Skip to main content

Design Swapping Encryption System for Video Streaming with Brain Storm Optimization

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 562))

Abstract

The basic concept of wireless video streaming system, the main requirements from the law enforcement communities and related encryption algorithm of the wireless system are described. The major challenge in this research area is providing a low computation algorithm that runs easily on an embedded Java application, within pre-optimized key space. The key space is optimized under the object of minimizing the standard deviation of the spectrum of the key. Due to the large space of the key, the brain storm optimization is used to rule out the likely weak key set.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ball, K.M.: Fibonacci’s Rabbits Revisited, Strange Curves, Counting Rabbits, and Other Mathematical Explorations. Princeton University Press, Princeton (2003)

    MATH  Google Scholar 

  2. Qing, Z.: The Aesthetics in Number Theory. Harbin Institute of Technology Press, Harbin (2014)

    Google Scholar 

  3. Leonid, B.: Derivations and identities for Fibonacci and Lucas polynomials. Fibonacci Q. 51(4), 351–366 (2013)

    MathSciNet  MATH  Google Scholar 

  4. Qian, H., Huang, J.: Video encryption for security surveillance. In: IEEE International Carnahan Conference on Security Technology (2007)

    Google Scholar 

  5. Yang, X.S.: Firefly algorithm stochastic test functions and design optimization. Int. J. Bio-Inspired Comput. 2, 78–84 (2010)

    Article  Google Scholar 

  6. Shi, Y.: Brain storm optimization algorithm. In: Tan, Y., Shi, Y., Chai, Y., Wang, G. (eds.) ICSI 2011, Part I. LNCS, vol. 6728, pp. 303–309. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Song, T., Pan, L.: Spiking neural P systems with rules on synapses working in maximum spiking strategy. IEEE Trans. NanoBiosci. 14(4), 465–477 (2015)

    Article  Google Scholar 

  8. Song, T., Pan, L., Jiang, K., et al.: Normal forms for some classes of sequential spiking neural P systems. IEEE Trans. NanoBiosci. 12(3), 255–264 (2013)

    Article  Google Scholar 

  9. Shi, Y.: An optimization algorithm based on brainstorming process. Int. J. Swarm Intell. Res. 2(4), 35–62 (2011)

    Article  Google Scholar 

  10. Schachner, E.: How has the human brain evolved. Sci. Am. Mind, 24(3) (2013). http://www.scientificamerican.com/article/how-has-human-brain-evolved/

  11. Wang, X., Miao, Y., Cheng, M.: Finding motifs in DNA sequences using low-dispersion sequences. J. Comput. Biol. 21(4), 320–329 (2014)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This research was financially supported by GenieView subsidiary HaiQin Technology 2015.4.17.4.20.66. Project and the Suqian Excellence Expert Allowance 2013.18.14.5.9.2. Thanks go to Prof. Yuhui Shi, and Prof. Qihong Yu for discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiong Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, J.S., Wu, Q., Chen, Q. (2015). Design Swapping Encryption System for Video Streaming with Brain Storm Optimization. In: Gong, M., Linqiang, P., Tao, S., Tang, K., Zhang, X. (eds) Bio-Inspired Computing -- Theories and Applications. BIC-TA 2015. Communications in Computer and Information Science, vol 562. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49014-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49014-3_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49013-6

  • Online ISBN: 978-3-662-49014-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics