Lin Zhen, Wang Changhui, Liu Yu, et al. Flow separation and side-load in nozzle[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(3): 307-310. (in Chinese)
Citation: Xiao Chen, Ma Shilong, Lü Weifeng, et al. Selective control mechanism for multi-datastream security in streaming media system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(11): 1292-1297. (in Chinese)

Selective control mechanism for multi-datastream security in streaming media system

  • Received Date: 26 Sep 2007
  • Publish Date: 30 Nov 2008
  • Partial encryption and other media encryption schemes are effective approaches to encrypt the media data which are high volume and latency sensitive. However, use one media encryption scheme to protect all the media streams in a streaming media system will induce efficiency, scalability and security problems. To solve this problem, a security weightiness based dynamic optimal selective control mechanism for multi-datastream encryption was proposed. The idea of partial encryption was generalized from encrypting a subset of one stream to multi-streams. It can determine the optimum encryption algorithm with different security levels for each stream in the system, according to stream-s bandwidth, weightiness and other parameters. Since the simplified mathematical model is 0-1 knapsack problem which is NP-hard, a greedy heuristic incremental approximate algorithm was designed. Theoretical and experimental analyses show the approximate rate and speed of the algorithm are effective enough to support real-time applications. A prototype was implemented in an actual video conferencing system: Admire.

     

  • [1] Jin T, Sheng X Z, Lu J. Admire, a prototype of large scale e-collaboration platform //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:335-343 [2] Huang T, Yu X N.An adaptive mixing audio gateway in heterogeneous networks for admire system //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:294-302 [3] Yin H, Lin C, Qiu F,et al. CASM: A content-aware protocol for secure video multicast[J]. IEEE Trans on Multimedia,2006,8(2):270-277 [4] Liu F W, Koenig H. A novel encryption algorithm for high sesolution video //Proc of NOSSDAV05.New York:ACM Press,2005:69-74 [5] ITU-T H.235(v3). Security and encryption for h-Series (H.323 and other H.245-based) multimedia terminals[S] [6] Maples T, Spanos G. Performance study of a selective encryption scheme for the security of networked, real-time video //4th Int Conf on Computer Comm and Networks. Wash. D C: IEEE Computer Society Press,1995:2-10 [7] Tang L. Methods for encrypting and decrypting MPEG video data efficiently //Proceedings of the 4th ACM International Conference on Multimedia. Boston, MA: ACM Press, 1996:219-230 [8] Servetti A,Martin J C. Perception-based partial encryption of compressed speech [J]. IEEE Trans on Speech and Audio Processing,2002,10:637-643 [9] Cheng H, Li X B.Partial encryption of compressed images and videos[J]. IEEE Trans on Signal Processing,2000,3: 2439 2451 [10] Tosun A S, Feng W C. On error preserving encryption algorithms for wireless video transmission //Proc of the 9th ACM International Conference on Multimedia.New York:ACM Press,2001: 302-308 [11] Lookabaugh T, Sicker D C, Keaton D M, et al. Security analysis of selectively encrypted MPEG-2 streams //Proc of the Multimedia Systems and Applications VI. Bellingham: SPIE Press, 2003:10-21 [12] Qiao T L, Narhstedt K. Comparison of MPEG encryption algorithms[J]. Computer and Graphics,1998,22 (4): 437-448 [13] Robertazzi T G. Computer networks and system: queuing theory and performance evaluation[M]. Berlin: Springer, 2000 [14] Martello S, Toth P. Knapsack problems: algorithms and computer implementations[M]. Chichester: John Wiley & Sons, 1990 [15] Sahni S. Approximate algorithms for the 0-1 knapsack problem [J]. Journal of the Assoc for Computing Machinery, 1975,22(1):115-124
  • Relative Articles

    [1]Huang T T. A varying coefficient geographically weighted spatial lag model for compositional data[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(7):2256-2264 (in Chinese). doi: 10.13700/j.bh.1001-5965.2023.0347.
    [2]LI R Z,JIANG B,YU Z Q,et al. Data-driven fault detection and diagnosis for UAV swarms[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(5):1586-1592 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0441.
    [3]LIU W,YAN S,WANG X B,et al. Consensus control of multi-agent systems with uncertain communication networks[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(5):1463-1473 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0518.
    [4]GUO R P,WANG H R,WANG D. Multilevel relation analysis and mining method of image-text[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(2):684-694 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0599.
    [5]LI Dan, CUI Wen-feng, CHEN Gui-peng. ptimal dynamic response exploration for SIMO Buck converter based on differential evolution algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0356
    [6]LI Ruiqi, HUANG Yongqiang, LIU Liang, YUE Meng. Data Security Transmission Protection Mechanism for L-band Digital Aeronautical Communications System Based on Domestic Cryptographic Algorithms[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0656
    [7]NA Qiang, XIANG Peng, ZHENG Huaizhou, ZHOU Shun, HE Hongye. Similarity Analysis of Pre-Launch Data for Aerospace Rocket Testing Based on Adaptive DTW Algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0524
    [8]WANG X K,MENG Q W,XU H,et al. MP-WFRFT secure communication method based on multi-cascade chaotic encryption[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(6):1960-1968 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0500.
    [9]ZHANG Dongping, WANG Mengting, LU Zhanhong, REN Ye, LIU Zhiyong, YANG Li. Intrusion Detection in Industrial Control Systems Based on Data Augmentation by Large Time Series Models[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0755
    [10]ZHOU N,ZHANG S L,ZHANG C. Discrete sparrow search algorithm incorporating rough data-deduction for solving hybrid flow-shop scheduling problems[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(2):398-408 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0424.
    [11]CHANG Z N,HU M H,ZHANG Y,et al. A multi-objective optimal control trajectory optimization method for aircraft under wind influence[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(11):3521-3531 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0836.
    [12]ZHANG Wen-qiang, CHEN Yi-yi, LEI Guo-qiang, WANG Guang-yu, ZHI Ya-fei, MAO Xue-rui. Data Processing Methodology of the Icing Meteorological Detection in FAR 25 Appendix C[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0569
    [13]CAO X W,YAO D,SUN F R,et al. Airspace sector planning method based on radar data mining[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(12):3237-3244 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0573.
    [14]LEI Yao-lin, DING Wen-rui, LUO Yi-zhe, WANG Yu-feng, LIU Si-qi, ZHANG Zhi-lan. Trajectory planning and resource allocation methods in UAV data collection missions[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0531
    [15]WANG Jin-hua, LIU Rui, CAO Jie. Rolling bearing fault diagnosis method based on multi domain adaptation[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023-0166
    [16]XIONG Liang, ZHANG Rui, XU Bin, HUANG Qiao-ping. Research on Evolution Mechanism of Configuration and Parameter Solution Model of Air Data Sensing System for Aircraft[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0339
    [17]KONG B A,LU S,WANG H W. Incremental computing methods of canonical correlation analysis for compositional data streams[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(10):2851-2858 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0765.
    [18]WU Xin, WU Youli, NIU Deqing, CAI Yuxuan, XU Yang, CHEN Bian. Application of data cube association mining in infrared anti-jamming[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(11): 2304-2313. doi: 10.13700/j.bh.1001-5965.2021.0096
    [19]MA Zhiwei, LI Haojie, FAN Xin, LUO Zhongxuan, LI Jianjun, WANG Zhihui. A real scene underwater semantic segmentation method and related dataset[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(8): 1515-1524. doi: 10.13700/j.bh.1001-5965.2021.0527
    [20]JI Xiaoqi, SONG Zikai, YU Junqing. Player movement data analysis on soccer field reconstruction[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(8): 1543-1552. doi: 10.13700/j.bh.1001-5965.2022.0131
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(4021) PDF downloads(966) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return