Skip to main content

Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network

  • Conference paper
  • First Online:
Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications (CompIMAGE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 10149))

Abstract

The traditional chaotic-based enciphering technique uses pseudo-random codes to implement encryption directly (e.g., based on XOR – exclusive-or operation), which results in the violation of media compression format compliance for video streaming transmissions. In contrast to the conventional cryptography in application layers, the spatial light modulator-based (SLM-based) method uses a programmable optics wavelength filter and has been studied in order to implement a scrambling cryptography on WDM networks. In the suggested encryption scheme, we propose to use chaotic-based time series of secret keys because of their pseudo randomness and maximal period properties. The proposed scrambling SLM-based decryption is configured with an approximate symmetric scheme to perform the decryption when the initial conditions and control parameters of the chaotic sequence are communicated a priori on a private channel as individual secure keys. The experimental results showed that the proposed scrambling cryptography efficiency for video streaming is high enough to achieve secure transmission in the physical layer in terms of a peak signal-to-noise ratio (PSNR) and visual perceptual quality from the perspectives of authorized and unauthorized users. The scrambling performance of wavelength hopping is evaluated with entropy value analysis from the eavesdroppers’ perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norman, K.: The Secure Real-Time Transport Protocol (SRTP), IETF RFC 3711, March 2004

    Google Scholar 

  2. Chang, Y.-T., Lin, Y.-C.: Dynamic reconfigurable encryption and decryption with chaos/M-sequence mapping algorithm for secure H.264/AVC video streaming over OCDMA passive optical network. Multimedia Tools Appl. 74(15), 1931–1948 (2016). [and 75(16), 9837–9859]

    Google Scholar 

  3. Chang, Y.-T., Sue, C.-C., Huang, J.-F.: Robust design for reconfigurable coder/decoders to protect against eavesdropping in spectral amplitude coding optical CDMA networks. IEEE J. Lightwave Technol. 25(8), 1931–1948 (2007)

    Article  Google Scholar 

  4. Chang, Y.-T., Tsailin, C.W.: Dynamic scrambling scheme of arrayed-waveguide grating-based encryptors and decryptors for protection against eavesdropping. Comput. Electr. Eng. 49(1), 184–197 (2016)

    Article  Google Scholar 

  5. Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)

    Article  Google Scholar 

  6. Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061–2075 (2006)

    Article  Google Scholar 

  7. Parker, M.C., Cohen, A.D., Mears, R.J.: Dynamic digital holographic wavelength filtering. J. Lightwave Technol. 16(7), 1259–1270 (1998)

    Article  Google Scholar 

  8. Petzold, C.: Programming Windows®, 5th edn. Microsoft Press, Redmond (1998)

    Google Scholar 

  9. Shake, T.H.: Security performance of optical CDMA against eavesdropping. IEEE J. Lightwave Technol. 23(2), 655–670 (2005)

    Article  Google Scholar 

  10. Shake, T.H.: Confidentiality performance of spectral-phase-encoded optical CDMA. IEEE J. Lightwave Technol. 23(4), 1652–1663 (2005)

    Article  Google Scholar 

  11. SĂĽhring, K.: H.264/AVC Reference Software Group, January 2009. http://iphome.hhi.de/suehring/tml/, Joint Model 12.2 (JM12.2)

  12. Wang, Y., Ostermann, J., Zhang, Y.Q.: Video Processing and Communications. Prentice Hall, Upper Saddle River (2001)

    Google Scholar 

  13. Wang, Y., O’Neill, M., Kurugollu, F., O’Sullivan, E.: Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead. Signal Process. Image Commun. 35, 71–84 (2015)

    Article  Google Scholar 

  14. Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13, 560–576 (2003)

    Article  Google Scholar 

  15. Wu, B.B., Narimanov, E.E.: A method for secure communications over a public fiber-optical network. Opt. Express 14(9), 3738–3751 (2006)

    Article  Google Scholar 

Download references

Acknowledgment

This study was supported under grant No. MOST 105-2221-E-244-004 from the Ministry of Science and Technology, Taiwan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao-Tang Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chang, YT., Lin, YC., Chen, YC., Liou, YT. (2017). Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network. In: Barneva, R., Brimkov, V., Tavares, J. (eds) Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications. CompIMAGE 2016. Lecture Notes in Computer Science(), vol 10149. Springer, Cham. https://doi.org/10.1007/978-3-319-54609-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54609-4_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54608-7

  • Online ISBN: 978-3-319-54609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics