A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft

Battery-powered unmanned aerial vehicle based video sensing system is more cost-saving and energy-saving than traditional aircraft based systems. However, high-volume real-time sensing data is more vulnerable in unmanned system than that in manned system. Meanwhile, the computation and energy resources in such system are very limited, which restricts the use of complex encryption process on video data. Therefore, how to achieve confidentiality of video data under limited resources efficiently needs to be addressed. Firstly, resources constraints with their development trends in video sensing system are studied. Secondly, an information-utility-value-oriented resource-efficient encryption optimization model under resources constraints is given. Thirdly, based on this model, a video-compression-independent speed-adjustable lightweight encryption scheme with its improved version is proposed. Fourthly, a DSP and ARM based embedded secure video sensing system is designed, and the proposed encryption scheme has been implemented in it. In addition, theoretical analyses based on information theory and experimental analyses on throughputs show that the proposed encryption schemes can meet the real-time requirements of system under the tight resources constraints. By studying the resources constraints with their development trends in video sensing system, an information-utility-value-oriented multimedia encryption optimization model under resources constraints is given.A video-compression-independent speed-adjustable lightweight encryption scheme with its improved version based on the previously proposed model is given.A DSP and ARM based embedded secure video sensing system is designed, and the proposed encryption scheme has been implemented in it.

[1]  Nouri Masmoudi,et al.  Evaluation and implementation of simultaneous binary arithmetic coding and encryption for HD H264/AVC codec , 2013, 10th International Multi-Conferences on Systems, Signals & Devices 2013 (SSD13).

[2]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[3]  Balasubramanian Raman,et al.  Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems , 2014, Adv. Multim..

[4]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[5]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[6]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[7]  Jamal N. Al-Karaki,et al.  Wireless Multimedia Sensor Networks: Current Trends and Future Directions , 2010, Sensors.

[8]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[9]  Min Chen A Hierarchical Security Model for Multimedia Big Data , 2014, Int. J. Multim. Data Eng. Manag..

[10]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[11]  Claude E. Shannon,et al.  Recent Contributions to The Mathematical Theory of Communication , 2009 .

[12]  Hartmut König,et al.  Puzzle - an efficient, compression independent video encryption algorithm , 2012, Multimedia Tools and Applications.

[14]  Hartmut König,et al.  A survey of video encryption algorithms , 2010, Comput. Secur..

[15]  J.D. Gibson,et al.  Selective encryption and scalable speech coding for voice communications over multi-hop wireless links , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[16]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[17]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[18]  Jorge Sá Silva,et al.  Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.

[19]  Zhi Hua Hu,et al.  The Security Mechanism for Internet of Things Networks , 2012 .

[20]  Wu-chi Feng,et al.  Efficient multi-layer coding and encryption of MPEG video streams , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[21]  R. Manimegalai,et al.  A Survey on Joint Compression and Encryption Techniques for Video Data , 2012 .

[22]  Jim Gray,et al.  A Conversation with Jim Gray , 2003, ACM Queue.

[23]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[24]  K. Nahrstedt,et al.  A New Algorithm for MPEG Video , 1997 .

[25]  Silviu Guiaşu,et al.  Information theory with applications , 1977 .

[26]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[27]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[28]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[29]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..