SlideShare a Scribd company logo
1 of 21
Download to read offline
Scrambling M2M Motion Image with
Extended Fibonacci Sequence
By
Hong Xuan QIAN, Qing ZOU, Jun Steed HUANG
19920 Pacific Heights Boulevard, San Diego, CA 92121, USA
Suqian College, 399 South Huanghe Road, 223800, China
June 13-14, 2015
2015 International Conference on Computer Science and Communication Engineering, Suzhou
Number Matters.
Agenda
1.Introduction
2.Encryption Method
3.M2M Scrambling Scheme
4.Simulation and Experiments
5.Conclusion and Future Work
2015 International Conference on Computer Science and Communication Engineering
Number Matters.
1. Introduction
There are four different ways to explain what is M2M video
streaming:
Machine2Man (for security applications),
Man2Man (for commercial fast delivery services),
Man2Machine (for mining and oil industries) and
Machine2Machine (for environmental protections).
1. Analog video monitoring system is the first generation.
2. Digital Video Recorder is the second generation.
3. The third generation is based on Internet Protocol (IP).
The IP through WiFi, WiMax, WiGig, LiFi, LTE or Terahertz-wave.
Here we focus on the end-to-end encryption aspect of the latest
system.
Number Matters.
911 After Effects
In the law enforcement and homeland security, with third
generation solution, greater numbers of sensitive sites can be
monitored in less bandwidth than can be covered with conventional
video techniques. In the event of a major occurrence, small low-
bandwidth drop-off cameras provide the command post with real
time video of the event scene, through the machine-to-man remote
settings.
Knowing the exact situation is crucial for mining rescue authorities.
First responder mine worker can carry miniature video systems on-
site to provide data center server with all sensor readings for the
computer to summarize the CO density map, to allow decision-
makers to call action plans. This is the man-to-machine quick
sensor data gathering system.
Number Matters.
Cloud After Effects
The hand held cameras send real-time video back to the courier
center over existing radio channels, can be used for potential users
range from online fast delivery to just in time of rapid inventory
control and other emergency logistics situations. This is mainly for
man-to-man verification video communications.
Flood-prone streams and rivers can be monitored for rising water
levels with the machine-to-machine settings. The extreme portability,
low bandwidth and low power requirements of such live video
system supports rapid temporary deployment of video monitoring, for
example in late winter and early spring when ice jams can cause
water flows to reach dangerous levels with little or no warning.
Number Matters.
Mobile is Going Everywhere
The advanced digital wireless camera, overcomes the
disadvantages of the analogue one, and brings advantages of longer
distance reach, better penetration through obstacles, light weight,
easy set up, added encryption feature, flexible storage formats
(MPEG4/H265, MJPEG/JPEG or proprietary) and flexible
transportation formats (native or IP).
The typical M2M network configuration for wireless camera is shown
in Fig. 1. The first block is the video capture end, transmitter (Tx). It
transmits encrypted video to the receiver, and at the same time it
can also receive commands from the laptop, tablet or BlackBerry
through the cloud. The transmitter (on robot) can also transmit the
sensor data along with the scrambled video signal to mac book etc.
Number Matters.
Figure 1: Sample M2M Network Configuration
Tx Rx Apple
Black
Berry
CDMA/
GSM
M2M
Scra
mblin
g
400MHz
Number Matters.
Each Blocks
The receiver (Rx), relays bi-directional signal between transmitter and the
laptop. The interface between receiver and the laptop is USB interface. The
link between transmitter is a licensed 400MHz FHSS (Frequency Hopping
Spread Spectrum) radio. The third block can be a tablet, laptop or mac book.
The transmitter transmits the video signal from a remote site to the control
center (software installed on any machine). Control Center (CC) transmits
commands back to the remote camera site, such as turn on hazard flashing
light etc.
The next two blocks are CDMA (or GSM) network and handheld devices such
as BlackBerry or WinCE device. When BlackBerry is used, push server can
be set up to introduce more inter-activities between a handheld and a camera.
When Android phone is used, P2P protocol is preferred, this will simplify the
server construction.
Number Matters.
2. Encryption Scheme - Mathematics Background
When the network cloud is a private system, the existing encryption
might be sufficient; however when the network cloud includes public
network, a better encryption becomes necessary. Maintaining
several passwords across a number of wired and wireless networks
can be cumbersome. An end-to-end pass phrase and time stamp
based encryption in this case is highly desirable for most end users.
A Fibonacci number sequence is defined as the next number in the
sequence being made from the summation of previous two
numbers, if the very first two numbers are 1, then it is called original
Fibonacci sequence, if the very first two seeds are any numbers, we
call it Extended or Generalized Fibonacci sequence.
Number Matters.
Fibonacci Properties
Number Matters.
Shang Gao Theorem
Number Matters.
3.M2M Scrambling Scheme
There are two types of encryption, symmetrical or asymmetrical.
An asymmetric encryption has keys come in a pairs. One is for encryption, the other for
decryption.
The symmetrical method uses the same key to encrypt and to decrypt the message.
The encryption of video stream is historically called scrambling as well.
Since the same key is used, it is important to safe guard that key. The
recommended method for exchanging the key is through a secured
communication system,
where asymmetric encryption or quantum encryption shall be used.
In this paper we focus on generating the good symmetrical key.
Where the key matches with the motion JPEG, in the sense that the spectrum of
the key is white enough, once applied to the image frame, it will alter the
spectrum of the frame, and make it also white.
Number Matters.
Why not AES
For a small number of cameras or a single camera case, the key
generation is not that complicated, however for M2M network, the number
of cameras can be large, as such we use administrator pass phrase with
the time stamp that contains the camera identification to generate the key,
through the use of the Extended Fibonacci sequence [3]. This way the user
can type in the pass phrase that they feel comfortable with and that is easy
to memorize, and leave the worry about the quality of the key to the
transcendental number theory [4].
There are two main encryption algorithms on the market. They are DES
(Data Encryption Standard) and AES (Advanced Encryption Standard). We
are not using anyone of them due to the computation burden. The method
we used is SES (Swapping Encryption System) explained in reference [5],
in summary it is a convolution based scrambling algorithm, on top of the
interleaving based algorithm. The interleaving part has been explained
already in reference [6]. This paper is focusing on the convolution part [7].
Number Matters.
Productive rather than Additive
MJPEG based video compression has compressed the information so
hard that the resulted code word has a very strong pattern that is
vulnerable to attack. Either DES or AES shuffles the data a number of
rounds, which may make the pattern more obvious, while consume a lot
of energy.
This is fine for uncompressed or lightly compressed data, but not good
for heavily compressed data like Motion JPEG image. The problem is
very much like when you zip a zipped file, the file size will become even
larger. For such data, we just need a good white key to do few rounds, to
balance out the spectrum, as seen later on in simulation and
experiments.
Number Matters.
Detail Algorithm
Here is the pseudo code of the key generation algorithm.
1.Initialize the code
2.Get frame size and image size
3.Determine the encryption key size: root(frameSize/16)/(width mod (height))
4.Find the largest Fibonacci prime that is within root(frameSize) iterations as seed
Key(1)
5.Convert to vector format, as seed Key(2), and compute the spectrum
6.Obtain the user pass phrase
7.Obtain the video time stamp
8.Mix them with Extended Fibonacci formula:
Key(n) = Key(n-1)*passPhrase + Key(n-2)*timeStamp
9.Compute the spectrum and its standard deviation (std)
10.If std is small enough to white out the frame, stop, otherwise go back to step 8.
Number Matters.
4.Simulation and Experiments
We have done a number of trials with customers across the world.
The trial band runs from 300MHz all the way to 2.4GHz.
The distance range from 200 meters underground to 1000 meters for an
open pit area.
Three typical MJPEG files are captured from the field and simulated in
Matlab. They are
– 1. VGA Tx-Rx Color frame, 640x480 pixels size, 62515 bytes
frame size;
– 2. HD Rabbit frame, 1280x960 pixels size, 117745 bytes frame
size;
– 3. VGA Night vision frame, 640x480 pixels size, 16806 bytes
frame size. Following figures show the actual pictures and the
spectrum for each of them before and after the convolution with
the key.
Number Matters.
Figure 2: VGA Frame Head and its Spectrum with the Key
Number Matters.
Figure 3: HD Frame Tail and its Spectrum with the Key
Number Matters.
Figure 4: Night-Vision Middle Frame and its Spectrum with the Key
Number Matters.
5. Conclusion and future work
The main information we offered here is that the transcendental number in general
will provide very white base spectrum, that is needed to cover up the video
information. The best number we have found so far is e^pi.
As such, we mixed the two numbers to generate the Fibonacci like sequence, using
pass phrase as the current non-zero-able weight, and use the time stamp as the
previous zero-able weight. With this extended way, we inherit the white spectrum.
Back to the original story: the extended rabbit family now starts from more than two
rabbits, and when they grow their family numbers along the Fibonacci like way, there
is a chance that the twin babies are expected, also there is a chance that the bobcat
may eat some of their babies very unfortunately!
The example code is available from Matlab file exchange server:
http://www.mathworks.com/matlabcentral/profile/authors/6205312-steed-huang
2015 International Conference on Computer Science and Communication Engineering
Number Matters.
Acknowledge
This research was financially supported by
GenieView subsidiaries and partners.
Thanks go to Prof. Yuhui Shi,
Helen Liu and
Mr. Guangqian Lu for discussions.
2015 International Conference on Computer Science and Communication Engineering, Suzhou

More Related Content

What's hot

Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
A Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption AlgorithmsA Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption AlgorithmsIJERA Editor
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesTELKOMNIKA JOURNAL
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYSHAJANA BASHEER
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAnkita Dubey
 
It3116411644
It3116411644It3116411644
It3116411644IJERA Editor
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMIDES Editor
 

What's hot (19)

Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Multimedia Steganography
Multimedia SteganographyMultimedia Steganography
Multimedia Steganography
 
A Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption AlgorithmsA Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption Algorithms
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
92 97
92 9792 97
92 97
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Image Security
Image SecurityImage Security
Image Security
 
K0815660
K0815660K0815660
K0815660
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Netsim experiment manual
Netsim experiment manualNetsim experiment manual
Netsim experiment manual
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
 
It3116411644
It3116411644It3116411644
It3116411644
 
Steganography
SteganographySteganography
Steganography
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVM
 

Viewers also liked

Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithmiosrjce
 
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Mateus S. H. Cruz
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...Mateus S. H. Cruz
 
ENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query ProcessingENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query ProcessingMateus S. H. Cruz
 
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud ComputingFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud ComputingMateus S. H. Cruz
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudMateus S. H. Cruz
 

Viewers also liked (10)

Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation...
 
ENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query ProcessingENKI: Access Control for Encrypted Query Processing
ENKI: Access Control for Encrypted Query Processing
 
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud ComputingFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
 

Similar to Fibonacci Video Encryption

Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosINFOGAIN PUBLICATION
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Ten reasons to buy a network camera
Ten reasons to buy a network cameraTen reasons to buy a network camera
Ten reasons to buy a network cameraAxis Communications
 
10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue cameracnssources
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdfssuser50a5ec
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transferijcnac
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit satIAESIJEECS
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...Sebastin Antony Joe
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Data compression, data security, and machine learning
Data compression, data security, and machine learningData compression, data security, and machine learning
Data compression, data security, and machine learningChris Huang
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10Nithirekha
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 malaOyeniyi Samuel
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 

Similar to Fibonacci Video Encryption (20)

Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System Videos
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Ten reasons to buy a network camera
Ten reasons to buy a network cameraTen reasons to buy a network camera
Ten reasons to buy a network camera
 
10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit sat
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Data compression, data security, and machine learning
Data compression, data security, and machine learningData compression, data security, and machine learning
Data compression, data security, and machine learning
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 

More from Jun Steed Huang

ICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdfICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdfJun Steed Huang
 
Predicted COVID-19 Ending Time
Predicted COVID-19 Ending TimePredicted COVID-19 Ending Time
Predicted COVID-19 Ending TimeJun Steed Huang
 
Forest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic HealthForest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic HealthJun Steed Huang
 
Alphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous DesignAlphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous DesignJun Steed Huang
 
UK COVID-9 Mutation
UK COVID-9 MutationUK COVID-9 Mutation
UK COVID-9 MutationJun Steed Huang
 
Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election Jun Steed Huang
 
Cosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement SpeedCosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement SpeedJun Steed Huang
 
7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection Lines7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection LinesJun Steed Huang
 
Hyper variance and autonomous bus
Hyper variance and autonomous busHyper variance and autonomous bus
Hyper variance and autonomous busJun Steed Huang
 
Mine Death Estimation
Mine Death EstimationMine Death Estimation
Mine Death EstimationJun Steed Huang
 
From Hadamard to Langlands
From Hadamard to LanglandsFrom Hadamard to Langlands
From Hadamard to LanglandsJun Steed Huang
 
Homogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique GenesisHomogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique GenesisJun Steed Huang
 
Complex Hurst for NDVI
Complex Hurst for NDVIComplex Hurst for NDVI
Complex Hurst for NDVIJun Steed Huang
 

More from Jun Steed Huang (20)

ICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdfICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdf
 
Predicted COVID-19 Ending Time
Predicted COVID-19 Ending TimePredicted COVID-19 Ending Time
Predicted COVID-19 Ending Time
 
Forest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic HealthForest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic Health
 
Alphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous DesignAlphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous Design
 
UK COVID-9 Mutation
UK COVID-9 MutationUK COVID-9 Mutation
UK COVID-9 Mutation
 
Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election
 
Cosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement SpeedCosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement Speed
 
7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection Lines7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection Lines
 
Hyper variance and autonomous bus
Hyper variance and autonomous busHyper variance and autonomous bus
Hyper variance and autonomous bus
 
Mine Death Estimation
Mine Death EstimationMine Death Estimation
Mine Death Estimation
 
Steed Variance
Steed VarianceSteed Variance
Steed Variance
 
Power plant
Power plantPower plant
Power plant
 
Vtc9252019
Vtc9252019Vtc9252019
Vtc9252019
 
Quatum fridge
Quatum fridgeQuatum fridge
Quatum fridge
 
Hypo Variance
Hypo VarianceHypo Variance
Hypo Variance
 
From Hadamard to Langlands
From Hadamard to LanglandsFrom Hadamard to Langlands
From Hadamard to Langlands
 
Homogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique GenesisHomogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique Genesis
 
Complex Hurst for NDVI
Complex Hurst for NDVIComplex Hurst for NDVI
Complex Hurst for NDVI
 
Selabot Swarm
Selabot Swarm Selabot Swarm
Selabot Swarm
 
Autonomous bus
Autonomous busAutonomous bus
Autonomous bus
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Fibonacci Video Encryption

  • 1. Scrambling M2M Motion Image with Extended Fibonacci Sequence By Hong Xuan QIAN, Qing ZOU, Jun Steed HUANG 19920 Pacific Heights Boulevard, San Diego, CA 92121, USA Suqian College, 399 South Huanghe Road, 223800, China June 13-14, 2015 2015 International Conference on Computer Science and Communication Engineering, Suzhou
  • 2. Number Matters. Agenda 1.Introduction 2.Encryption Method 3.M2M Scrambling Scheme 4.Simulation and Experiments 5.Conclusion and Future Work 2015 International Conference on Computer Science and Communication Engineering
  • 3. Number Matters. 1. Introduction There are four different ways to explain what is M2M video streaming: Machine2Man (for security applications), Man2Man (for commercial fast delivery services), Man2Machine (for mining and oil industries) and Machine2Machine (for environmental protections). 1. Analog video monitoring system is the first generation. 2. Digital Video Recorder is the second generation. 3. The third generation is based on Internet Protocol (IP). The IP through WiFi, WiMax, WiGig, LiFi, LTE or Terahertz-wave. Here we focus on the end-to-end encryption aspect of the latest system.
  • 4. Number Matters. 911 After Effects In the law enforcement and homeland security, with third generation solution, greater numbers of sensitive sites can be monitored in less bandwidth than can be covered with conventional video techniques. In the event of a major occurrence, small low- bandwidth drop-off cameras provide the command post with real time video of the event scene, through the machine-to-man remote settings. Knowing the exact situation is crucial for mining rescue authorities. First responder mine worker can carry miniature video systems on- site to provide data center server with all sensor readings for the computer to summarize the CO density map, to allow decision- makers to call action plans. This is the man-to-machine quick sensor data gathering system.
  • 5. Number Matters. Cloud After Effects The hand held cameras send real-time video back to the courier center over existing radio channels, can be used for potential users range from online fast delivery to just in time of rapid inventory control and other emergency logistics situations. This is mainly for man-to-man verification video communications. Flood-prone streams and rivers can be monitored for rising water levels with the machine-to-machine settings. The extreme portability, low bandwidth and low power requirements of such live video system supports rapid temporary deployment of video monitoring, for example in late winter and early spring when ice jams can cause water flows to reach dangerous levels with little or no warning.
  • 6. Number Matters. Mobile is Going Everywhere The advanced digital wireless camera, overcomes the disadvantages of the analogue one, and brings advantages of longer distance reach, better penetration through obstacles, light weight, easy set up, added encryption feature, flexible storage formats (MPEG4/H265, MJPEG/JPEG or proprietary) and flexible transportation formats (native or IP). The typical M2M network configuration for wireless camera is shown in Fig. 1. The first block is the video capture end, transmitter (Tx). It transmits encrypted video to the receiver, and at the same time it can also receive commands from the laptop, tablet or BlackBerry through the cloud. The transmitter (on robot) can also transmit the sensor data along with the scrambled video signal to mac book etc.
  • 7. Number Matters. Figure 1: Sample M2M Network Configuration Tx Rx Apple Black Berry CDMA/ GSM M2M Scra mblin g 400MHz
  • 8. Number Matters. Each Blocks The receiver (Rx), relays bi-directional signal between transmitter and the laptop. The interface between receiver and the laptop is USB interface. The link between transmitter is a licensed 400MHz FHSS (Frequency Hopping Spread Spectrum) radio. The third block can be a tablet, laptop or mac book. The transmitter transmits the video signal from a remote site to the control center (software installed on any machine). Control Center (CC) transmits commands back to the remote camera site, such as turn on hazard flashing light etc. The next two blocks are CDMA (or GSM) network and handheld devices such as BlackBerry or WinCE device. When BlackBerry is used, push server can be set up to introduce more inter-activities between a handheld and a camera. When Android phone is used, P2P protocol is preferred, this will simplify the server construction.
  • 9. Number Matters. 2. Encryption Scheme - Mathematics Background When the network cloud is a private system, the existing encryption might be sufficient; however when the network cloud includes public network, a better encryption becomes necessary. Maintaining several passwords across a number of wired and wireless networks can be cumbersome. An end-to-end pass phrase and time stamp based encryption in this case is highly desirable for most end users. A Fibonacci number sequence is defined as the next number in the sequence being made from the summation of previous two numbers, if the very first two numbers are 1, then it is called original Fibonacci sequence, if the very first two seeds are any numbers, we call it Extended or Generalized Fibonacci sequence.
  • 12. Number Matters. 3.M2M Scrambling Scheme There are two types of encryption, symmetrical or asymmetrical. An asymmetric encryption has keys come in a pairs. One is for encryption, the other for decryption. The symmetrical method uses the same key to encrypt and to decrypt the message. The encryption of video stream is historically called scrambling as well. Since the same key is used, it is important to safe guard that key. The recommended method for exchanging the key is through a secured communication system, where asymmetric encryption or quantum encryption shall be used. In this paper we focus on generating the good symmetrical key. Where the key matches with the motion JPEG, in the sense that the spectrum of the key is white enough, once applied to the image frame, it will alter the spectrum of the frame, and make it also white.
  • 13. Number Matters. Why not AES For a small number of cameras or a single camera case, the key generation is not that complicated, however for M2M network, the number of cameras can be large, as such we use administrator pass phrase with the time stamp that contains the camera identification to generate the key, through the use of the Extended Fibonacci sequence [3]. This way the user can type in the pass phrase that they feel comfortable with and that is easy to memorize, and leave the worry about the quality of the key to the transcendental number theory [4]. There are two main encryption algorithms on the market. They are DES (Data Encryption Standard) and AES (Advanced Encryption Standard). We are not using anyone of them due to the computation burden. The method we used is SES (Swapping Encryption System) explained in reference [5], in summary it is a convolution based scrambling algorithm, on top of the interleaving based algorithm. The interleaving part has been explained already in reference [6]. This paper is focusing on the convolution part [7].
  • 14. Number Matters. Productive rather than Additive MJPEG based video compression has compressed the information so hard that the resulted code word has a very strong pattern that is vulnerable to attack. Either DES or AES shuffles the data a number of rounds, which may make the pattern more obvious, while consume a lot of energy. This is fine for uncompressed or lightly compressed data, but not good for heavily compressed data like Motion JPEG image. The problem is very much like when you zip a zipped file, the file size will become even larger. For such data, we just need a good white key to do few rounds, to balance out the spectrum, as seen later on in simulation and experiments.
  • 15. Number Matters. Detail Algorithm Here is the pseudo code of the key generation algorithm. 1.Initialize the code 2.Get frame size and image size 3.Determine the encryption key size: root(frameSize/16)/(width mod (height)) 4.Find the largest Fibonacci prime that is within root(frameSize) iterations as seed Key(1) 5.Convert to vector format, as seed Key(2), and compute the spectrum 6.Obtain the user pass phrase 7.Obtain the video time stamp 8.Mix them with Extended Fibonacci formula: Key(n) = Key(n-1)*passPhrase + Key(n-2)*timeStamp 9.Compute the spectrum and its standard deviation (std) 10.If std is small enough to white out the frame, stop, otherwise go back to step 8.
  • 16. Number Matters. 4.Simulation and Experiments We have done a number of trials with customers across the world. The trial band runs from 300MHz all the way to 2.4GHz. The distance range from 200 meters underground to 1000 meters for an open pit area. Three typical MJPEG files are captured from the field and simulated in Matlab. They are – 1. VGA Tx-Rx Color frame, 640x480 pixels size, 62515 bytes frame size; – 2. HD Rabbit frame, 1280x960 pixels size, 117745 bytes frame size; – 3. VGA Night vision frame, 640x480 pixels size, 16806 bytes frame size. Following figures show the actual pictures and the spectrum for each of them before and after the convolution with the key.
  • 17. Number Matters. Figure 2: VGA Frame Head and its Spectrum with the Key
  • 18. Number Matters. Figure 3: HD Frame Tail and its Spectrum with the Key
  • 19. Number Matters. Figure 4: Night-Vision Middle Frame and its Spectrum with the Key
  • 20. Number Matters. 5. Conclusion and future work The main information we offered here is that the transcendental number in general will provide very white base spectrum, that is needed to cover up the video information. The best number we have found so far is e^pi. As such, we mixed the two numbers to generate the Fibonacci like sequence, using pass phrase as the current non-zero-able weight, and use the time stamp as the previous zero-able weight. With this extended way, we inherit the white spectrum. Back to the original story: the extended rabbit family now starts from more than two rabbits, and when they grow their family numbers along the Fibonacci like way, there is a chance that the twin babies are expected, also there is a chance that the bobcat may eat some of their babies very unfortunately! The example code is available from Matlab file exchange server: http://www.mathworks.com/matlabcentral/profile/authors/6205312-steed-huang 2015 International Conference on Computer Science and Communication Engineering
  • 21. Number Matters. Acknowledge This research was financially supported by GenieView subsidiaries and partners. Thanks go to Prof. Yuhui Shi, Helen Liu and Mr. Guangqian Lu for discussions. 2015 International Conference on Computer Science and Communication Engineering, Suzhou