amazon

Friday, August 14, 2015

ON ENERGY EFFICIENT ENCRYPTION FOR VIDEO STREAMING IN WIRELESS SENSOR NETWORKS

On Energy Efficient Encryption for Video
Streaming in Wireless Sensor Networks

 Introduction:

                                    VIDEO streaming protocols such as MPEG-4 H.264/AVC   have gained popularity or their wide applications in wireless sensor networks (WSNs). It is well known that many applications in WSNs are mission critical, such as battlefield assistance, adversary intrusion detection, distributed signal processing, etc. In these applications, the multimedia semantic information and video content are extremely sensitive to malicious attacks, including eavesdropping/intercepting of ongoing traffic, and manipulating/counterfeiting of the existing media flows. In this paper, we tackle the challenges of eavesdropping and intercepting attacks in WSNs, motivated by a simple but critical fact, i.e., the accessibility of surveillance video stream content information to adversaries will reveal the location of cameras to them, jeopardizing information retrieval functionalities critical to the WSNs.  Conventional data encryption schemes such as advanced encryption standard (AES) and elliptic curve cryptography (ECC) are difficult to be applied directly to wireless video privacy protection      due to the large volume of data and real-time transmission requirements. Selective encryption [4], [5] has been proposed recently as an ideal candidate to achieve content protection. However, most of the previous works on multimedia selective encryption have been focused mainly on the application layer cryptography, and they did not consider the optimal delivery of encrypted video frames in error-prone wireless channels. Furthermore, the study on critical energy-distortion optimization in WSNs with flexible network resource allocation is missing in the literature.
           
                       
                        The works in [4] and [5] surveyed state-of-the-art multimedia privacy protection technologies, and the authors strongly advocated selective encryption as an efficient solution to achieve multimedia secrecy. Lain et al. [6] proposed a partial encryption scheme aiming to hide important MPEG-4 H.264 content information. In an approach revealed in [6], the intra-prediction mode information, residue data, and motion vectors were selected and ciphered based on the Exp-Golomb coding, the context-adaptive variable length coding (CAVLC), and the sign coding. The work reported in [7] also proposed a selective encryption algorithm for H.264/AVC video, in which the first eight bytes of data in each macro block were encrypted based on data encryption standard (DES) to distort the video visual quality. The works demonstrated in [7] and [8] proposed the schemes
for the frequency domain scrambling of the significant transformation coefficients to avoid video content fruition by unauthorized or illegitimate users. The carefully designed scrambling techniques in those approaches considerably alleviates the
Plaintext attacks. Efficient quad-tree and zero-tree-based selective encryption approaches were suggested in [9] for digital images and videos.

Existing System:

·         The issues on joint optimization of video quality, content protection, and communication energy efficiency in a wireless sensor network (WSN) have not been fully performed.

·         applications, the multimedia semantic information and video content are extremely sensitive to malicious attacks, including eavesdropping/intercepting of ongoing
Traffic and manipulating/counterfeiting.

·         The previous works on multimedia selective encryption have been focused mainly on the application layer cryptography, and they did not consider the optimal delivery of encrypted video frames in error-prone wireless channels.

·         In all the aforementioned works, various challenging issues of improving energy efficiency in WSNs and a joint design of energy-distortion-encryption schemes were not considered.

·         our previous works were focused on providing security for a single
·         image only, without considering the temporal correlation and dependency among multiple pictures in a video sequence

 

PROPOSED SYSTEM:


·         We propose a scheme to optimize the energy, distortion, and encryption performance of video streaming in WSNs a channel-aware selective encryption approach is proposed to minimize the extra encryption dependency overhead at the application layer.

·         Second, an unequal error protection (UEP)-based network resource allocation scheme is proposed to improve the communication efficiency at the lower Layers.
·         Simulation experiments demonstrate that the proposed joint selective encryption and resource allocation scheme can improve the video transmission quality.

·         Proposed a partial encryption scheme aiming to hide important MPEG-4 H.264 content information.

·         The work reported in also proposed a selective encryption algorithm for H.264/AVC video, in which the first eight bytes of data in each macro block were encrypted based on data encryption standard (DES) to distort the video visual quality.

·         The proposed application layer selective encryption improves the robustness against transmission error by minimizing the encryption overhead among video frames.

·         The proposed network resource allocation scheme at the lower layers enhances the energy-distortion-encryption performance by distributing energy resources and communication efforts efficiently.

·         In addition, a new UEP-based network resource allocation scheme is proposed to
·         Optimize the selectively encrypted video transmission at the lower layers.

·         For P or B frames with more efficient inter-prediction, a percentage of 7.6% and 1.8% of the total bit stream are achieved for effective encryption, respectively.

·         Thus, encryption-distortion performance gain is achieved by our proposed channel-aware priority-based selective encryption scheme.

Advantage of proposed system:
            The encryption cost is lowered by reducing the total encryption workload, rather
            Than reducing key length or algorithm complexity.
            We use strong block-based encryption algorithms (such as advanced encryption systems—AES) and a minimum key length requirement as illustrated in (3) to provide security and the cost is reduced by using less encrypted multimedia information bits.

            The work reported in also proposed a selective encryption algorithm for H.264/AVC video, in which the first eight bytes of data in each macro block were encrypted based on data encryption standard (DES) to distort the video visual quality.

                        SYSTEM SPECIFICATION:

Hardware CONFIGURATION
Ø  Hard disk                    :           40 GB
Ø  RAM                           :           512mb
Ø  Processor                     :           Pentium IV
Ø  Monitor                  :    17’’Color Monitor
Software CONFIGURATION
Ø  Front-End                    :  VS .NET 2005
Ø  Coding Language   :  C#
Ø  Operating System   :  Windows XP.
Ø  Back End                 :  SQLSERVER 2005





          Modules:
Layer approach
                        Resource allocation
                        Video selective encryption
                         Wireless sensor network

Modules Explanation:
         Layer approach
                            The application layer loss aware selective encryption is to determine the minimum encryption block length to meet the security requirement.
                            A greater key length and hence a larger encryption block length lead to better security and privacy guarantee. The penalty of increasing encryption key length involves extra encryption dependency in video stream data and degrades video transmission quality in wireless channels.
                           The next step of the proposed scheme is to determine the encryption priority among t he video frames. We perform a complete frame level decoding dependency analysis
Input:
                         Get the video and then we split up into frames.  We can give key for encrypt the frames. The key length is larger it gives the higher security.
                        We giving higher key length we can protect the higher protection but the video quality is low 
 Output:
                        The frames have keys to encrypt.

 

Resource allocation
                         The lower layer resource allocation energy distortion modeling performance modeling for a single video frame transmission in wireless channels can be modeled as a resources allocation problem.
                        The frame delivery energy consumption and the frame delivery packet loss rate are related to the resource allocation parameters in closed form.
                        Since there are typically a large number of video frames in a group of picture and many resources allocation parameter are applicable and adjustable a complete and accurate global optimum is hard to achieve with the limited computational resources at sensor nodes.
                        Unequal error protection based network resource allocation for the selectively encrypted video frames in a group of picture can be further simplified and categorized.
                      The cross-layer resource allocation approach is simplified to find the optimal transmission parameters for each frames class.
                    The resource allocation parameter for each video frames is reduced to n=Pt. in the inter correlated code stream.

Input:
             Get the frames from layer module. Using this module we can get the pictures to reduce the video frame length to compress.

Output:
             Receive the Compressed video to encrypt. 



Video selective encryption
                          The decoding dependency of video frames in the compressed encode stream could result in a significant quality degradation in error-prone wireless channels.
                           In addition, the selective encryptions on certain important code words in each video frame introduce further inter frame dependency.
                           Designing a proper and efficient selective encryption algorithm to minimize the extra encryption dependency overhead is a critical issue for secure packet video transmission over wireless sensor nodes.

Input:
                         Get all the compressed video frames to set a video format. We can set the code word for each frame to collect the secret videos.

Output:
                        Receive the all encrypted frames to a set of video format to send through internet.


Wireless sensor network
                         Sensor network extend the existing internet deep into the physical environment. The resulting new network is order of  magnitude more expansive and dynamic than the current TCP/IP network and is creating entirely new types of traffic that are quite different from what one finds  on the internet now.
                         Information collected by and transmitted on a sensor network describes conditions of physical environment.
  


Advantages of sensor network
                            Networked sensor offers unique advantages over traditional centralized approaches. Dense network of distributed communicating sensor can improve signal-to –noise by reducing average distance from sensor to sensor of signal. Increased energy efficiency in communication is enabled by the Multi topology of the network.


Input:
        
               We can publish the video into the internet.

Output:
         
             The user will not download the videos.



No comments:

Post a Comment