A New hyper chaotic algorithm for energy video communication security
نویسندگان
چکیده
The usage of the cameras in facilities energy sector is becoming more and common. In addition, with widespread use SCADA increase automation camera-based applications, ensuring security video data communication has become important. this study, methods that have been successful providing image previous studies Ref.[1] improved to ensure communication. These Kurt-Modified Chua’s Circuit (KMCC) as random number generator. Proposed algorithms are efficient for secure because using hyperchaotic generator also bit level scrambling, diffusion encryption each frame video.
منابع مشابه
New Algorithm for Wireless Network Communication Security
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by usin...
متن کاملData Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach
Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed many applications in clustering data. One of these applications is the clustering of images. The problem with the earlier methods used in clustering images was in selecting in...
متن کاملData Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach
Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed many applications in clustering data. One of these applications is the clustering of images. The problem with the earlier methods used in clustering images was in selecting in...
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملUse of Chaotic Behaviour in Communication Security
In this paper, the chaos signal results from some selected dynamical modes formed from a dc biased Josephson junction is used in amplitude modulation instead of the usually used carrier. This will result in a modulated signal that is not possible to be detected without using the same signal used in the transmitter.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of energy systems
سال: 2022
ISSN: ['2602-2052']
DOI: https://doi.org/10.30521/jes.1160773