Dynamic reconfigurable encryption and decryption with chaos/M-sequence mapping algorithm for secure H.264/AVC video streaming over OCDMA passive optical network
- 209 Downloads
To enhance the security of H.264/AVC streaming, such as that for Internet protocol television, over a passive optical network (PON), a dynamic reconfigurable coding–decoding scheme, based on a chaotic sequence, was demonstrated and characterised by pseudo randomness and a maximal period. Compared with conventional optical code-division multiple-access (OCDMA) PONs, without providing a dynamic reconfigurable mechanism and trigger timing, a secure mechanism was generated using a proposed chaos/maximal length sequence (M-sequence) mapping algorithm and embedded in a codebook to control an electrical controller (register). Because the state of the electrical controller (register) is used by the chaos/M-sequence mapping time sequence pattern to trigger a switch matrix and then vary the M-sequence signature address code for each authorised user, the scrambling and interleaving function of the encryption scheme was implemented in the OCDMA-PON physical layer for various M-sequence signature address codes to carry individual H.264/AVC transmissions of the same channel. The proposed chaos/M-sequence mapping algorithm provided similar pseudo randomness and higher variance effectiveness compared with a general uniform distribution of the pseudo-random, autocorrelation, and cross-correlation properties of the proposed time sequence. In addition, the scrambling and interleaving efficiency was determined to be sufficiently high by the reduced peak signal-to-noise ratio of encrypted videos and the produced unidentifiable videos for unauthorised users.
KeywordsDynamic reconfigurable encryption–decryption Optical code-division multiple-access (OCDMA) Passive optical network (PON) Chaos/M-sequence mapping algorithm (CMmA) H.264/AVC streaming Scrambling encryption
We thank Mr. Chung-Wei Tsailin, Yen-Chung Huang, and Wei-Hsiang Wang for providing information related to the experiments and simulations.
- 2.Chen Y, Cheng J (2011) Research on the security protection based on spatiotemporal chaos technology for the video resource of network education. IEEE ITME Int Symp 1:276–279Google Scholar
- 5.Dixit S IP over WDM: building the next-generation optical internet. John Wiley and Sons, Inc., New Jersey, page 2003Google Scholar
- 9.IEEE 802.3ah Ethernet in the first mile task force. Available from http://www.ieee802.org/3/efm/
- 16.L-f H, Zhang G, Z-s T (2010) A chaotic secure communication scheme based on logistic map. IEEE ICCASM Conf 8:v8-589–v8-591Google Scholar
- 19.Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J-J (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008, 179290, 18 pagesGoogle Scholar
- 25.Sühring K (2009) H.264/AVC Reference Software Group [On-line]. Available: http://iphome.hhi.de/suehring/tml/, Joint Model 12.2 (JM12.2)