Upload
jun-steed-huang
View
305
Download
0
Embed Size (px)
Citation preview
Design Swapping Encryption System
for Video Streaming
with Brain Storm Optimization
Jun Steed Huang, Qiong Wu and Qi Chen
The 10th International Conference on Bio-inspired
Computing: Theories and Applications (BIC-TA 2015)
Session on Bio-inspired Methods for Real-world Design Problems
Location: Building No. 6, 1st floor, Conference Room No. 2,
26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China
About the authors
• Jun Steed Huang, in 1992 received joint Ph.D from a program
between Southeast University China and Concordia University
Canada. He worked at Bell Canada, Lockheed Martin USA,
Ottawa University. He is a Professor of Suqian College with
Jiangsu University, board advisor for high tech organizations.
� Qiong Wu, in 2007 received master degree in department of
telecommunications engineering from Southwest Technology
University. She was visiting scholar at Southeast University last
year. Now she is an associate professor at Suqian College.
• Chen Qi, just received B.E. degree in Department of
Telecommunications Engineering form Jiangsu University, now
studying for master at Shanghai. His technical interest includes
wireless sensor image processing and network programming.
Agenda
1. Introduction
2. The System and the Solution
3. Encryption Scheme and Optimization
4. Simulation and Experiments
5. Summary and Future Work
1. Introduction
Most swarm intelligence algorithms are inspired by simple self-
designed synergy,
Particle Swarm Optimization is inspired by synergistic effect by
birds,
Ant Colony algorithm is inspired by synergistic effect by ants
and
Fire Flies optimization algorithm is inspired by synergistic effect
by fire flies,
Brain Storm Optimization algorithms inspired by synergistic
effect by us - the most intelligent creature!
November 1950, American social psychologist,
musician, sex education promoter: Kennedy.
1. KeyExpansions — round keys are derived from the
cipher key using Rijndael's key schedule, AES requires
a separate 128-bit round key block for each round.
2. InitialRound 1. AddRoundKey—each byte of the state is combined
with a block of the round key using bitwise xor.
3. Rounds 1. SubBytes — a non-linear substitution step where each byte is
replaced with another according to a lookup table.
4. ShiftRows — a transposition step where the last three rows of the state are
shifted cyclically a certain number of steps.
5. MixColumns — a mixing operation which operates on the columns of the
state, combining the four bytes in each column.
6. AddRoundKey, SubBytes, ShiftRows, AddRoundKey.
The encryption of selected by the U.S. National
Institute of Standards and Technology in 2001
2. The System and the Solution
� When the network cloud is a private system, the existing
encryption might be good enough; however when the
network cloud includes public network, and
� When the drone has the limited power supple, a swapping
based encryption methodology becomes necessary.
� Maintaining several passwords across a number of wireless
networks can be cumbersome.
� An end-to-end pass phrase and time-stamp based encryption
in this case is highly desirable for most end users.
� There are many types of optimization algorithm. We focus
on the brain storm one, because the key space is huge.
swapping solution
SES vs AES
The key
1 2 3 4
Text before
a b c d
Text after
b a d c
The key
1 2 3 4
Text before
a b c d
Text after
d4 a1 b2 c3
3. Encryption Scheme Optimization
Fibonacci was born 1170, a wealthy Italian merchant
A Fibonacci polynomial is defined as the next
number in the sequence being made from the
weighted summation of previous two numbers,
Fn+1(x,y)=xFn(x,y)+ yFn-1(x,y)
If the very first two weights x=y=1, then it is
called original Fibonacci sequence.
pseudo code
BSO Algorithm
4. Simulation and Experiments
5. Summary and Future Work
� The encryption for live video dedicated to the
security communities is different,
� Fibonacci polynomial based on transcendental
number data swapping key generation algorithm fit,
� Its spectrum based brain storm optimized key has
advantage,
� Developmental brainstorming will make it more low
power, low latency and high security.
Acknowledge
Thanks go to
Prof. Yuhui Shi,
and
Prof. Qihong Yu
for discussions.