = {1 c n >= 0.5} y n = {0 c n < 0.5} STEP 4: Deliver Electroencephalograms Visual User Environment Signal Bit Stream of Length L F EEGS = {eeg 1, eeg 2, eeg 3,……eeg LF }

STEP 5: Generate encrypted Generated encrypted clinical Electroencephalogram Visual User Environment Signal Bit Streams (GEEG) GEEG = EEGS CBEBS +

Limitation of Level I The starting point and the chaotic map can be easily tracked.

LEVEL II STEP 1: Enter the starting point x, bifurcation parameter r, CMT, bit stream length L F, number of discarded initial chaotic index points nF(10<=nF<= ), and level of security dF(0.01<=dF<=0.99). STEP 2: (a) c 0 = x (b) Generate nF chaotic points c n+1 = CMT(c n ) then discard them. STEP 3: (a) c nF + 1 = CMT F (c nF ) (b) If c n >dF then discard this point and go to step 3 (a); otherwise perform step 3(c). (c) Generate a chaotic sequence of length L F. c n ; n = {1,2,3,…..L F }

STEP 4: The A Chaos based encryption bit streams (CBEBS) is generated as follows: CBEBS = {y n } n = {1,2,…..L F } y n = {1 c n >= 0.5} y n = {0 c n < 0.5} STEP 5: Deliver Electroencephalograms Visual User Environment Signal Bit Stream of Length L F EEGS = {eeg 1, eeg 2, eeg 3,……eeg LF } STEP 5: Generate encrypted Generated encrypted clinical Electroencephalogram Visual User Environment Signal Bit Streams (GEEG) GEEG = EEGS CBEBS +

Scope for Level III In Order to enhance the security, the paper introduces the Level III security.

LEVEL III C#- based Level III encryption algorithm, which is described as follows: A chaotic logistic map was employed in the chaotic maps CMT F and CMT. CMT is the chaotic map of G CCS, the chaotic candidate point generator process. CMT F is the chaotic map of F CIA, the chaotic address index assignment process STEP 1: Enter the starting points x, and x2, length L F, number of discarded initial chaotic index points nF, and the level of security dF. STEP 2: Generate nF chaotic points c n+1 = CMT(c n ) and then discard them. STEP 3: (a) c n+1 = CMT(C n ) (b) The initial value of index j is 1, and j=j+1 m j = 1 c n+1

Step 4: [compare m j and the previous m k, 1<=k<=j-1 ] If m j {m k, 1<=k<=j-1}, then discard this point and go to step 3; otherwise proceed to the next step. Step 5: If j>= L F, terminate the procedure, output m j, 1<=j<=L F, and perform the next step; Otherwise, go to step 3. Step 6: [ F CIA : generate the chaotic index address assignment ] (a) 1<=j<=L F, m j N F CIA : M = {m 1, m 2, m 3,…. m LF } (b) m C * = maximum index address = max 1<=j<=LF m j Step 7: Input x2, the starting point for CMT G. y n+1 = CMT G (y n ), y 0 = x2; Step 8: If y n >dF then discard this point and go to step 7; otherwise, perform the next step.

STEP 9: Generate a chaotic sequence with a finite length m c * by performing the following iterative algorithm: Y = {y 0, y 1, y 2,…. Y mc* } STEP 10: Generate a chaotic sequence of length L F. Z n = {z 0, z 1, z 2,…. z LF } = {y m0, y m1, y m2,…. Y mLF }; STEP 11: The A Chaos based encryption bit streams (CBEBS) of W is generated as follows: CBEBSW = {w n } n = {1,2,…..L F } w n = {1 z n >= 0.5} w n = {0 z n < 0.5}

STEP 12: Deliver Electroencephalograms Visual User Environment Signal Bit Stream of Length L F EEGS = {eeg 1, eeg 2, eeg 3,……eeg LF } STEP 13: Generate encrypted Generated encrypted clinical Electroencephalogram Visual User Environment Signal Bit Streams (GEEG) GEEG = EEGS CBEBSW +

Limitations of the Paper Microsoft-based operating system. Speed, is it necessary for encryption?

Thank You Any Questions?

References [1]. Chin-Feng Lin, Shun-Han Shih, and Jin-De Zhu, Chaos Based Encryption System for Encrypting Electroencephalogram Signals, J Med Syst, [2]. Shih-Liang Chen, Ting Ting Hwang, Wen-Wei Lin, “Randomness Encryption Using Digitalized Modified Logistic Map,” IEEE Transactions on Circuits and Systems, Vol.57, No.12, December [Online]. Available: [Accessed: Nov. 26,2014]. [3]. Jiahui Liu, Hongli Zhang, Dahua Song, M.K. Buza, Bo Yang, and Cong Guo, “A new property of logistic map with scalable precision,” IEEE Computer Society, [Online]. Available: [Accessed: Nov. 27, 2014]. [4]. Chin-Feng Lin, Shun-Han Shih, Jin-De Zhu, and Sang-Hung Lee, “Implementation of An Offline Chaos-Based EEG Encryption Software,” Proc. IEEE 14 th Int. Conf. Adv. Commun. Tech, , [Online] Available: [Accessed: Nov.28, 2014]. [5]. Lin, C.F., Shih., Zhu, J.D., et al., “C3 based EEG encryption system using chaos algorithm,” Proc. 1 st Int. Conf. Compl. Syst. Chaos (COSC’13) , [Online] Available: [Accessed: Nov. 28, 2014].

[6]. T.Gopalakrishnan, S. Ramakrishnan, and M. BalaKumar, “Image Encryption using Chaos and Parity based Pixel Modification,” International Journal of Computer Applications, 2014