Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network

The traditional chaotic-based enciphering technique uses pseudo-random codes to implement encryption directly (e.g., based on XOR – exclusive-or operation), which results in the violation of media compression format compliance for video streaming transmissions. In contrast to the conventional crypto...

Full description

Saved in:
Bibliographic Details
Published inComputational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications pp. 241 - 250
Main Authors Chang, Yao-Tang, Lin, Yih-Chuan, Chen, Yu-Chang, Liou, Yan-Tai
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The traditional chaotic-based enciphering technique uses pseudo-random codes to implement encryption directly (e.g., based on XOR – exclusive-or operation), which results in the violation of media compression format compliance for video streaming transmissions. In contrast to the conventional cryptography in application layers, the spatial light modulator-based (SLM-based) method uses a programmable optics wavelength filter and has been studied in order to implement a scrambling cryptography on WDM networks. In the suggested encryption scheme, we propose to use chaotic-based time series of secret keys because of their pseudo randomness and maximal period properties. The proposed scrambling SLM-based decryption is configured with an approximate symmetric scheme to perform the decryption when the initial conditions and control parameters of the chaotic sequence are communicated a priori on a private channel as individual secure keys. The experimental results showed that the proposed scrambling cryptography efficiency for video streaming is high enough to achieve secure transmission in the physical layer in terms of a peak signal-to-noise ratio (PSNR) and visual perceptual quality from the perspectives of authorized and unauthorized users. The scrambling performance of wavelength hopping is evaluated with entropy value analysis from the eavesdroppers’ perspective.
ISBN:3319546082
9783319546087
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-319-54609-4_18