Advertisement

Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network

  • Yao-Tang ChangEmail author
  • Yih-Chuan Lin
  • Yu-Chang Chen
  • Yan-Tai Liou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10149)

Abstract

The traditional chaotic-based enciphering technique uses pseudo-random codes to implement encryption directly (e.g., based on XOR – exclusive-or operation), which results in the violation of media compression format compliance for video streaming transmissions. In contrast to the conventional cryptography in application layers, the spatial light modulator-based (SLM-based) method uses a programmable optics wavelength filter and has been studied in order to implement a scrambling cryptography on WDM networks. In the suggested encryption scheme, we propose to use chaotic-based time series of secret keys because of their pseudo randomness and maximal period properties. The proposed scrambling SLM-based decryption is configured with an approximate symmetric scheme to perform the decryption when the initial conditions and control parameters of the chaotic sequence are communicated a priori on a private channel as individual secure keys. The experimental results showed that the proposed scrambling cryptography efficiency for video streaming is high enough to achieve secure transmission in the physical layer in terms of a peak signal-to-noise ratio (PSNR) and visual perceptual quality from the perspectives of authorized and unauthorized users. The scrambling performance of wavelength hopping is evaluated with entropy value analysis from the eavesdroppers’ perspective.

Keywords

Scrambling cryptography Chaotic based secret sequence Spatial light modulator based (SLM based) filter Wavelength division multiplexing (WDM) network 

Notes

Acknowledgment

This study was supported under grant No. MOST 105-2221-E-244-004 from the Ministry of Science and Technology, Taiwan.

References

  1. 1.
    Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norman, K.: The Secure Real-Time Transport Protocol (SRTP), IETF RFC 3711, March 2004Google Scholar
  2. 2.
    Chang, Y.-T., Lin, Y.-C.: Dynamic reconfigurable encryption and decryption with chaos/M-sequence mapping algorithm for secure H.264/AVC video streaming over OCDMA passive optical network. Multimedia Tools Appl. 74(15), 1931–1948 (2016). [and 75(16), 9837–9859]Google Scholar
  3. 3.
    Chang, Y.-T., Sue, C.-C., Huang, J.-F.: Robust design for reconfigurable coder/decoders to protect against eavesdropping in spectral amplitude coding optical CDMA networks. IEEE J. Lightwave Technol. 25(8), 1931–1948 (2007)CrossRefGoogle Scholar
  4. 4.
    Chang, Y.-T., Tsailin, C.W.: Dynamic scrambling scheme of arrayed-waveguide grating-based encryptors and decryptors for protection against eavesdropping. Comput. Electr. Eng. 49(1), 184–197 (2016)CrossRefGoogle Scholar
  5. 5.
    Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)CrossRefGoogle Scholar
  6. 6.
    Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061–2075 (2006)CrossRefGoogle Scholar
  7. 7.
    Parker, M.C., Cohen, A.D., Mears, R.J.: Dynamic digital holographic wavelength filtering. J. Lightwave Technol. 16(7), 1259–1270 (1998)CrossRefGoogle Scholar
  8. 8.
    Petzold, C.: Programming Windows®, 5th edn. Microsoft Press, Redmond (1998)Google Scholar
  9. 9.
    Shake, T.H.: Security performance of optical CDMA against eavesdropping. IEEE J. Lightwave Technol. 23(2), 655–670 (2005)CrossRefGoogle Scholar
  10. 10.
    Shake, T.H.: Confidentiality performance of spectral-phase-encoded optical CDMA. IEEE J. Lightwave Technol. 23(4), 1652–1663 (2005)CrossRefGoogle Scholar
  11. 11.
    Sühring, K.: H.264/AVC Reference Software Group, January 2009. http://iphome.hhi.de/suehring/tml/, Joint Model 12.2 (JM12.2)
  12. 12.
    Wang, Y., Ostermann, J., Zhang, Y.Q.: Video Processing and Communications. Prentice Hall, Upper Saddle River (2001)Google Scholar
  13. 13.
    Wang, Y., O’Neill, M., Kurugollu, F., O’Sullivan, E.: Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead. Signal Process. Image Commun. 35, 71–84 (2015)CrossRefGoogle Scholar
  14. 14.
    Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13, 560–576 (2003)CrossRefGoogle Scholar
  15. 15.
    Wu, B.B., Narimanov, E.E.: A method for secure communications over a public fiber-optical network. Opt. Express 14(9), 3738–3751 (2006)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Yao-Tang Chang
    • 1
    Email author
  • Yih-Chuan Lin
    • 2
  • Yu-Chang Chen
    • 3
  • Yan-Tai Liou
    • 1
  1. 1.Department of Information TechnologyKao Yuan UniversityKaohsiungTaiwan
  2. 2.Department of Computer Science and Information EngineeringNational Formosa UniversityYunlinTaiwan
  3. 3.Department of Electrical EngineeringNational Cheng Kung UniversityTainanTaiwan

Personalised recommendations