Skip to main content
Log in

Scrambling-based cryptography with a programmable SLM-based filter-triggered chaotic tent/hologram mapping algorithm for secure H.264/AVC video streaming over a WDM network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Traditional chaos-based encryption techniques use pseudorandom codes to implement encryption (e.g., XOR; exclusive or operation) directly, resulting in the violation of requirements for media compression formats for image transmission. In this study, a programmable spatial light modulator (SLM)-based optical wavelength filter was investigated for implementing a scrambling-based cryptographic scheme in WDM networks. A new chaotic tent/hologram mapping algorithm (THmA) and advanced THmA are proposed for triggering the programmable SLM-based filter array. Similarly, an approximately symmetric scheme was used to configure a scrambling SLM-based decryption scheme for performing decryption operations when the initial value and control parameters of the chaotic sequence as individual secret keys are communicated in advance over a private channel. The proposed scheme was evaluated using video application-layer experiments. The results revealed that compared with conventional reconfigurable schemes involving triggered registers and switches behind an AWG router, the number of code space sizes involved in the proposed cryptographic scheme increased by more than 1.31E + 89 times, thereby avoiding eavesdropping attacks in the physical layer. Furthermore, on the basis of the reduced peak signal-to-noise ratio of the encrypted videos and the unidentifiability of the videos to unauthorized users, the scrambling efficiency of the proposed scheme was sufficiently high.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ahadpour S, Sadra Y, ArastehFrad Z (2012) A novel chaotic image encryption using generalized threshold function. Int J Comput Appl 42(18):25–31

    Google Scholar 

  2. Ahadpour S, Sadra Y, ArastehFrad Z (2012) A novel chaotic encryption scheme based on pseudorandom bit padding. IJCSI Int J Comput Sci Issues 9(1):449–456

    Google Scholar 

  3. Baugher M, McGrew D, Naslund M, Carrara E, Norrman K (2004) The Secure Real-Time Transport Protocol (SRTP). IETF RFC 3711

  4. Chang Y-T, Chuan-Ching S, Jen-Fa H (2007) Robust design for reconfigurable coder/decoders to protect against eavesdropping in spectral amplitude coding optical CDMA networks. IEEE J Lightwave Technol 25(8):1931–1948

    Article  Google Scholar 

  5. Chang Y-T, Lin Y-C (2015) Dynamic reconfigurable encryption and decryption with chaos/M-sequence mapping algorithm for secure H.264/AVC video streaming over OCDMA passive optical network. Multimedia Tools Appl 75(16):9837–9859

  6. Chang YT, Tsailin CW (2015) Dynamic scrambling scheme of arrayed-waveguide grating-based encryptors and decryptors for protection against eavesdropping. Comput Electr Eng

  7. Chang Y-T, Lin Y-C, Chen Y-C, Liou Y-T (2017) Scrambling cryptography using programmable SLM-Based filter for video streaming over a WDM network. In: Barneva RP, Brimkov VE, Tavares JMR (eds) Computational modeling of objects presented in images fundamentals, methods, and applications, LNCS, vol. 10149. Springer International Publishing, Cham

  8. Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439–2451

    Article  Google Scholar 

  9. Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A new chaotic algorithm for video encryption. IEEE Trans Consum Electron 48(4):838–844

    Article  Google Scholar 

  10. Devaney R (1989) An introduction to chaotic dynamical systems, 2nd edn. Addison-Wesley, Redwood City

    MATH  Google Scholar 

  11. Dixit S (2003) IP over WDM: building the next-generation optical internet. John Wiley and Sons, Inc., New Jersey

    Book  Google Scholar 

  12. Dufaux F, Ebrahimi T (2008) Scrambling for privacy protection in video surveillance systems. IEEE Trans Circ Syst Video Technol 18(8):1168–1174

    Article  Google Scholar 

  13. Etemadi Borujeni S, Ehsani MS (2015) Modified logistic maps for cryptographic application. Appl Math 6:773–782

    Article  Google Scholar 

  14. Huang J-F, Meng S-H, Lin Y-C, Chen K-S, Huang A-C (2014) Using wavelength/time signature scrambling to realize cryptographic coded-WDM data network. Procedia Comput Sci 34:39–46

    Article  Google Scholar 

  15. Huang J-F, Meng S-H, Lin Y-C (2014) Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration. Opt Eng 53(11):115101

    Article  Google Scholar 

  16. Karafolas N, Uttamchandani D (1996) Optical fiber code division multiple access networks: a review. Opt Fiber Technol 2(2):149–168

    Article  Google Scholar 

  17. Kavehrad M, Zaccarin D (1995) Optical code-division-multiplexed systems based on spectral encoding of noncoherent sources. IEEE J Lightwave Technol 13:534–545

    Article  Google Scholar 

  18. Kim KS (2003) On the evolution of PON-based FTTH solutions. Inf Sci 149:21–30

  19. Kitayama K, Wang X, Wada N (2006) OCDMA over WDM PON—solution path to gigabit-symmetric FTTH. J Lightwave Technol 24(4):1654–1662

    Article  Google Scholar 

  20. Kocarev L, Lian S (eds) (2011) Chaos-based cryptography-theory, algorithm and application. Springer, Heidelberg

  21. Kramer G, Pesavento G (2002) Ethernet passive optical network (EPON): building a next-generation optical access network. IEEE Commun Mag 40:66–73

    Article  Google Scholar 

  22. Li TY, Yorke JA (1975) Period three implies chaos. Am Math Mon 82(10):985–992

    Article  MathSciNet  MATH  Google Scholar 

  23. Marhic SV, Kostic ZI, Titlebaum EL (1993) A new family of optical code sequences for use in spread spectrum fiber-optic local area networks. IEEE Trans Commun 41(8):1217–1221

    Article  MATH  Google Scholar 

  24. Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J-J (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Sec, Article ID 179290, 18 pages

  25. May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467

    Article  MATH  Google Scholar 

  26. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vision Comput 24:926–934

    Article  Google Scholar 

  27. Parker MC, Cohen AD, Mears RJ (1998) Dynamic digital holographic wavelength filtering. J Lightwave Technol 16(7)

  28. Petzold C (1998) Programming Windows®, 5th edn. Microsoft Press

  29. Sakthidasan@Sankaran K, Santhosh Krishna BV (2011) A new chaotic algorithm for image encryption and decryption of digital color images. Int J Inf Educ Technol 1(2):137–141

  30. Salehi JA (1989) Code division multiple-access techniques in optical fiber networks—part I: fundamental principles. IEEE Trans Commun 37(8):824–833

    Article  Google Scholar 

  31. Shake TH (2005) Security performance of optical CDMA Against eavesdropping. J IEEE J Lightwave Technol 23(2):655–670

  32. Shake TH (2005) Confidentiality performance of spectral-phase-encoded optical CDMA. IEEE J Lightwave Technol 23(4):1652–1663

    Article  Google Scholar 

  33. Sühring K (2009) H.264/AVC reference software group [On-line]. Available: http://iphome.hhi.de/suehring/tml/ Joint Model 12.2 (JM12.2)

  34. Tseng SP, Wu J (2011) The SAC OCDMA PON with super perfect difference code. IEEE Int Conf Commun

  35. Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560,576

  36. Wu BB, Narimanov EE (2006) A method for secure communications over a public fiber-optical network. Opt Express 14(9):3738–3751

    Article  Google Scholar 

Download references

Acknowledgements

This study was supported under grant No. MOST 105-2221-E-244-004 from the Ministry of Science and Technology, Taiwan. We thank Prof. Jen-Fa Huang for providing invaluable suggestion.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao-Tang Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, YT., Lin, YC., Chen, YC. et al. Scrambling-based cryptography with a programmable SLM-based filter-triggered chaotic tent/hologram mapping algorithm for secure H.264/AVC video streaming over a WDM network. Multimed Tools Appl 76, 25421–25453 (2017). https://doi.org/10.1007/s11042-017-4525-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4525-0

Keywords

Navigation