SlideShare a Scribd company logo
Design Swapping Encryption System
for Video Streaming
with Brain Storm Optimization
Jun Steed Huang, Qiong Wu and Qi Chen
The 10th International Conference on Bio-inspired
Computing: Theories and Applications (BIC-TA 2015)
Session on Bio-inspired Methods for Real-world Design Problems
Location: Building No. 6, 1st floor, Conference Room No. 2,
26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China
About the authors
• Jun Steed Huang, in 1992 received joint Ph.D from a program
between Southeast University China and Concordia University
Canada. He worked at Bell Canada, Lockheed Martin USA,
Ottawa University. He is a Professor of Suqian College with
Jiangsu University, board advisor for high tech organizations.
Qiong Wu, in 2007 received master degree in department of
telecommunications engineering from Southwest Technology
University. She was visiting scholar at Southeast University last
year. Now she is an associate professor at Suqian College.
• Chen Qi, just received B.E. degree in Department of
Telecommunications Engineering form Jiangsu University, now
studying for master at Shanghai. His technical interest includes
wireless sensor image processing and network programming.
Agenda
1. Introduction
2. The System and the Solution
3. Encryption Scheme and Optimization
4. Simulation and Experiments
5. Summary and Future Work
1. Introduction
Most swarm intelligence algorithms are inspired by simple self-
designed synergy,
Particle Swarm Optimization is inspired by synergistic effect by
birds,
Ant Colony algorithm is inspired by synergistic effect by ants
and
Fire Flies optimization algorithm is inspired by synergistic effect
by fire flies,
Brain Storm Optimization algorithms inspired by synergistic
effect by us - the most intelligent creature!
November 1950, American social psychologist,
musician, sex education promoter: Kennedy.
1. KeyExpansions — round keys are derived from the
cipher key using Rijndael's key schedule, AES requires
a separate 128-bit round key block for each round.
2. InitialRound 1. AddRoundKey—each byte of the state is combined
with a block of the round key using bitwise xor.
3. Rounds 1. SubBytes — a non-linear substitution step where each byte is
replaced with another according to a lookup table.
4. ShiftRows — a transposition step where the last three rows of the state are
shifted cyclically a certain number of steps.
5. MixColumns — a mixing operation which operates on the columns of the
state, combining the four bytes in each column.
6. AddRoundKey, SubBytes, ShiftRows, AddRoundKey.
The encryption of selected by the U.S. National
Institute of Standards and Technology in 2001
2. The System and the Solution
When the network cloud is a private system, the existing
encryption might be good enough; however when the
network cloud includes public network, and
When the drone has the limited power supple, a swapping
based encryption methodology becomes necessary.
Maintaining several passwords across a number of wireless
networks can be cumbersome.
An end-to-end pass phrase and time-stamp based encryption
in this case is highly desirable for most end users.
There are many types of optimization algorithm. We focus
on the brain storm one, because the key space is huge.
swapping solution
SES vs AES
The
key
1 2 3 4
Text
before
a b c d
Text
after
b a d c
The
key
1 2 3 4
Text
before
a b c d
Text
after
d4 a1 b2 c3
3. Encryption Scheme Optimization
Fibonacci was born 1170, a wealthy Italian merchant
A Fibonacci polynomial is defined as the next
number in the sequence being made from the
weighted summation of previous two numbers,
Fn+1(x,y)=xFn(x,y)+ yFn-1(x,y)
If the very first two weights x=y=1, then it is
called original Fibonacci sequence.
pseudo code
BSO Algorithm
4. Simulation and Experiments
Design Encryption for Video Streaming with Brain Storm Optimization
5. Summary and Future Work
The encryption for live video dedicated to the
security communities is different,
Fibonacci polynomial based on transcendental
number data swapping key generation algorithm fit,
Its spectrum based brain storm optimized key has
advantage,
Developmental brainstorming will make it more low
power, low latency and high security.
Acknowledge
Thanks go to
Prof. Yuhui Shi,
and
Prof. Qihong Yu
for discussions.
Thank You !
•Questions are welcome :
15862930930@163.com

More Related Content

PDF
Quantum cryptography for secured communication networks
PPTX
Deep Learning - Speaker Verification, Sound Event Detection
PPTX
Deep Learning | Speaker Indentification
PPTX
Deep Learning - Speaker Recognition
PPTX
Information and network security 18 modern techniques block ciphers
PPT
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
PPTX
Quantum cryptography
PDF
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
Quantum cryptography for secured communication networks
Deep Learning - Speaker Verification, Sound Event Detection
Deep Learning | Speaker Indentification
Deep Learning - Speaker Recognition
Information and network security 18 modern techniques block ciphers
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Quantum cryptography
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys

What's hot (7)

PDF
FNR : Arbitrary length small domain block cipher proposal
PPTX
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
PPTX
CS8792 - Cryptography and Network Security
PDF
Deep Learning in practice : Speech recognition and beyond - Meetup
PDF
Introduction To Machine Learning and Neural Networks
PDF
Image Encryption Using Advanced Hill Cipher Algorithm
PPTX
Cryptography & Steganography
FNR : Arbitrary length small domain block cipher proposal
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
CS8792 - Cryptography and Network Security
Deep Learning in practice : Speech recognition and beyond - Meetup
Introduction To Machine Learning and Neural Networks
Image Encryption Using Advanced Hill Cipher Algorithm
Cryptography & Steganography
Ad

Viewers also liked (20)

PDF
J05915457
PPS
Erevolution Nasscom 070808 Cdgarh Sriram Iridiuminteractive
PPTX
Chinese new year
PPT
Департамент недвижимости "Столица"
PDF
F05912731
PPTX
спб. две столицы 1
PDF
disneak
PDF
Jiangsu University
PDF
Meteor.js for DOers
PDF
B05921016
PPTX
Synergy Global Forum
PDF
Caffeでお手軽本格ディープラーニングアプリ @potatotips
PDF
What type of entrepreneur are you?
PDF
tvOSネイティブアプリを作る
PPTX
Women Entrepreneurship
DOCX
Ed assignment
PDF
Соловейчик Кирилл Александрович - Программы ФГБУ
PDF
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
PDF
Управление удачей
J05915457
Erevolution Nasscom 070808 Cdgarh Sriram Iridiuminteractive
Chinese new year
Департамент недвижимости "Столица"
F05912731
спб. две столицы 1
disneak
Jiangsu University
Meteor.js for DOers
B05921016
Synergy Global Forum
Caffeでお手軽本格ディープラーニングアプリ @potatotips
What type of entrepreneur are you?
tvOSネイティブアプリを作る
Women Entrepreneurship
Ed assignment
Соловейчик Кирилл Александрович - Программы ФГБУ
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Управление удачей
Ad

Similar to Design Encryption for Video Streaming with Brain Storm Optimization (20)

PDF
Randomness properties of sequence generated using logistic map with novel pe...
PDF
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
PDF
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
PDF
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
PDF
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
PDF
A Critical Reassessment of Evolutionary Algorithms on the Cryptanalysis of th...
PDF
A critical reassessment of
PDF
Authentic Patient Data and Optimization Process through Cryptographic Image o...
PDF
Authentic Patient Data and Optimization Process through Cryptographic Image o...
PDF
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
PDF
Bit-based cube rotation for text encryption
PDF
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
PPTX
Biometric Hashing technique for Authentication
PDF
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
DOCX
INTRODUCTION
PDF
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
PDF
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
PDF
If3058 concept and design of genetic cryptography using bdg48
PDF
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Randomness properties of sequence generated using logistic map with novel pe...
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
A Critical Reassessment of Evolutionary Algorithms on the Cryptanalysis of th...
A critical reassessment of
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
Bit-based cube rotation for text encryption
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
Biometric Hashing technique for Authentication
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
INTRODUCTION
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
If3058 concept and design of genetic cryptography using bdg48
Elliptical curve cryptography image encryption scheme with aid of optimizatio...

More from Jun Steed Huang (20)

PDF
ICFT-VNX-2022V2.pdf
PDF
Predicted COVID-19 Ending Time
PDF
Forest Environment Analysis for the Pandemic Health
PDF
Alphaba Smart Bus Autonomous Design
PPT
UK COVID-9 Mutation
PPT
Analysis of 2020 USA Presidential Election
PPT
Cosmos Genesis Entanglement Speed
PDF
7 Safety +1 COVID-19 Protection Lines
PDF
Hyper variance and autonomous bus
PDF
Mine Death Estimation
PPT
Steed Variance
PDF
Power plant
PPTX
Vtc9252019
PPTX
Quatum fridge
PPTX
Hypo Variance
PPTX
From Hadamard to Langlands
PPTX
Homogeneous Cosmos Unique Genesis
PPTX
Complex Hurst for NDVI
PDF
Selabot Swarm
PPT
Autonomous bus
ICFT-VNX-2022V2.pdf
Predicted COVID-19 Ending Time
Forest Environment Analysis for the Pandemic Health
Alphaba Smart Bus Autonomous Design
UK COVID-9 Mutation
Analysis of 2020 USA Presidential Election
Cosmos Genesis Entanglement Speed
7 Safety +1 COVID-19 Protection Lines
Hyper variance and autonomous bus
Mine Death Estimation
Steed Variance
Power plant
Vtc9252019
Quatum fridge
Hypo Variance
From Hadamard to Langlands
Homogeneous Cosmos Unique Genesis
Complex Hurst for NDVI
Selabot Swarm
Autonomous bus

Recently uploaded (20)

PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PPTX
BODY FLUIDS AND CIRCULATION class 11 .pptx
PPTX
Science Quipper for lesson in grade 8 Matatag Curriculum
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
PPTX
Fluid dynamics vivavoce presentation of prakash
PDF
BET Eukaryotic signal Transduction BET Eukaryotic signal Transduction.pdf
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
Introduction to Cardiovascular system_structure and functions-1
PDF
Assessment of environmental effects of quarrying in Kitengela subcountyof Kaj...
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PDF
lecture 2026 of Sjogren's syndrome l .pdf
PPTX
C1 cut-Methane and it's Derivatives.pptx
PPTX
Seminar Hypertension and Kidney diseases.pptx
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PDF
Placing the Near-Earth Object Impact Probability in Context
PDF
The scientific heritage No 166 (166) (2025)
PPTX
Pharmacology of Autonomic nervous system
PPTX
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
Phytochemical Investigation of Miliusa longipes.pdf
BODY FLUIDS AND CIRCULATION class 11 .pptx
Science Quipper for lesson in grade 8 Matatag Curriculum
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
Fluid dynamics vivavoce presentation of prakash
BET Eukaryotic signal Transduction BET Eukaryotic signal Transduction.pdf
. Radiology Case Scenariosssssssssssssss
Introduction to Cardiovascular system_structure and functions-1
Assessment of environmental effects of quarrying in Kitengela subcountyof Kaj...
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
lecture 2026 of Sjogren's syndrome l .pdf
C1 cut-Methane and it's Derivatives.pptx
Seminar Hypertension and Kidney diseases.pptx
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
Placing the Near-Earth Object Impact Probability in Context
The scientific heritage No 166 (166) (2025)
Pharmacology of Autonomic nervous system
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...

Design Encryption for Video Streaming with Brain Storm Optimization

  • 1. Design Swapping Encryption System for Video Streaming with Brain Storm Optimization Jun Steed Huang, Qiong Wu and Qi Chen The 10th International Conference on Bio-inspired Computing: Theories and Applications (BIC-TA 2015) Session on Bio-inspired Methods for Real-world Design Problems Location: Building No. 6, 1st floor, Conference Room No. 2, 26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China
  • 2. About the authors • Jun Steed Huang, in 1992 received joint Ph.D from a program between Southeast University China and Concordia University Canada. He worked at Bell Canada, Lockheed Martin USA, Ottawa University. He is a Professor of Suqian College with Jiangsu University, board advisor for high tech organizations. Qiong Wu, in 2007 received master degree in department of telecommunications engineering from Southwest Technology University. She was visiting scholar at Southeast University last year. Now she is an associate professor at Suqian College. • Chen Qi, just received B.E. degree in Department of Telecommunications Engineering form Jiangsu University, now studying for master at Shanghai. His technical interest includes wireless sensor image processing and network programming.
  • 3. Agenda 1. Introduction 2. The System and the Solution 3. Encryption Scheme and Optimization 4. Simulation and Experiments 5. Summary and Future Work
  • 4. 1. Introduction Most swarm intelligence algorithms are inspired by simple self- designed synergy, Particle Swarm Optimization is inspired by synergistic effect by birds, Ant Colony algorithm is inspired by synergistic effect by ants and Fire Flies optimization algorithm is inspired by synergistic effect by fire flies, Brain Storm Optimization algorithms inspired by synergistic effect by us - the most intelligent creature! November 1950, American social psychologist, musician, sex education promoter: Kennedy.
  • 5. 1. KeyExpansions — round keys are derived from the cipher key using Rijndael's key schedule, AES requires a separate 128-bit round key block for each round. 2. InitialRound 1. AddRoundKey—each byte of the state is combined with a block of the round key using bitwise xor. 3. Rounds 1. SubBytes — a non-linear substitution step where each byte is replaced with another according to a lookup table. 4. ShiftRows — a transposition step where the last three rows of the state are shifted cyclically a certain number of steps. 5. MixColumns — a mixing operation which operates on the columns of the state, combining the four bytes in each column. 6. AddRoundKey, SubBytes, ShiftRows, AddRoundKey. The encryption of selected by the U.S. National Institute of Standards and Technology in 2001
  • 6. 2. The System and the Solution
  • 7. When the network cloud is a private system, the existing encryption might be good enough; however when the network cloud includes public network, and When the drone has the limited power supple, a swapping based encryption methodology becomes necessary. Maintaining several passwords across a number of wireless networks can be cumbersome. An end-to-end pass phrase and time-stamp based encryption in this case is highly desirable for most end users. There are many types of optimization algorithm. We focus on the brain storm one, because the key space is huge. swapping solution
  • 8. SES vs AES The key 1 2 3 4 Text before a b c d Text after b a d c The key 1 2 3 4 Text before a b c d Text after d4 a1 b2 c3
  • 9. 3. Encryption Scheme Optimization Fibonacci was born 1170, a wealthy Italian merchant A Fibonacci polynomial is defined as the next number in the sequence being made from the weighted summation of previous two numbers, Fn+1(x,y)=xFn(x,y)+ yFn-1(x,y) If the very first two weights x=y=1, then it is called original Fibonacci sequence.
  • 12. 4. Simulation and Experiments
  • 14. 5. Summary and Future Work The encryption for live video dedicated to the security communities is different, Fibonacci polynomial based on transcendental number data swapping key generation algorithm fit, Its spectrum based brain storm optimized key has advantage, Developmental brainstorming will make it more low power, low latency and high security.
  • 15. Acknowledge Thanks go to Prof. Yuhui Shi, and Prof. Qihong Yu for discussions.
  • 16. Thank You ! •Questions are welcome : 15862930930@163.com