Abstract
The basic concept of wireless video streaming system, the main requirements from the law enforcement communities and related encryption algorithm of the wireless system are described. The major challenge in this research area is providing a low computation algorithm that runs easily on an embedded Java application, within pre-optimized key space. The key space is optimized under the object of minimizing the standard deviation of the spectrum of the key. Due to the large space of the key, the brain storm optimization is used to rule out the likely weak key set.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ball, K.M.: Fibonacci’s Rabbits Revisited, Strange Curves, Counting Rabbits, and Other Mathematical Explorations. Princeton University Press, Princeton (2003)
Qing, Z.: The Aesthetics in Number Theory. Harbin Institute of Technology Press, Harbin (2014)
Leonid, B.: Derivations and identities for Fibonacci and Lucas polynomials. Fibonacci Q. 51(4), 351–366 (2013)
Qian, H., Huang, J.: Video encryption for security surveillance. In: IEEE International Carnahan Conference on Security Technology (2007)
Yang, X.S.: Firefly algorithm stochastic test functions and design optimization. Int. J. Bio-Inspired Comput. 2, 78–84 (2010)
Shi, Y.: Brain storm optimization algorithm. In: Tan, Y., Shi, Y., Chai, Y., Wang, G. (eds.) ICSI 2011, Part I. LNCS, vol. 6728, pp. 303–309. Springer, Heidelberg (2011)
Song, T., Pan, L.: Spiking neural P systems with rules on synapses working in maximum spiking strategy. IEEE Trans. NanoBiosci. 14(4), 465–477 (2015)
Song, T., Pan, L., Jiang, K., et al.: Normal forms for some classes of sequential spiking neural P systems. IEEE Trans. NanoBiosci. 12(3), 255–264 (2013)
Shi, Y.: An optimization algorithm based on brainstorming process. Int. J. Swarm Intell. Res. 2(4), 35–62 (2011)
Schachner, E.: How has the human brain evolved. Sci. Am. Mind, 24(3) (2013). http://www.scientificamerican.com/article/how-has-human-brain-evolved/
Wang, X., Miao, Y., Cheng, M.: Finding motifs in DNA sequences using low-dispersion sequences. J. Comput. Biol. 21(4), 320–329 (2014)
Acknowledgments
This research was financially supported by GenieView subsidiary HaiQin Technology 2015.4.17.4.20.66. Project and the Suqian Excellence Expert Allowance 2013.18.14.5.9.2. Thanks go to Prof. Yuhui Shi, and Prof. Qihong Yu for discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, J.S., Wu, Q., Chen, Q. (2015). Design Swapping Encryption System for Video Streaming with Brain Storm Optimization. In: Gong, M., Linqiang, P., Tao, S., Tang, K., Zhang, X. (eds) Bio-Inspired Computing -- Theories and Applications. BIC-TA 2015. Communications in Computer and Information Science, vol 562. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49014-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-49014-3_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-49013-6
Online ISBN: 978-3-662-49014-3
eBook Packages: Computer ScienceComputer Science (R0)