SlideShare a Scribd company logo
Design Swapping Encryption System
for Video Streaming
with Brain Storm Optimization
Jun Steed Huang, Qiong Wu and Qi Chen
The 10th International Conference on Bio-inspired
Computing: Theories and Applications (BIC-TA 2015)
Session on Bio-inspired Methods for Real-world Design Problems
Location: Building No. 6, 1st floor, Conference Room No. 2,
26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China
About the authors
• Jun Steed Huang, in 1992 received joint Ph.D from a program
between Southeast University China and Concordia University
Canada. He worked at Bell Canada, Lockheed Martin USA,
Ottawa University. He is a Professor of Suqian College with
Jiangsu University, board advisor for high tech organizations.
Qiong Wu, in 2007 received master degree in department of
telecommunications engineering from Southwest Technology
University. She was visiting scholar at Southeast University last
year. Now she is an associate professor at Suqian College.
• Chen Qi, just received B.E. degree in Department of
Telecommunications Engineering form Jiangsu University, now
studying for master at Shanghai. His technical interest includes
wireless sensor image processing and network programming.
Agenda
1. Introduction
2. The System and the Solution
3. Encryption Scheme and Optimization
4. Simulation and Experiments
5. Summary and Future Work
1. Introduction
Most swarm intelligence algorithms are inspired by simple self-
designed synergy,
Particle Swarm Optimization is inspired by synergistic effect by
birds,
Ant Colony algorithm is inspired by synergistic effect by ants
and
Fire Flies optimization algorithm is inspired by synergistic effect
by fire flies,
Brain Storm Optimization algorithms inspired by synergistic
effect by us - the most intelligent creature!
November 1950, American social psychologist,
musician, sex education promoter: Kennedy.
1. KeyExpansions — round keys are derived from the
cipher key using Rijndael's key schedule, AES requires
a separate 128-bit round key block for each round.
2. InitialRound 1. AddRoundKey—each byte of the state is combined
with a block of the round key using bitwise xor.
3. Rounds 1. SubBytes — a non-linear substitution step where each byte is
replaced with another according to a lookup table.
4. ShiftRows — a transposition step where the last three rows of the state are
shifted cyclically a certain number of steps.
5. MixColumns — a mixing operation which operates on the columns of the
state, combining the four bytes in each column.
6. AddRoundKey, SubBytes, ShiftRows, AddRoundKey.
The encryption of selected by the U.S. National
Institute of Standards and Technology in 2001
2. The System and the Solution
When the network cloud is a private system, the existing
encryption might be good enough; however when the
network cloud includes public network, and
When the drone has the limited power supple, a swapping
based encryption methodology becomes necessary.
Maintaining several passwords across a number of wireless
networks can be cumbersome.
An end-to-end pass phrase and time-stamp based encryption
in this case is highly desirable for most end users.
There are many types of optimization algorithm. We focus
on the brain storm one, because the key space is huge.
swapping solution
SES vs AES
The
key
1 2 3 4
Text
before
a b c d
Text
after
b a d c
The
key
1 2 3 4
Text
before
a b c d
Text
after
d4 a1 b2 c3
3. Encryption Scheme Optimization
Fibonacci was born 1170, a wealthy Italian merchant
A Fibonacci polynomial is defined as the next
number in the sequence being made from the
weighted summation of previous two numbers,
Fn+1(x,y)=xFn(x,y)+ yFn-1(x,y)
If the very first two weights x=y=1, then it is
called original Fibonacci sequence.
pseudo code
BSO Algorithm
4. Simulation and Experiments
5. Summary and Future Work
The encryption for live video dedicated to the
security communities is different,
Fibonacci polynomial based on transcendental
number data swapping key generation algorithm fit,
Its spectrum based brain storm optimized key has
advantage,
Developmental brainstorming will make it more low
power, low latency and high security.
Acknowledge
Thanks go to
Prof. Yuhui Shi,
and
Prof. Qihong Yu
for discussions.
Thank You !
•Questions are welcome :
15862930930@163.com

More Related Content

What's hot

FNR : Arbitrary length small domain block cipher proposal
FNR : Arbitrary length small domain block cipher proposalFNR : Arbitrary length small domain block cipher proposal
FNR : Arbitrary length small domain block cipher proposal
Sashank Dara
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
Mohammed Abdul Lateef
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 
Deep Learning in practice : Speech recognition and beyond - Meetup
Deep Learning in practice : Speech recognition and beyond - MeetupDeep Learning in practice : Speech recognition and beyond - Meetup
Deep Learning in practice : Speech recognition and beyond - Meetup
LINAGORA
 
Introduction To Machine Learning and Neural Networks
Introduction To Machine Learning and Neural NetworksIntroduction To Machine Learning and Neural Networks
Introduction To Machine Learning and Neural Networks
德平 黄
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 

What's hot (7)

FNR : Arbitrary length small domain block cipher proposal
FNR : Arbitrary length small domain block cipher proposalFNR : Arbitrary length small domain block cipher proposal
FNR : Arbitrary length small domain block cipher proposal
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Deep Learning in practice : Speech recognition and beyond - Meetup
Deep Learning in practice : Speech recognition and beyond - MeetupDeep Learning in practice : Speech recognition and beyond - Meetup
Deep Learning in practice : Speech recognition and beyond - Meetup
 
Introduction To Machine Learning and Neural Networks
Introduction To Machine Learning and Neural NetworksIntroduction To Machine Learning and Neural Networks
Introduction To Machine Learning and Neural Networks
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 

Viewers also liked

J05915457
J05915457J05915457
J05915457
IOSR-JEN
 
Erevolution Nasscom 070808 Cdgarh Sriram Iridiuminteractive
Erevolution  Nasscom  070808 Cdgarh  Sriram  IridiuminteractiveErevolution  Nasscom  070808 Cdgarh  Sriram  Iridiuminteractive
Erevolution Nasscom 070808 Cdgarh Sriram Iridiuminteractive
IridiumSlides
 
Chinese new year
Chinese new yearChinese new year
Chinese new year
Yueh-shu Li
 
Департамент недвижимости "Столица"
Департамент недвижимости "Столица"Департамент недвижимости "Столица"
Департамент недвижимости "Столица"
Ingenium Бизнес
 
F05912731
F05912731F05912731
F05912731
IOSR-JEN
 
disneak
disneakdisneak
disneak
utweb
 
Jiangsu University
Jiangsu UniversityJiangsu University
Jiangsu University
Jun Steed Huang
 
Meteor.js for DOers
Meteor.js for DOersMeteor.js for DOers
Meteor.js for DOers
ShavonnahTiera
 
B05921016
B05921016B05921016
B05921016
IOSR-JEN
 
Synergy Global Forum
Synergy Global ForumSynergy Global Forum
Synergy Global Forum
Ingenium Бизнес
 
Caffeでお手軽本格ディープラーニングアプリ @potatotips
Caffeでお手軽本格ディープラーニングアプリ @potatotipsCaffeでお手軽本格ディープラーニングアプリ @potatotips
Caffeでお手軽本格ディープラーニングアプリ @potatotips
Takuya Matsuyama
 
What type of entrepreneur are you?
What type of entrepreneur are you?What type of entrepreneur are you?
What type of entrepreneur are you?
Derek Lidow
 
tvOSネイティブアプリを作る
tvOSネイティブアプリを作るtvOSネイティブアプリを作る
tvOSネイティブアプリを作る
Tomoki Hasegawa
 
Women Entrepreneurship
Women EntrepreneurshipWomen Entrepreneurship
Women Entrepreneurship
Priyanka Payal Pareek
 
Ed assignment
Ed assignmentEd assignment
Ed assignment
memymyself
 
Flaphone
FlaphoneFlaphone
Соловейчик Кирилл Александрович - Программы ФГБУ
Соловейчик Кирилл Александрович - Программы ФГБУ Соловейчик Кирилл Александрович - Программы ФГБУ
Соловейчик Кирилл Александрович - Программы ФГБУ
Ingria. Technopark St. Petersburg
 
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Ingria. Technopark St. Petersburg
 
Управление удачей
Управление удачейУправление удачей
Управление удачей
Ingria. Technopark St. Petersburg
 

Viewers also liked (20)

J05915457
J05915457J05915457
J05915457
 
Erevolution Nasscom 070808 Cdgarh Sriram Iridiuminteractive
Erevolution  Nasscom  070808 Cdgarh  Sriram  IridiuminteractiveErevolution  Nasscom  070808 Cdgarh  Sriram  Iridiuminteractive
Erevolution Nasscom 070808 Cdgarh Sriram Iridiuminteractive
 
Chinese new year
Chinese new yearChinese new year
Chinese new year
 
Департамент недвижимости "Столица"
Департамент недвижимости "Столица"Департамент недвижимости "Столица"
Департамент недвижимости "Столица"
 
F05912731
F05912731F05912731
F05912731
 
спб. две столицы 1
спб. две столицы 1спб. две столицы 1
спб. две столицы 1
 
disneak
disneakdisneak
disneak
 
Jiangsu University
Jiangsu UniversityJiangsu University
Jiangsu University
 
Meteor.js for DOers
Meteor.js for DOersMeteor.js for DOers
Meteor.js for DOers
 
B05921016
B05921016B05921016
B05921016
 
Synergy Global Forum
Synergy Global ForumSynergy Global Forum
Synergy Global Forum
 
Caffeでお手軽本格ディープラーニングアプリ @potatotips
Caffeでお手軽本格ディープラーニングアプリ @potatotipsCaffeでお手軽本格ディープラーニングアプリ @potatotips
Caffeでお手軽本格ディープラーニングアプリ @potatotips
 
What type of entrepreneur are you?
What type of entrepreneur are you?What type of entrepreneur are you?
What type of entrepreneur are you?
 
tvOSネイティブアプリを作る
tvOSネイティブアプリを作るtvOSネイティブアプリを作る
tvOSネイティブアプリを作る
 
Women Entrepreneurship
Women EntrepreneurshipWomen Entrepreneurship
Women Entrepreneurship
 
Ed assignment
Ed assignmentEd assignment
Ed assignment
 
Flaphone
FlaphoneFlaphone
Flaphone
 
Соловейчик Кирилл Александрович - Программы ФГБУ
Соловейчик Кирилл Александрович - Программы ФГБУ Соловейчик Кирилл Александрович - Программы ФГБУ
Соловейчик Кирилл Александрович - Программы ФГБУ
 
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
 
Управление удачей
Управление удачейУправление удачей
Управление удачей
 

Similar to Design Encryption for Video Streaming with Brain Storm Optimization

Using Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoUsing Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry Video
Jun Steed Huang
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
AnIsh Kumar
 
Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Wanjin Yu
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
Abdullah Metwally
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
IJNSA Journal
 
Ch03
Ch03Ch03
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
IJNSA Journal
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
Shivam Singh
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
IJCSIS Research Publications
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
Jennifer Reither
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
ijmnct
 
Synthetic dialogue generation with Deep Learning
Synthetic dialogue generation with Deep LearningSynthetic dialogue generation with Deep Learning
Synthetic dialogue generation with Deep Learning
S N
 
MDEC Data Matters Series: machine learning and Deep Learning, A Primer
MDEC Data Matters Series: machine learning and Deep Learning, A PrimerMDEC Data Matters Series: machine learning and Deep Learning, A Primer
MDEC Data Matters Series: machine learning and Deep Learning, A Primer
Poo Kuan Hoong
 
Hash
HashHash
Hash
Tazo Al
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
IJERA Editor
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 

Similar to Design Encryption for Video Streaming with Brain Storm Optimization (20)

Using Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoUsing Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry Video
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
 
Ch03
Ch03Ch03
Ch03
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
 
Synthetic dialogue generation with Deep Learning
Synthetic dialogue generation with Deep LearningSynthetic dialogue generation with Deep Learning
Synthetic dialogue generation with Deep Learning
 
MDEC Data Matters Series: machine learning and Deep Learning, A Primer
MDEC Data Matters Series: machine learning and Deep Learning, A PrimerMDEC Data Matters Series: machine learning and Deep Learning, A Primer
MDEC Data Matters Series: machine learning and Deep Learning, A Primer
 
Hash
HashHash
Hash
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 

More from Jun Steed Huang

ICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdfICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdf
Jun Steed Huang
 
Predicted COVID-19 Ending Time
Predicted COVID-19 Ending TimePredicted COVID-19 Ending Time
Predicted COVID-19 Ending Time
Jun Steed Huang
 
Forest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic HealthForest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic Health
Jun Steed Huang
 
Alphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous DesignAlphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous Design
Jun Steed Huang
 
UK COVID-9 Mutation
UK COVID-9 MutationUK COVID-9 Mutation
UK COVID-9 Mutation
Jun Steed Huang
 
Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election
Jun Steed Huang
 
Cosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement SpeedCosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement Speed
Jun Steed Huang
 
7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection Lines7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection Lines
Jun Steed Huang
 
Hyper variance and autonomous bus
Hyper variance and autonomous busHyper variance and autonomous bus
Hyper variance and autonomous bus
Jun Steed Huang
 
Mine Death Estimation
Mine Death EstimationMine Death Estimation
Mine Death Estimation
Jun Steed Huang
 
Steed Variance
Steed VarianceSteed Variance
Steed Variance
Jun Steed Huang
 
Power plant
Power plantPower plant
Power plant
Jun Steed Huang
 
Vtc9252019
Vtc9252019Vtc9252019
Vtc9252019
Jun Steed Huang
 
Quatum fridge
Quatum fridgeQuatum fridge
Quatum fridge
Jun Steed Huang
 
Hypo Variance
Hypo VarianceHypo Variance
Hypo Variance
Jun Steed Huang
 
From Hadamard to Langlands
From Hadamard to LanglandsFrom Hadamard to Langlands
From Hadamard to Langlands
Jun Steed Huang
 
Homogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique GenesisHomogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique Genesis
Jun Steed Huang
 
Complex Hurst for NDVI
Complex Hurst for NDVIComplex Hurst for NDVI
Complex Hurst for NDVI
Jun Steed Huang
 
Selabot Swarm
Selabot Swarm Selabot Swarm
Selabot Swarm
Jun Steed Huang
 
Autonomous bus
Autonomous busAutonomous bus
Autonomous bus
Jun Steed Huang
 

More from Jun Steed Huang (20)

ICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdfICFT-VNX-2022V2.pdf
ICFT-VNX-2022V2.pdf
 
Predicted COVID-19 Ending Time
Predicted COVID-19 Ending TimePredicted COVID-19 Ending Time
Predicted COVID-19 Ending Time
 
Forest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic HealthForest Environment Analysis for the Pandemic Health
Forest Environment Analysis for the Pandemic Health
 
Alphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous DesignAlphaba Smart Bus Autonomous Design
Alphaba Smart Bus Autonomous Design
 
UK COVID-9 Mutation
UK COVID-9 MutationUK COVID-9 Mutation
UK COVID-9 Mutation
 
Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election Analysis of 2020 USA Presidential Election
Analysis of 2020 USA Presidential Election
 
Cosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement SpeedCosmos Genesis Entanglement Speed
Cosmos Genesis Entanglement Speed
 
7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection Lines7 Safety +1 COVID-19 Protection Lines
7 Safety +1 COVID-19 Protection Lines
 
Hyper variance and autonomous bus
Hyper variance and autonomous busHyper variance and autonomous bus
Hyper variance and autonomous bus
 
Mine Death Estimation
Mine Death EstimationMine Death Estimation
Mine Death Estimation
 
Steed Variance
Steed VarianceSteed Variance
Steed Variance
 
Power plant
Power plantPower plant
Power plant
 
Vtc9252019
Vtc9252019Vtc9252019
Vtc9252019
 
Quatum fridge
Quatum fridgeQuatum fridge
Quatum fridge
 
Hypo Variance
Hypo VarianceHypo Variance
Hypo Variance
 
From Hadamard to Langlands
From Hadamard to LanglandsFrom Hadamard to Langlands
From Hadamard to Langlands
 
Homogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique GenesisHomogeneous Cosmos Unique Genesis
Homogeneous Cosmos Unique Genesis
 
Complex Hurst for NDVI
Complex Hurst for NDVIComplex Hurst for NDVI
Complex Hurst for NDVI
 
Selabot Swarm
Selabot Swarm Selabot Swarm
Selabot Swarm
 
Autonomous bus
Autonomous busAutonomous bus
Autonomous bus
 

Recently uploaded

Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfMending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Selcen Ozturkcan
 
Microbiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdfMicrobiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdf
sammy700571
 
gastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptxgastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptx
Shekar Boddu
 
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
Advanced-Concepts-Team
 
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
frank0071
 
Introduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptxIntroduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptx
QusayMaghayerh
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
Carl Bergstrom
 
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
PsychoTech Services
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
Frédéric Baudron
 
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
Scintica Instrumentation
 
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSJAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
Sérgio Sacani
 
Immersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths ForwardImmersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths Forward
Leonel Morgado
 
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Leonel Morgado
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
International Food Policy Research Institute- South Asia Office
 
2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf
lucianamillenium
 
LEARNING TO LIVE WITH LAWS OF MOTION .pptx
LEARNING TO LIVE WITH LAWS OF MOTION .pptxLEARNING TO LIVE WITH LAWS OF MOTION .pptx
LEARNING TO LIVE WITH LAWS OF MOTION .pptx
yourprojectpartner05
 
Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...
Leonel Morgado
 
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of ProteinsGBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
Areesha Ahmad
 
cathode ray oscilloscope and its applications
cathode ray oscilloscope and its applicationscathode ray oscilloscope and its applications
cathode ray oscilloscope and its applications
sandertein
 
Gadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdfGadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdf
PirithiRaju
 

Recently uploaded (20)

Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfMending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
 
Microbiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdfMicrobiology of Central Nervous System INFECTIONS.pdf
Microbiology of Central Nervous System INFECTIONS.pdf
 
gastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptxgastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptx
 
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...
 
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
 
Introduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptxIntroduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptx
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
 
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
 
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
 
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSJAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
 
Immersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths ForwardImmersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths Forward
 
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
 
2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf
 
LEARNING TO LIVE WITH LAWS OF MOTION .pptx
LEARNING TO LIVE WITH LAWS OF MOTION .pptxLEARNING TO LIVE WITH LAWS OF MOTION .pptx
LEARNING TO LIVE WITH LAWS OF MOTION .pptx
 
Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...Authoring a personal GPT for your research and practice: How we created the Q...
Authoring a personal GPT for your research and practice: How we created the Q...
 
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of ProteinsGBSN - Biochemistry (Unit 6) Chemistry of Proteins
GBSN - Biochemistry (Unit 6) Chemistry of Proteins
 
cathode ray oscilloscope and its applications
cathode ray oscilloscope and its applicationscathode ray oscilloscope and its applications
cathode ray oscilloscope and its applications
 
Gadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdfGadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdf
 

Design Encryption for Video Streaming with Brain Storm Optimization

  • 1. Design Swapping Encryption System for Video Streaming with Brain Storm Optimization Jun Steed Huang, Qiong Wu and Qi Chen The 10th International Conference on Bio-inspired Computing: Theories and Applications (BIC-TA 2015) Session on Bio-inspired Methods for Real-world Design Problems Location: Building No. 6, 1st floor, Conference Room No. 2, 26th September, 2015, Lakeside Hotel, 1 Rongcheng Road, Hefei, China
  • 2. About the authors • Jun Steed Huang, in 1992 received joint Ph.D from a program between Southeast University China and Concordia University Canada. He worked at Bell Canada, Lockheed Martin USA, Ottawa University. He is a Professor of Suqian College with Jiangsu University, board advisor for high tech organizations. Qiong Wu, in 2007 received master degree in department of telecommunications engineering from Southwest Technology University. She was visiting scholar at Southeast University last year. Now she is an associate professor at Suqian College. • Chen Qi, just received B.E. degree in Department of Telecommunications Engineering form Jiangsu University, now studying for master at Shanghai. His technical interest includes wireless sensor image processing and network programming.
  • 3. Agenda 1. Introduction 2. The System and the Solution 3. Encryption Scheme and Optimization 4. Simulation and Experiments 5. Summary and Future Work
  • 4. 1. Introduction Most swarm intelligence algorithms are inspired by simple self- designed synergy, Particle Swarm Optimization is inspired by synergistic effect by birds, Ant Colony algorithm is inspired by synergistic effect by ants and Fire Flies optimization algorithm is inspired by synergistic effect by fire flies, Brain Storm Optimization algorithms inspired by synergistic effect by us - the most intelligent creature! November 1950, American social psychologist, musician, sex education promoter: Kennedy.
  • 5. 1. KeyExpansions — round keys are derived from the cipher key using Rijndael's key schedule, AES requires a separate 128-bit round key block for each round. 2. InitialRound 1. AddRoundKey—each byte of the state is combined with a block of the round key using bitwise xor. 3. Rounds 1. SubBytes — a non-linear substitution step where each byte is replaced with another according to a lookup table. 4. ShiftRows — a transposition step where the last three rows of the state are shifted cyclically a certain number of steps. 5. MixColumns — a mixing operation which operates on the columns of the state, combining the four bytes in each column. 6. AddRoundKey, SubBytes, ShiftRows, AddRoundKey. The encryption of selected by the U.S. National Institute of Standards and Technology in 2001
  • 6. 2. The System and the Solution
  • 7. When the network cloud is a private system, the existing encryption might be good enough; however when the network cloud includes public network, and When the drone has the limited power supple, a swapping based encryption methodology becomes necessary. Maintaining several passwords across a number of wireless networks can be cumbersome. An end-to-end pass phrase and time-stamp based encryption in this case is highly desirable for most end users. There are many types of optimization algorithm. We focus on the brain storm one, because the key space is huge. swapping solution
  • 8. SES vs AES The key 1 2 3 4 Text before a b c d Text after b a d c The key 1 2 3 4 Text before a b c d Text after d4 a1 b2 c3
  • 9. 3. Encryption Scheme Optimization Fibonacci was born 1170, a wealthy Italian merchant A Fibonacci polynomial is defined as the next number in the sequence being made from the weighted summation of previous two numbers, Fn+1(x,y)=xFn(x,y)+ yFn-1(x,y) If the very first two weights x=y=1, then it is called original Fibonacci sequence.
  • 12. 4. Simulation and Experiments
  • 13.
  • 14. 5. Summary and Future Work The encryption for live video dedicated to the security communities is different, Fibonacci polynomial based on transcendental number data swapping key generation algorithm fit, Its spectrum based brain storm optimized key has advantage, Developmental brainstorming will make it more low power, low latency and high security.
  • 15. Acknowledge Thanks go to Prof. Yuhui Shi, and Prof. Qihong Yu for discussions.
  • 16. Thank You ! •Questions are welcome : 15862930930@163.com