Compression Systems and Blockchain Dr. Mohammed Abutaha PhD. - - PowerPoint PPT Presentation

compression systems
SMART_READER_LITE
LIVE PREVIEW

Compression Systems and Blockchain Dr. Mohammed Abutaha PhD. - - PowerPoint PPT Presentation

Chaos-based Crypto Compression Systems and Blockchain Dr. Mohammed Abutaha PhD. Information Security 1 Outline Introduction Chaos based stream cipher Selective encryption on HEVC Chaos crypto and blockchain Demo 2


slide-1
SLIDE 1

1

Chaos-based Crypto Compression Systems and Blockchain

  • Dr. Mohammed Abutaha
  • PhD. Information Security
slide-2
SLIDE 2

2

Outline

 Introduction

 Chaos based stream cipher

 Selective encryption on HEVC  Chaos crypto and blockchain  Demo

slide-3
SLIDE 3

3

Introduction

 Refers to secure information and communication techniques derived from mathematical concepts and a set of rule- based calculations called algorithms to transform messages in ways that are hard to decipher.

slide-4
SLIDE 4

4

Chaos and cryptography

 Chaos theory  Definition: State of Turmoil, Disorder & Disarray  Scientific Definition: New field of study in mathematics, studying the behavior of dynamical systems sensitive to changes of initial conditions  Chaos in cryptography was discovered by Matthews in 1990s.

slide-5
SLIDE 5

5

Why using chaos to secure information?

Description Cryptographic property Chaotic property The output has the same distribution for any input Confusion Ergodicity A small deviation in the input can cause a large change at the output Diffusion Sensitivity to initial conditions A deterministic process can cause a random-like (pseudo-random) behavior Deterministic pseudo- randomness Deterministic dynamics A simple process has a very high complexity Algorithm (attack) complexity Structure complexity

slide-6
SLIDE 6

6

Chaos based stream cipher

slide-7
SLIDE 7

7

Chaotic Generator

 Recursive structure (El Assad et. al., 2008 & 2011)  Perturbation Technique (Tao, 2005, El Assad 2008)  Chaotic mixing (Lozi, 2007 & 2012)

slide-8
SLIDE 8

8

Chaotic samples production using Pthread

slide-9
SLIDE 9

9

HEVC

slide-10
SLIDE 10

10

Selective Encryption

SE Binarization Selective Bins Selective of Encrytable and non- Encrypable bins Context Modeling

Chaos-based stream cipher

Arithmetic coding Bitstream GA GB K

IVg

Context Bypass

Syntax elements With different probability With same probability

Context based adaptive binary arithmetic (CABAC)  Selective encryption is a new trend in image and video content

  • protection. It consists of encrypting only a subset of the data.

 The aim of selective encryption is to reduce the amount of data to encrypt while preserving a sufficient level of security.

slide-11
SLIDE 11

11

Full level Selective Encryption

  • Figure (b) clarifies the visual impact of the proposed scheme
  • n the frame content, it shows the distorsion of the visual

content quality.

slide-12
SLIDE 12

12

ROI Encryption

  • The proposed encryption solution conceals the objective

quality of the ROI zone, while the background remains clean.

slide-13
SLIDE 13

13

Chaos based security and blockchain

  • we developed a chaos hash function used in secure the

connections between blocks

  • A blockchain is a growing list of records, called blocks, which

are linked using cryptography. Each block contains a cryptographic hash of the previous block.

slide-14
SLIDE 14

14

Chaotic system & Secret key  Chaotic Neural Network  Multi-block Hash scheme

Structures of the proposed Hash functions

Fig.7: Structure of the block i in the proposed hash function Neural Network - main characteristics: 1.One way property 2.Diffusion 3.Compression

slide-15
SLIDE 15

15

Hashing bitcoin

 An important property of hashes is that if a tiny amount of input data is changed the output changes significantly. We can use the chaos based hash function to hash the bitcoin  The corresponding chaos hash of the sentence “Bitcoin?” looks like this:

156aedcfab1d49f73abddd89faf78d9930e4b523ab804026310c973bfa707d37

 If we remove only one symbol – for example the question mark “?” – the hash of “Bitcoin” looks like this:

4314d903f04e90e4a5057685243c903fbcfa4f8ec75ec797e1780ed5c891b1bf

slide-16
SLIDE 16

16

Demo

 Selective encryption on HEVC  ROI encryption on HEVC

slide-17
SLIDE 17

17

Thanks for your attention Questions ?