{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T09:02:02Z","timestamp":1769418122285,"version":"3.49.0"},"reference-count":30,"publisher":"World Scientific Pub Co Pte Lt","issue":"05","funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016YFB0800401"],"award-info":[{"award-number":["2016YFB0800401"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61532020"],"award-info":[{"award-number":["61532020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61671161"],"award-info":[{"award-number":["61671161"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Bifurcation Chaos"],"published-print":{"date-parts":[[2020,4]]},"abstract":"<jats:p> In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme. <\/jats:p>","DOI":"10.1142\/s0218127420500753","type":"journal-article","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T07:40:18Z","timestamp":1588923618000},"page":"2050075","source":"Crossref","is-referenced-by-count":14,"title":["Design and Virtex-7-Based Implementation of Video Chaotic Secure Communications"],"prefix":"10.1142","volume":"30","author":[{"given":"Baoju","family":"Chen","sequence":"first","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China"}]},{"given":"Simin","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China"}]},{"given":"Ping","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China"}]},{"given":"Liangshan","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China"}]},{"given":"Jinhu","family":"L\u00fc","sequence":"additional","affiliation":[{"name":"School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2020,5,7]]},"reference":[{"key":"S0218127420500753BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.03.021"},{"key":"S0218127420500753BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2018.03.007"},{"key":"S0218127420500753BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-2933-8"},{"key":"S0218127420500753BIB004","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.07.034"},{"key":"S0218127420500753BIB005","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418501602"},{"key":"S0218127420500753BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2703946"},{"key":"S0218127420500753BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2286268"},{"key":"S0218127420500753BIB008","doi-asserted-by":"publisher","DOI":"10.1002\/cta.2300"},{"key":"S0218127420500753BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2258-z"},{"key":"S0218127420500753BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2923553"},{"key":"S0218127420500753BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3390-8"},{"key":"S0218127420500753BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2619345"},{"key":"S0218127420500753BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-0924-6"},{"key":"S0218127420500753BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883690"},{"key":"S0218127420500753BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2873472"},{"key":"S0218127420500753BIB017","first-page":"102361","volume":"48","author":"Li C.","year":"2019","journal-title":"J. Inform. Secur. Appl."},{"key":"S0218127420500753BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2369711"},{"key":"S0218127420500753BIB019","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500864"},{"key":"S0218127420500753BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-2642-3"},{"key":"S0218127420500753BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2202-2"},{"key":"S0218127420500753BIB022","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2012.07.106"},{"key":"S0218127420500753BIB023","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127417500766"},{"key":"S0218127420500753BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4605-1"},{"key":"S0218127420500753BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2284-x"},{"key":"S0218127420500753BIB026","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1259-7"},{"key":"S0218127420500753BIB027","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/i2019-12797-4"},{"key":"S0218127420500753BIB028","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1956-x"},{"key":"S0218127420500753BIB029","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127417501553"},{"key":"S0218127420500753BIB030","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.079"},{"key":"S0218127420500753BIB031","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.06.149"}],"container-title":["International Journal of Bifurcation and Chaos"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218127420500753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T07:40:40Z","timestamp":1588923640000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218127420500753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":30,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["10.1142\/S0218127420500753"],"URL":"https:\/\/doi.org\/10.1142\/s0218127420500753","relation":{},"ISSN":["0218-1274","1793-6551"],"issn-type":[{"value":"0218-1274","type":"print"},{"value":"1793-6551","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}