16
Design Swapping Encryption System for Video Streaming with Brain Storm Optimization Jun Steed Huang, Qiong Wu and Qi Chen The 10th International Conference on Bio-inspired Computing: Theories and Applications (BIC-TA 2015) Session on Bio-inspired Methods for Real-world Design Problems Location: Building No. 6, 1st floor, Conference Room No. 2, 26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China

Design Encryption for Video Streaming with Brain Storm Optimization

Embed Size (px)

Citation preview

Page 1: Design Encryption for Video Streaming with Brain Storm Optimization

Design Swapping Encryption System

for Video Streaming

with Brain Storm Optimization

Jun Steed Huang, Qiong Wu and Qi Chen

The 10th International Conference on Bio-inspired

Computing: Theories and Applications (BIC-TA 2015)

Session on Bio-inspired Methods for Real-world Design Problems

Location: Building No. 6, 1st floor, Conference Room No. 2,

26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China

Page 2: Design Encryption for Video Streaming with Brain Storm Optimization

About the authors

• Jun Steed Huang, in 1992 received joint Ph.D from a program

between Southeast University China and Concordia University

Canada. He worked at Bell Canada, Lockheed Martin USA,

Ottawa University. He is a Professor of Suqian College with

Jiangsu University, board advisor for high tech organizations.

� Qiong Wu, in 2007 received master degree in department of

telecommunications engineering from Southwest Technology

University. She was visiting scholar at Southeast University last

year. Now she is an associate professor at Suqian College.

• Chen Qi, just received B.E. degree in Department of

Telecommunications Engineering form Jiangsu University, now

studying for master at Shanghai. His technical interest includes

wireless sensor image processing and network programming.

Page 3: Design Encryption for Video Streaming with Brain Storm Optimization

Agenda

1. Introduction

2. The System and the Solution

3. Encryption Scheme and Optimization

4. Simulation and Experiments

5. Summary and Future Work

Page 4: Design Encryption for Video Streaming with Brain Storm Optimization

1. Introduction

Most swarm intelligence algorithms are inspired by simple self-

designed synergy,

Particle Swarm Optimization is inspired by synergistic effect by

birds,

Ant Colony algorithm is inspired by synergistic effect by ants

and

Fire Flies optimization algorithm is inspired by synergistic effect

by fire flies,

Brain Storm Optimization algorithms inspired by synergistic

effect by us - the most intelligent creature!

November 1950, American social psychologist,

musician, sex education promoter: Kennedy.

Page 5: Design Encryption for Video Streaming with Brain Storm Optimization

1. KeyExpansions — round keys are derived from the

cipher key using Rijndael's key schedule, AES requires

a separate 128-bit round key block for each round.

2. InitialRound 1. AddRoundKey—each byte of the state is combined

with a block of the round key using bitwise xor.

3. Rounds 1. SubBytes — a non-linear substitution step where each byte is

replaced with another according to a lookup table.

4. ShiftRows — a transposition step where the last three rows of the state are

shifted cyclically a certain number of steps.

5. MixColumns — a mixing operation which operates on the columns of the

state, combining the four bytes in each column.

6. AddRoundKey, SubBytes, ShiftRows, AddRoundKey.

The encryption of selected by the U.S. National

Institute of Standards and Technology in 2001

Page 6: Design Encryption for Video Streaming with Brain Storm Optimization

2. The System and the Solution

Page 7: Design Encryption for Video Streaming with Brain Storm Optimization

� When the network cloud is a private system, the existing

encryption might be good enough; however when the

network cloud includes public network, and

� When the drone has the limited power supple, a swapping

based encryption methodology becomes necessary.

� Maintaining several passwords across a number of wireless

networks can be cumbersome.

� An end-to-end pass phrase and time-stamp based encryption

in this case is highly desirable for most end users.

� There are many types of optimization algorithm. We focus

on the brain storm one, because the key space is huge.

swapping solution

Page 8: Design Encryption for Video Streaming with Brain Storm Optimization

SES vs AES

The key

1 2 3 4

Text before

a b c d

Text after

b a d c

The key

1 2 3 4

Text before

a b c d

Text after

d4 a1 b2 c3

Page 9: Design Encryption for Video Streaming with Brain Storm Optimization

3. Encryption Scheme Optimization

Fibonacci was born 1170, a wealthy Italian merchant

A Fibonacci polynomial is defined as the next

number in the sequence being made from the

weighted summation of previous two numbers,

Fn+1(x,y)=xFn(x,y)+ yFn-1(x,y)

If the very first two weights x=y=1, then it is

called original Fibonacci sequence.

Page 10: Design Encryption for Video Streaming with Brain Storm Optimization

pseudo code

Page 11: Design Encryption for Video Streaming with Brain Storm Optimization

BSO Algorithm

Page 12: Design Encryption for Video Streaming with Brain Storm Optimization

4. Simulation and Experiments

Page 13: Design Encryption for Video Streaming with Brain Storm Optimization
Page 14: Design Encryption for Video Streaming with Brain Storm Optimization

5. Summary and Future Work

� The encryption for live video dedicated to the

security communities is different,

� Fibonacci polynomial based on transcendental

number data swapping key generation algorithm fit,

� Its spectrum based brain storm optimized key has

advantage,

� Developmental brainstorming will make it more low

power, low latency and high security.

Page 15: Design Encryption for Video Streaming with Brain Storm Optimization

Acknowledge

Thanks go to

Prof. Yuhui Shi,

and

Prof. Qihong Yu

for discussions.

Page 16: Design Encryption for Video Streaming with Brain Storm Optimization

Thank You !

•Questions are welcome :

[email protected]