Design Encryption for Video Streaming with Brain Storm Optimization
-
Upload
jun-steed-huang -
Category
Science
-
view
307 -
download
0
Transcript of Design Encryption for Video Streaming with Brain Storm Optimization
![Page 1: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/1.jpg)
Design Swapping Encryption System
for Video Streaming
with Brain Storm Optimization
Jun Steed Huang, Qiong Wu and Qi Chen
The 10th International Conference on Bio-inspired
Computing: Theories and Applications (BIC-TA 2015)
Session on Bio-inspired Methods for Real-world Design Problems
Location: Building No. 6, 1st floor, Conference Room No. 2,
26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China
![Page 2: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/2.jpg)
About the authors
• Jun Steed Huang, in 1992 received joint Ph.D from a program
between Southeast University China and Concordia University
Canada. He worked at Bell Canada, Lockheed Martin USA,
Ottawa University. He is a Professor of Suqian College with
Jiangsu University, board advisor for high tech organizations.
� Qiong Wu, in 2007 received master degree in department of
telecommunications engineering from Southwest Technology
University. She was visiting scholar at Southeast University last
year. Now she is an associate professor at Suqian College.
• Chen Qi, just received B.E. degree in Department of
Telecommunications Engineering form Jiangsu University, now
studying for master at Shanghai. His technical interest includes
wireless sensor image processing and network programming.
![Page 3: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/3.jpg)
Agenda
1. Introduction
2. The System and the Solution
3. Encryption Scheme and Optimization
4. Simulation and Experiments
5. Summary and Future Work
![Page 4: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/4.jpg)
1. Introduction
Most swarm intelligence algorithms are inspired by simple self-
designed synergy,
Particle Swarm Optimization is inspired by synergistic effect by
birds,
Ant Colony algorithm is inspired by synergistic effect by ants
and
Fire Flies optimization algorithm is inspired by synergistic effect
by fire flies,
Brain Storm Optimization algorithms inspired by synergistic
effect by us - the most intelligent creature!
November 1950, American social psychologist,
musician, sex education promoter: Kennedy.
![Page 5: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/5.jpg)
1. KeyExpansions — round keys are derived from the
cipher key using Rijndael's key schedule, AES requires
a separate 128-bit round key block for each round.
2. InitialRound 1. AddRoundKey—each byte of the state is combined
with a block of the round key using bitwise xor.
3. Rounds 1. SubBytes — a non-linear substitution step where each byte is
replaced with another according to a lookup table.
4. ShiftRows — a transposition step where the last three rows of the state are
shifted cyclically a certain number of steps.
5. MixColumns — a mixing operation which operates on the columns of the
state, combining the four bytes in each column.
6. AddRoundKey, SubBytes, ShiftRows, AddRoundKey.
The encryption of selected by the U.S. National
Institute of Standards and Technology in 2001
![Page 6: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/6.jpg)
2. The System and the Solution
![Page 7: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/7.jpg)
� When the network cloud is a private system, the existing
encryption might be good enough; however when the
network cloud includes public network, and
� When the drone has the limited power supple, a swapping
based encryption methodology becomes necessary.
� Maintaining several passwords across a number of wireless
networks can be cumbersome.
� An end-to-end pass phrase and time-stamp based encryption
in this case is highly desirable for most end users.
� There are many types of optimization algorithm. We focus
on the brain storm one, because the key space is huge.
swapping solution
![Page 8: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/8.jpg)
SES vs AES
The key
1 2 3 4
Text before
a b c d
Text after
b a d c
The key
1 2 3 4
Text before
a b c d
Text after
d4 a1 b2 c3
![Page 9: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/9.jpg)
3. Encryption Scheme Optimization
Fibonacci was born 1170, a wealthy Italian merchant
A Fibonacci polynomial is defined as the next
number in the sequence being made from the
weighted summation of previous two numbers,
Fn+1(x,y)=xFn(x,y)+ yFn-1(x,y)
If the very first two weights x=y=1, then it is
called original Fibonacci sequence.
![Page 10: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/10.jpg)
pseudo code
![Page 11: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/11.jpg)
BSO Algorithm
![Page 12: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/12.jpg)
4. Simulation and Experiments
![Page 13: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/13.jpg)
![Page 14: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/14.jpg)
5. Summary and Future Work
� The encryption for live video dedicated to the
security communities is different,
� Fibonacci polynomial based on transcendental
number data swapping key generation algorithm fit,
� Its spectrum based brain storm optimized key has
advantage,
� Developmental brainstorming will make it more low
power, low latency and high security.
![Page 15: Design Encryption for Video Streaming with Brain Storm Optimization](https://reader034.fdocuments.net/reader034/viewer/2022051405/58794c8a1a28abb1418b50f1/html5/thumbnails/15.jpg)
Acknowledge
Thanks go to
Prof. Yuhui Shi,
and
Prof. Qihong Yu
for discussions.