Processing math: 100%
Research article Topical Sections

Evaluation of renewable energy deployment scenarios for building energy management

  • According to International Energy Agency (IEA), 35% of total energy is consumed in buildings. Proper management of building energy would effectively improve fossil fuel consumption by integrating Renewable Energy Sources (RES). This paper introduces novel methodology to deploy Renewable Energy Sources (RES) for buildings. The developed methodology composed of two steps: evaluation of RES deployment to a building and evaluation of load-generation scenarios in buildings. At first, the proposed algorithm obtains information about building facilities and structure that can be used to deploy PV, wind turbine and gas generator. Solar and wind profiles are analyzed and integrated with building energy model, which is used to evaluate potential energy generation scenarios. The second step includes the evaluation of different supply—generation scenarios based on load profiles and solar and wind generation profiles. This step will include the minimization of energy loss and will seek effective utilization of generated energy. A case study of domestic home in Toronto, Canada, was chosen as an example to demonstrate the proposed algorithm. Results are shown and analyzed which demonstrate the different scenarios generated for the selected case study based on loads and generation profiles.

    Citation: Hossam A. Gabbar, Ahmed Eldessouky, Jason Runge. Evaluation of renewable energy deployment scenarios for building energy management[J]. AIMS Energy, 2016, 4(5): 742-761. doi: 10.3934/energy.2016.5.742

    Related Papers:

    [1] Junli Liu . Threshold dynamics of a time-delayed hantavirus infection model in periodic environments. Mathematical Biosciences and Engineering, 2019, 16(5): 4758-4776. doi: 10.3934/mbe.2019239
    [2] Timothy C. Reluga, Jan Medlock, Alison Galvani . The discounted reproductive number for epidemiology. Mathematical Biosciences and Engineering, 2009, 6(2): 377-393. doi: 10.3934/mbe.2009.6.377
    [3] Junyuan Yang, Rui Xu, Xiaofeng Luo . Dynamical analysis of an age-structured multi-group SIVS epidemic model. Mathematical Biosciences and Engineering, 2019, 16(2): 636-666. doi: 10.3934/mbe.2019031
    [4] Zi Sang, Zhipeng Qiu, Xiefei Yan, Yun Zou . Assessing the effect of non-pharmaceutical interventions on containing an emerging disease. Mathematical Biosciences and Engineering, 2012, 9(1): 147-164. doi: 10.3934/mbe.2012.9.147
    [5] Wenjuan Guo, Ming Ye, Xining Li, Anke Meyer-Baese, Qimin Zhang . A theta-scheme approximation of basic reproduction number for an age-structured epidemic system in a finite horizon. Mathematical Biosciences and Engineering, 2019, 16(5): 4107-4121. doi: 10.3934/mbe.2019204
    [6] Akhil Kumar Srivastav, Pankaj Kumar Tiwari, Prashant K Srivastava, Mini Ghosh, Yun Kang . A mathematical model for the impacts of face mask, hospitalization and quarantine on the dynamics of COVID-19 in India: deterministic vs. stochastic. Mathematical Biosciences and Engineering, 2021, 18(1): 182-213. doi: 10.3934/mbe.2021010
    [7] Ann Nwankwo, Daniel Okuonghae . Mathematical assessment of the impact of different microclimate conditions on malaria transmission dynamics. Mathematical Biosciences and Engineering, 2019, 16(3): 1414-1444. doi: 10.3934/mbe.2019069
    [8] Ridouan Bani, Rasheed Hameed, Steve Szymanowski, Priscilla Greenwood, Christopher M. Kribs-Zaleta, Anuj Mubayi . Influence of environmental factors on college alcohol drinking patterns. Mathematical Biosciences and Engineering, 2013, 10(5&6): 1281-1300. doi: 10.3934/mbe.2013.10.1281
    [9] Ning Yu, Xue Zhang . Discrete stage-structured tick population dynamical system with diapause and control. Mathematical Biosciences and Engineering, 2022, 19(12): 12981-13006. doi: 10.3934/mbe.2022606
    [10] Baojun Song . Basic reinfection number and backward bifurcation. Mathematical Biosciences and Engineering, 2021, 18(6): 8064-8083. doi: 10.3934/mbe.2021400
  • According to International Energy Agency (IEA), 35% of total energy is consumed in buildings. Proper management of building energy would effectively improve fossil fuel consumption by integrating Renewable Energy Sources (RES). This paper introduces novel methodology to deploy Renewable Energy Sources (RES) for buildings. The developed methodology composed of two steps: evaluation of RES deployment to a building and evaluation of load-generation scenarios in buildings. At first, the proposed algorithm obtains information about building facilities and structure that can be used to deploy PV, wind turbine and gas generator. Solar and wind profiles are analyzed and integrated with building energy model, which is used to evaluate potential energy generation scenarios. The second step includes the evaluation of different supply—generation scenarios based on load profiles and solar and wind generation profiles. This step will include the minimization of energy loss and will seek effective utilization of generated energy. A case study of domestic home in Toronto, Canada, was chosen as an example to demonstrate the proposed algorithm. Results are shown and analyzed which demonstrate the different scenarios generated for the selected case study based on loads and generation profiles.


    H.265/HEVC stands for high efficiency video coding. It is a new generation of video compression coding standards officially released by the ITU-T | ISO/IEC Joint Collaboration Team on Video Coding (JCT-VC). A more efficient video coding algorithm saves 50% of the bit rate compared to the previous generation coding standard H.264/AVC, which greatly increases the video data transmission speed and supports higher-definition video coding [1]. The encryption and decryption operations of video data require a large number of ciphers, which are the same as the requirements of the 'one-time pads' encryption technology proposed by Shannon [2]. For any piece of plain text information, a cipher with the same volume as the plain text information must be generated, and a bit XOR operation obtains ciphertext information of equal volume. Chaos is the externally complex performance of nonlinear deterministic systems due to inherent randomness. In the material world, chaos can be seen everywhere, as large as the entire universe, as small as a single elementary particle, everything is subject to chaos theory. The introduction of chaos theory into cryptography was first proposed by British scholar R. Matthews in 1989 [3], therefore chaotic systems have received great attention in the field of cryptography and information security, especially in the aspect of rapid processing of a large quantity of video data, which makes the chaotic cryptography algorithm a promising cryptographic algorithm [4].

    As an increasing number of chaotic stream cipher algorithms have been proposed, the security and efficiency issues of applying chaotic map to stream cipher algorithms have also received attention. Chaotic systems used in cryptographic algorithms can be divided into two categories: one-dimensional chaos and high-dimensional chaos. The advantage of a one-dimensional chaotic system is its simple structure and ease of implementation, such as Logistic map and Tent map, but a one-dimensional chaotic system has some inherent defects in cryptography, such as uneven orbit distribution, a small key space, and a low Lyapunov exponent. High-dimensional chaotic systems have the advantages of a large key space and strong randomness, but the calculation process of high-dimensional maps is complicated, and the efficiency in the computer realization process is insufficient, which hinders the practical application of high-dimensional chaotic cryptographic algorithms. The coupled map lattice (CML) model is introduced to ensure that the one-dimensional chaotic system has a high-dimensional chaotic map, and simultaneously reduces the calculation process complexity [5]. Wang et al. proposed using the segmented Logistic map as a local chaotic map and introduced it into the two-dimensional coupled map lattice model to construct a chaotic model with complex dynamics [6]. By introducing the state value offset, the state value probability of the model was solved. Considering the problem of uneven density distribution, analysis of the Lyapunov exponent, bifurcation, ergodic interval and probability density distribution of the parameter settings in the model shows that the proposed model has good performance. Zhang et al proposed a new image encryption algorithm based on spatiotemporal nonadjacent coupled graphs [7]. Compared with the logical map or the coupled map lattice, the nonadjacent coupled map lattice system has a better encryption function in terms of dynamics. In the encryption of the image, a bit-level pixel replacement method is used to make the bit planes of the pixels replace each other without any additional storage space. However, obtaining data directly on the chaotic trajectory and directly outputting it exposes certain characteristics of the chaotic map, making it possible to predict the trend of the chaotic trajectory, which in turn leads to its weak security. Lv proposed a pseudorandom number generator based on time-varying coupled map lattice [8]. The calculation of the next value of the current grid is not only related to the current value of the model, but also uses a similar Chebyshev map to determine the time delay t, and couples the grid at the current time with the grid before time t, which increases the chaos of the system degree, making its orbit in phase space more complicated. However, the probability density of the core components used in the system is not uniform. In the process of designing cryptographic algorithms, choosing core components with uniform probability density helps increase the difficulty of the attacker attacking the algorithm. Yang proposed an improper fractional-order laser chaos system and applied it to image encryption [9]. The experimental results show that the key space, correlation coefficient, information entropy, histogram, differential attack and robustness of the encryption scheme are good. The improper fractional-order laser chaotic system not only has rich dynamic characteristics, but also is used in image encryption algorithms. It has better safety at the time. However, this system is a high-dimensional chaotic system, and its computational complexity is not superior to that of a lower-dimensional system.

    The selective encryption algorithm usually selects some important syntax elements for encryption during the encoding process, while the encrypted video can maintain format compatibility and ensure that it can be decoded by the HEVC standard decoder. The encrypted and decoded video produces distortion, and unauthorized access users cannot obtain effective information from it. Saleh et al. proposed a scheme to encrypt moving targets in HEVC [10]. This solution selectively encrypts the moving objects in the video content, selects the vertical data with a motion vector difference, and uses the AES algorithm for encryption. This solution only protects the moving objects in the video sequence and skips the static objects. If the moving objects in the video to be encrypted are not closely related in the time domain and the spatial domain, the encryption effect is greatly reduced. If the encrypted data are very small, such as only the sign bit of the motion vector difference or the sign of the transform coefficient, the encrypted data are vulnerable to brute force attacks. However, the solution performs well in terms of calculation cost, time consumption, format compatibility and bit increase, and it can be used for videos of different resolutions. Chen et al. proposed a HEVC-aware encryption scheme based on the RC4 algorithm [11]. This scheme constructs a key stream generation method based on RC4, which can adjust the ratio of "1" and "0" in the key stream. The four syntax elements of the sign of the motion vector difference, the magnitude of the motion vector difference, the sign of the luminance residual coefficient, and the sign of the chrominance residual coefficient are encrypted by the selected key stream. This solution has the advantages of large encryption space, low calculation cost, no increase in bit rate, and format compatibility. However, when the encryption ratio is not high, the video encryption effect is not good. Long et al. proposed a separable and reversible data hiding and encryption scheme for HEVC [12]. In the encoding stage, the RC4 key stream is used to encrypt the symbols of the motion vector difference and the remaining coefficients, and hide the data in the nonzero AC remaining coefficients. The encryption scheme has good perceived security and sufficient encryption space, which can effectively resist brute force attacks on video content. While ensuring that the video content is protected, data embedding can also be completed, and format compatibility can be ensured. However, it is necessary to complete data encryption and embedding, and the calculation cost is moderate. Yang et al. proposed an efficient format-compatible encryption scheme [13]. This solution selects the most important syntax elements in video reconstruction for encryption, and ensures that the encrypted bit stream is compatible with the HEVC standard. The suffix of the absolute value of the motion vector difference, the remaining coefficients, the motion vector difference, and the suffix of the absolute value of the difference between the coding unit quantization parameter and the predicted value in the prediction unit are encrypted using AES. The encryption scheme does not need to modify the structure of the HEVC standard decoder, and can ensure format compatibility after encryption. However, there is a trade-off between security and computational complexity. When security is the primary consideration, the computational cost increases accordingly. Zhang et al. proposed a selective encryption scheme based on hyperchaotic Lorenz system for HEVC [14]. First, the hyperchaotic Lorenz system is discretized, and the generated chaotic state value is converted into a chaotic pseudo-random sequence for encryption. The experimental results show that the encrypted video is highly disturbed and the video information cannot be identified. The analysis of the objective index results shows that the scheme is both efficient and safe. But it also has the disadvantage of high computational complexity, which is not conducive to video data with the characteristics of large data volume and strong real-time performance. The paper will propose a one-dimensional chaotic system, and will focus on solving the problems that exist when high-dimensional chaotic systems are applied to encryption. In the choice of syntax elements to be encrypted, reference [14] is selected as the comparison algorithm.

    Chaotic systems can produce complex nonlinear behaviors in both time and space domains. Spatiotemporal chaos is a kind of nonlinear dynamic system with chaotic characteristics in both dimensions of time and space. CMLs are a classic spatiotemporal chaotic system. CML has more complex dynamic characteristics and a larger key space, so they are widely used in the construction of cryptographic systems [15,16,17]. The definition of CML under discrete time n can be described as Eq (1):

    xn+1(i)=(1ε)f[xn(i)]+ε2{f[xn(i1)]+f[xn(i+1)]} (1)

    A typical feature of chaotic systems is that they have a positive Lyapunov value, and the calculation equation of Lyapunov is defined as:

    λ=limn1nn1i=0ln|f(xi)| (2)

    where ε is coupled constant, i is the lattice position, and f(x) is the dynamic chaotic function. The CML diffusion process is the adjacent coupled process produced by the same map equation, so it is also called self-coupled. Wang proposed in [6] that the maximum Lyapunov exponent of the coupled map lattice model represented by Eq (1) is determined by f(x).

    Han et al. proposed an iterative chaotic map with infinite collapses (ICMIC) [18]. Equation (3) is the function of ICMIC, and the value range of a is a(0,).

    xn+1=f(xn)=sin(axn) (3)

    Compared with the existing chaotic maps that fold infinitely in a limited space, ICMIC has good chaotic characteristics, which are manifested in stronger sensitivity to the initial value of the iteration and a larger Lyapunov exponent value. Therefore, after combining with a logistic map, a new one-dimensional chaotic system L-ICMIC (Logistic-ICMIC) is proposed. The equation is defined as Eq (4), and the value range of a is also a(0,), where the initial value x00,aπxnxn2kπ2xn12±142ak(k=1,2,3...). The scope of the chaotic map is (0,1].

    xn+1=f(xn)=sin2(aπxnxn2) (4)

    The following analyzes the performance indicators of the L-ICMIC chaotic map, mainly analyzing and comparing its chaotic performance from the bifurcation graph, ergodicity, and Lyapunov exponent.

    (1) The bifurcation diagram of the chaotic map can intuitively reflect the bifurcation of the period-doubling of the chaotic map, indicating the change in the characteristics of the chaotic system when the system parameters change.

    It can be clearly seen in Figure 1. that L-ICMIC enters a completely chaotic state earlier than ICMIC, and the corresponding control parameters a have a larger value range when the system is in a chaotic state. This means that the key space when L-ICMIC is utilized as an encryption algorithm is larger than that of ICMIC.

    Figure 1.  Bifurcation of ICMIC and L-ICMIC chaotic dynamical systems.

    (2) The ergodicity of the chaotic map describes the distribution of state values in the phase space of the system. When the stronger ergodicity of a chaotic map is utilized for encryption, the stronger the violent anti-attack capability, and encryption, the better the performance.

    Figure 2 shows the distribution of state values of ICMIC and L-LCMIC chaotic maps as a function of control parameter a. When the L-ICMIC chaotic map state value occupies the entire phase space, the control parameter has a larger value range. It also confirms the change in bifurcation. Therefore, when both L-ICMIC and ICMIC meet the ergodicity requirements, L-ICMIC has a larger parameter value range.

    Figure 2.  Ergodicity of ICMIC and L-ICMIC chaotic dynamical systems.

    (3) The definition and expression of the Lyapunov exponent were given earlier, and the Lyapunov exponent is an important indicator to measure whether a dynamic system is a chaotic system. The higher the value of the Lyapunov exponent is, the better the degree of chaos of the dynamic system.

    Figure 3 shows that compared to ICMIC, L-ICMIC has a wide continuous range of chaotic parameters and stable dynamic characteristics. It is a robust nonlinear dynamic system that meets the requirements of cryptographic security properties.

    Figure 3.  Lyapunov exponent of ICMIC and L-ICMIC chaotic dynamical systems.

    It can be seen in [5,6,7,8,9] that CML has better chaotic characteristics. Now the proposed L-ICMIC is applied to the CML model to obtain a chaotic system with better performance in various aspects, and a pseudorandom sequence is generated for encryption. Next is the analysis of the new model system. Wang proposed in [6] that the largest Lyapunov exponent of the model has nothing to do with the size L and coupling strength ε of the model. The L-ICMIC-CML equation set after the introduction of CML can be expressed as Eq (5):

    {xn+1=(1ε)f[xn(i)]+ε2{f[xn(i1)+f[xn(i+1)]}f(xn)=xn+1=sin2(aπxnxn2) (5)

    n represents the time after discretization, i represents the lattice space coordinates, f(x) is the local chaotic map L-ICMIC, ε is the coupling strength; L is the number of lattices.

    The following analyzes the performance indicators of the L-ICMIC-CML chaotic system, mainly comparing its chaotic performance from the bifurcation diagram, Lyapunov exponent, dynamic characteristics of the system model, and Kolmogorov-Sinai entropy density analysis.

    (1) For M-dimensional spatiotemporal chaotic systems, the Lyapunov exponent can be defined by calculating the Jacobian matrix of the coupled lattice. The Jacobian matrix of spatiotemporal chaos is defined as Eq (6):

    J=[xn+1(1)x(1) xn+1(1)x(2)...xn+1(1)x(M)xn+1(2)x(1) xn+1(2)x(2)...xn+1(2)x(M)xn+1(M)x(1) xn+1(M)x(2)...xn+1(M)x(M)] (6)

    Substitute a set of chaotic state values xi(i=0,1,2n) into Eq (6) and perform the product operation to obtain RM:

    RM=J(x0)J(x1)J(xn) (7)

    By calculating the M eigenvalues of the matrix RM, the M Lyapunov exponents of the spatiotemporal chaotic system are obtained:

    λi=limN1Nlog|r(i)N| i=1,2M (8)

    Figure 4 shows the bifurcation and Lyapunov exponent of the L-ICMIC-CML system. After using the coupled map lattice, compared to the one-dimensional chaotic system L-ICMIC, the value of a has a larger range, which indicates that the system can enter the chaotic state faster.

    Figure 4.  Bifurcation and Lyapunov exponent of L-ICMIC-CML system.

    (2) The spatiotemporal chaos model will show different states depending on the setting of the number of lattices, coupling parameters and other factors. When the CML system enters a fully developed chaotic state, the entire phase space orbit of the CML will be completely covered by the chaotic state. It can be seen from Figure 5 that the L-ICMIC-CML system is completely chaotic in time and space.

    Figure 5.  The chaotic state of L-ICMIC-CML system.

    (3) Kolmogorov-Sinai entropy is used to describe the rate of increase of the amount of information in a dynamic system over time. The higher the entropy value, the better its nonlinearity and randomness. For M-dimensional spatiotemporal chaotic systems, the Kolmogorov-Sinai entropy value is proportional to the system size M. In order to eliminate the influence of the number of spatial lattices on the entropy value and make the test results have general meaning, the Kolmogorov-Sinai entropy density is used to measure the degree of chaos, it can be expressed as Eq (9):

    {DKS=Li=1λ+(i)LDL=Li=1L+(i)L (9)

    DKS represents the average chaotic performance of the overall system, and DL represents the proportion of the number of lattices in the chaotic state to the total lattice, which represents the chaotic behavior within different lattices. Li=1λ+(i) represents the sum of positive Lyapunov in all L lattices, DKS>0 represents the system is in a chaotic state, and Li=1L+(i) represents the total number of lattices in a chaotic state.

    It can be clearly seen from the left side of Figure 6 that the L-ICMIC-CML system is in a chaotic state in the entire parameter space range. From the right side of Figure 6 it can be seen that all lattices of the L-ICMIC-CML are in a chaotic state.

    Figure 6.  The Kolmogorov-Sinai entropy density of L-ICMIC-CML.

    Therefore, the proposed system has stable chaotic characteristics and can be utilized to generate pseudorandom key streams. The steps of the binary stream cipher generator based on L-ICMIC-CML are as follows:

    Step 1: Choose the 256-bit initial key S and divide it into 32 groups, each with 8 bits.

    S=(S1,S2,S3,S32) (10)

    Step 2: Use S as the initial value of each lattice and enter it into the L-ICMIC-CML system. Removing the first 100 iterations of the output can effectively avoid the degradation of chaotic performance caused by transients and perform the following operations ψ on the P generated by each lattice.

    ψ:Pn(i)=pn(i)×108floor[pn(i)×108] (11)

    n represents the number of iterations (n101), i represents the position of the lattice, and the floor function represents the rounding down operation.

    Step 3: Pn(i) is a real number in the interval (0, 1), which is operated on ϑ to form a byte integer Kn(i).

    ϑ:Kn(i)=floor[Pn(i)×1013]mod28 (12)

    Step 4: After performing operation ν on the results generated by each lattice, combine them to generate the final pseudorandom sequence k.

    ν:k=Kn(1)mod2Kn(2)mod2Kn(32)mod2 (13)

    In this way, a binary key stream k is generated from the hyperchaotic Lorenz system.

    The most secure encryption method is to directly encrypt the binary data of the video file using a cryptographic algorithm. However, this complete encryption algorithm destroys the syntax and semantic format of the video, making the encrypted video file unable to be played, and destroys the real-time attributes of the video, so this encryption algorithm has a narrow application range. Selective encryption is an improvement to complete encryption. The purpose of protecting video content is achieved by encrypting some key syntax elements, and a video encryption method that combines the encryption process with video compression coding.

    In the process of HEVC encoding, context-based adaptive binary arithmetic coding (CABAC) is an entropy coding method for most syntax elements, and entropy coding is utilized for lossless data compression. As shown in Figure 7, in the CABAC encoding process, both binarization and context modeling will constantly update the context model, which is not conducive to encryption. Therefore, the syntax elements of the bypass mode are selected for encryption during the binary arithmetic encoding process. In addition to the conditions for entropy coding through the bypass mode, the conditions that should be met are binarized syntax elements through fixed-length coding or k-order Exp-Golomb coding [19]. Satisfying the above conditions can ensure the compatibility of the code stream and the constant compression rate in HEVC. Therefore, the syntax element of encryption is selected as follows: MVD sign and value, DCT transform coefficient sign and suffix, QP sign and suffix. Next, the pseudorandom cipher stream generated in the previous section is used to encrypt these syntax elements, and the specific encryption scheme and flowchart are shown in Eq (3) and Figure 8.

    ep_MVDHorSign=MVDHorSignki (14)
    ep_MVDVerSign=MVDVerSignki (15)
    ep_MVDsuffix=MVDsuffixki (16)
    ep_CoeffSign=CoeffSignki (17)
    ep_CoeffSuffix=CoeffSuffixki (18)
    ep_DeltaQP=DeltaQPki (19)
    ep_QPDeltaSuffix=QPDeltaSuffixki (20)
    Figure 7.  The block diagram of CABAC.
    Figure 8.  Encryption scheme flow diagram.

    Where ep represents the encrypted syntax element and k represents the chaotic pseudorandom key stream.

    Experiments were performed by laptop computer with an Intel (R) Core (TM) i7-9750H CPU @ 2.60 GHz, 16 GB memory, Windows 10, Microsoft Visual Studio 2017, MATLAB 2017b. The reference software model HM 16.20 is implemented for the proposed scheme. The profile used in HM 16.20 is encoder_lowdelay_main, and group of pictures (GOP) is 4. QP is set to 22. Table 1 shows 5 video sequences with different resolutions selected in this experiment. These video test sequences reflect video attributes such as resolution, quantization parameters, motion, color, texture, contrast, foreground and background transformations, and can cover most of the video features. Another scheme that utilizes a hyperchaotic system to generate a key stream is given for comparison [22]. Except for the generation of pseudorandom key streams, the syntax elements of selective encryption are the same.

    Table 1.  Video test sequence.
    Test sequence Resolution Frame rate
    PeopleOnStreet 2560ⅹ1600 60
    BQTerrace 1920ⅹ1080 50
    FourPeople 1280ⅹ720 60
    ChinaSpeed 832ⅹ480 30
    RaceHorses 416ⅹ240 30

     | Show Table
    DownLoad: CSV

    In this part, the NIST SP800-22 test standard is utilized to test the randomness of the generated pseudorandom sequence. The test item produces Pvalue, which represents the probability that, given a nonrandom evaluation test, the sequence generated by a perfect random number generator is less random than the sequence being tested. If Pvalue > 0.01, then the sequence under test is considered to be uniformly distributed. SP800-22 Revla suggests that the length of the bit sequence to be tested is 103 to 107, and this algorithm utilizes the test sequence with a length of 106 bits. Table 2 shows the test results. In Table 2, we can conclude that the cipher generated by the L-ICMIC-CML is random.

    Table 2.  SP800-22 Revla test result of cipher.
    Method P-value Result
    The Frequency Test 0.8842 Pass
    Frequency Test within a Block 0.7984 Pass
    The Runs Test 0.6874 Pass
    Tests for the Longest-Run-of-Ones in a Block 0.2269 Pass
    The Binary Matrix Rank Test 0.1731 Pass
    The Discrete Fourier Transform Test 0.8011 Pass
    The Non-overlapping Template Matching Test 0.4687 Pass
    The Overlapping Template Matching Test 0.5523 Pass
    Maurer's "Universal Statistical" Test 0.6812 Pass
    The Linear Complexity Test 0.5947 Pass
    The Serial Test 0.7298 Pass
    The Approximate Entropy Test 0.1695 Pass
    The Cumulative Sums Test 0.6321 Pass
    The Random Excursions Test
    x = −4 0.3574 Pass
    x = −3 0.7045 Pass
    x = −2 0.3708 Pass
    x = −1 0.8654 Pass
    x = 1 0.4967 Pass
    x = 2 0.8953 Pass
    x = 3 0.6701 Pass
    x = 4 0.9567 Pass
    The Random Excursions Variant Test
    x = −9 0.6983 Pass
    x = −8 0.2087 Pass
    x = −7 0.7762 Pass
    x = −6 0.8539 Pass
    x = −5 0.9064 Pass
    x = −4 0.8871 Pass
    x = −3 0.6007 Pass
    x = −2 0.4235 Pass
    x = −1 0.5748 Pass
    x = 1 0.9335 Pass
    x = 2 0.6446 Pass
    x = 3 0.3754 Pass
    x = 4 0.3328 Pass
    x = 5 0.2649 Pass
    x = 6 0.3687 Pass
    x = 7 0.4773 Pass
    x = 8 0.4510 Pass
    x = 9 0.3308 Pass

     | Show Table
    DownLoad: CSV

    The peak signal-to-noise ratio (PSNR) [20] and structural similarity index metric (SSIM) [21] are reference image quality evaluation indexes that are utilized to analyze the image quality of the video before and after encryption from an objective perspective. Table 4-6 lists the average PSNR values of the first 100 frames of the eight test video sequences.

    Table 3.  PSNR for original and encrypted videos sequences.
    Sequence PSNR (dB)
    Original Hyperchaotic system L-ICMIC-CML system
    PeopleOnStreet 42.31 13.95 13.23
    BQTerrace 40.57 12.81 11.42
    FourPeople 42.43 14.55 12.49
    BasketballDrillText 40.69 9.09 10.23
    RaceHorses 39.94 11.91 11.54

     | Show Table
    DownLoad: CSV
    Table 4.  SSIM for original and encrypted videos sequences.
    Sequence SSIM
    Original Hyperchaotic system L-ICMIC-CML system
    PeopleOnStreet 0.944 0.4636 0.3824
    BQTerrace 0.973 0.5430 0.5056
    FourPeople 0.965 0.6263 0.5741
    BasketballDrillText 0.921 0.2710 0.3029
    RaceHorses 0.958 0.2355 0.1986

     | Show Table
    DownLoad: CSV
    Table 5.  Encoding time and video data size of original video and encrypted video.
    Sequence Encoding time(s) Video data size(byte)
    Original Encrypted Original Encrypted
    PeopleOnStreet 9488.33 9578.47 15089138 15203211
    BQTerrace 5172.34 5217.33 10367701 10414977
    FourPeople 1297.69 1317.15 492159 495801
    ChinaSpeed 1929.41 1883.10 2213147 2227377
    RaceHorses 325.74 331.60 618658 624615

     | Show Table
    DownLoad: CSV
    Table 6.  The EDR of encrypted sequences.
    Sequence Original Encrypted
    PeopleOnStreet 0.189 0.947
    BQTerrace 0.148 0.922
    FourPeople 0.137 0.934
    ChinaSpeed 0.163 0.911
    RaceHorses 0.144 0.933

     | Show Table
    DownLoad: CSV

    It can be seen from Tables 3 and 4 that the PSNR and SSIM values of the encrypted images have significantly decreased, and L-ICMIC-CML is more advantageous than hyperchaotic system.

    The key space is the value range of the seed key, and it is another important factor that determines the security of the password. The key space must be large enough to resist brute force attacks. It is generally believed that the key space must be at least greater than 2128. The length of the algorithm seed key proposed in this paper is 256 bits, indicating that the key space can reach at least 2256, which fully meets the conditions of resistance to brute force cracking.

    Through the previous analysis of PSNR and SSIM, the image quality of video frames decreases significantly after encryption. Figures 913 reflect the effect of subjective visual disturbance. The left side of each figure is the original video frame, the middle is the encrypted video frame of hyperchaotic system [14], and the right side is the encrypted video frame of the proposed scheme. It can be clearly seen in the comparison figure that the encrypted video frames have a significant subjective disturbance effect and are almost unrecognizable. The visual disturbance effect of the proposed scheme is better than that of the hyperchaotic system.

    Figure 9.  Encrypted frame of PeopleOnStreet.
    Figure 10.  Encrypted frame of BQTerrace.
    Figure 11.  Encrypted frame of FourPeople.
    Figure 12.  Encrypted frame of ChinaSpeed.
    Figure 13.  Encrypted frame of RaceHorses.

    The selective encryption algorithm must strictly control the encryption speed, and cannot cause a significant increase in video encoding time. Additionally, the encryption operation cannot affect the original video compression performance, resulting in a significant increase in bit rate. Table 5 shows the encoding time and video file size of 5 video sequences.

    From the data in Table 5, it can be concluded that the video compression encoding time of the selective encryption algorithm has no significant change compared with the unencrypted encoding time. The encoding time of videos with strong motion attributes is only slightly increased, and the encoding time of videos with more complex textures is slightly reduced after the encryption operation. This is caused by the encryption operation that flattens the complex textures. The size of the video file does not change greatly before and after encryption. The video with strong motion attributes has a large motion vector difference. The encryption process changes the original motion compensation mode, which makes the encrypted file slightly larger. In summary, the selective encryption algorithm based on L-ICMIC-CML has no negative impact on the video encoding time and compression efficiency.

    The key sensitivity in video encryption refers to using a value close to the correct key to decrypt the video file. If the wrong key is extremely similar to the correct key, valuable video plaintext information cannot be recovered. The video encryption algorithm has high key sensitivity, otherwise the key sensitivity is not strong, and the security is low. In Figure14, the RaceHorses video sequence is taken as an example, and the original image is on the left. Keeping the initial key S unchanged, the video image decrypted by it is shown in the middle, and the wrong decryption key is modified by 1 bit, and the corresponding decrypted video image is shown on the right. Obviously, it can be seen that although only a very slight modification of the key has been made, the video image decrypted by the wrong key is still completely confused and unrecognizable.

    Figure 14.  Test of key sensitivity for RaceHorses.

    The edge is the boundary of the region where the gray level changes sharply in the image. Therefore, the edge detection first converts the color image to the gray image, and then detects the edge information in the image according to a certain detection algorithm, and finds the coordinates where the gray value changes sharply. Is the edge of the image. The edge detection attack is to perform gray-scale processing on the ciphertext image of the video, and then detect the residual edge information in it, and draw the edge detection map. If the video encryption effect is not good, some edge information will be detected in the ciphertext, thereby revealing the contour and texture characteristics of the plaintext. In order to analyze the video encryption algorithm's resistance to edge detection attacks from a quantitative perspective, this paper uses Sobel operator to perform edge detection on the image. The edge difference ratio (EDR) is calculated to measure the ability to resist edge detection attacks. The calculation method of EDR is shown in Eq (21).

    EDR=Nm,n=1|P(m,n)¯P(m,n)|Nm,n=1|P(m,n)+¯P(m,n)| (21)

    where P(m,n) is the edge pixel value of the original video frame and ¯P(m,n) is the edge pixel value of the encrypted video frame. The closer the EDR is to 1, the stronger the encryption of the algorithm on the edge structure is, and the closer the EDR is to 0, the more similar the edge structure of the two images is. Table 6 shows the EDR of 5 video sequences, all of which are above 0.9. This means that the algorithm can resist edge detection attack well. In addition, Figure 15 shows the edge detection images before and after encryption of the football video.

    Figure 15.  Edge detection of BQTerrace.

    This paper proposes a new chaotic system L-ICMIC-CML based on coupled map lattice. The chaotic dynamic characteristics of the system are analyzed in terms of Lyapunov exponent, bifurcation and ergodicity, and the results show that all indicators are significantly better than traditional chaotic systems. The obtained pseudo-random chaotic sequence perfectly passed the key sensitivity test, key space analysis, linear complexity test, differential attack test, periodic analysis, correlation analysis, spatial distribution test and other security and randomness evaluations, the test results It shows that the binary sequence generated by this method has the characteristics of security, stability, and high efficiency, and is suitable for use as a stream cipher, thereby solving the security and efficiency problems of constructing a stream cipher with a low-dimensional nonlinear system. Through the analysis of the HEVC coding structure, a more suitable encryption scheme is proposed to perform encryption operations on the syntax elements of MVD sign and value, DCT transform coefficient sign and suffix, QP sign and suffix. The test results show that the selective video encryption algorithm solves the problems of security, real-time and bit rate retention while maintaining the video format. Chaos theory research has been carried out for many years, and there have been relatively mature systems and results. However, the research of chaotic cipher basically draws on classical cipher theory and numerical simulation technology, and there is no complete chaotic cipher theory system. Therefore, the construction of chaotic cryptanalysis theory is worthy of further study.

    This work was supported by the National Natural Science Foundation of China under Grant No. 61672531. And the authors would like to acknowledge the Department of Information Security for providing assistance.

    The authors declare that they have no conflicts of interest.

    [1] International Energy Agency (2013) Transition to Sustainable Buildings: Strategies and Opportunities to 2050.
    [2] Canada's Energy Future 2016, Energy Supply and Demand Projections to 2040, Executive Summary. National Energy Board, 2016. Available from: www.neb-one.gc.ca/energyfutures.
    [3] Schultz CC, PE, CEM, CXA, and Scott G. (2011) Energy conservation in Existing Buildings. Engineered Syst 28: 34-40.
    [4] Difsa K, Bennstamb M, Trygga L, et al. (2010) Energy conservation measures in buildings heated by district heating—A local energy system perspective. Energy 35: 3194-3203. doi: 10.1016/j.energy.2010.04.001
    [5] Smeds J, Wall M (2007) Enhanced energy conservation in houses through high performance design. Energ Buildings 39: 273-278. doi: 10.1016/j.enbuild.2006.07.003
    [6] Kim D, AP L (2010) Optimizing Cost Effective Energy Conservation Measures For Building Envelope. Energ Eng 107: 70-80.
    [7] Pitts A, Saleh JB (2007) Potential for energy saving in building transition spaces. Energ Buildings 39: 815-822. doi: 10.1016/j.enbuild.2007.02.006
    [8] Mousa M, Akash B (2001) Some prospects of energy saving in buildings. Energ Convers Manage 42: 1307-1315. doi: 10.1016/S0196-8904(00)00140-0
    [9] Chedwal R, Mathur J, Das Agarwal G, et al. (2015) Energy saving potential through Energy Conservation Building Code and advance energy efficiency measures in hotel buildings of Jaipur City, India. Energ Buildings 92: 282-295. doi: 10.1016/j.enbuild.2015.01.066
    [10] Busch JF, Pont PD, Chirarattananon S (1993) Energy-efficient lighting in Thai commercial buildings. Energy 13: 197-210.
    [11] Saberbari E, Saboori H (2014) Net-Zero Energy Building Implementation through a Grid-Connected Home Energy Management System. The 19th Electrical Power Distribution Conference (EPDC2014), 35-41
    [12] Hernandez P, Kenny P (2010) From net energy to zero energy buildings: Defining life cycle zero energy buildings. Energ Buildings 42: 815-821. doi: 10.1016/j.enbuild.2009.12.001
    [13] Marszal A, Heiselberg P, Bourrelle J, et al. (2011) Zero Energy Building—A review of definitions and calculation methodologies. Energ Buildings 43: 971-979. doi: 10.1016/j.enbuild.2010.12.022
    [14] Givler T, Lilienthal P (2005) Using HOMER software, NREL,s Micropower Optimization Model, to Explore the Role of Gen-sets in Small Solar Power Systems. Case Study: Sri Lanka, National.
    [15] Crawley DB, Lawrie LK, Winkelmann FC, et al. (2001) EnergyPlus: Creating a new-generation building energy simulation program. Energ Buildings 33: 319-331. doi: 10.1016/S0378-7788(00)00114-6
    [16] Mishra A, Irwin D, Shenoy P, et al. (2013) GreenCharge: Managing Renewable Energy in Smart Buildings. IEEE J Selected Areas Commun 31: 1281-1293. doi: 10.1109/JSAC.2013.130711
    [17] Runge J, Gabbar H (2014) Solar Windows Control System for an Apartment Building in Toronto with Battery Storage. International Conference on Power Engineering and Renewable Energy (ICPERE), Bali.
    [18] Gabbar H (2009) Engineering design of green hybrid energy production and supply chains. Environ Modell Softw 24: 423-435. doi: 10.1016/j.envsoft.2008.08.006
    [19] Gabbar H, Eldessouky A (2015) Energy Semantic Network for Building Energy Conservation and Management, Intelligent Industrial Systems. DOI 10.1007/s40903-015-0023-8.
    [20] Hussain S, Gabbar H, Musharavati F, et al. (2013) Key performance indicators (KPIs) for evaluation of energy conservation in buildings. Smart Energy Grid Engineering (SEGE), 2013 IEEE International Conference, Oshawa.
    [21] Feed-in Tariff Program, Independent Electricity System Operator (IESO) (2009) Available from: http://fit.powerauthority.on.ca/fit-program.
    [22] Zidan B, Shaaban M, El-Saadany E (2013) AppLong-term multi-objective distribution network planning by DG allocation and feeders’ reconfiguration. Electr Pow Syst Res 105: 95-104. doi: 10.1016/j.epsr.2013.07.016
    [23] Zou K, Agalgaonkar AP, Muttaqi KM, et al. (2012) Distribution System Planning With Incorporating DG Reactive Capability and System Uncertainties. IEEE T Sust Energ 3: 112-123.
    [24] Spertino F, Di Leo P, Ilie I, et al. (2012) DFIG equivalent circuit and mismatch assessment between manufacturer and experimental power-wind speed curves. Renew Energ 48: 333-343. doi: 10.1016/j.renene.2012.01.002
    [25] wind power program. Available from: http://www.wind-power-program.com/turbine_ characteristics.htm.
    [26] Paiva L, Rodrigues C, Palma J (2014) Determining wind turbine power curves based on operating conditions. Wind Energy 17: 1563-1575. doi: 10.1002/we.1651
    [27] Weather Data, Wind Speed and Solar Radiation Data. University of Toronto, Department of Geography (2012) Available from: http://www.utm.utoronto.ca/geography/resources/ meteorological-station/weather-data.
    [28] Abdelsalam A, El-saadany E (2013) Probabilistic Approach for Optimal Planning of Distributed Generators with Controlling Harmonic Distortions. IET Generat Transm D 7: 1105-1115. doi: 10.1049/iet-gtd.2012.0769
    [29] Thevenard D, Pelland S (2013) ESTIMATING THE UNCERTAINTY IN LONG-TERM PHOTOVOLTAIC YIELD PREDICTIONS. Sol Energ 91: 432-445. doi: 10.1016/j.solener.2011.05.006
    [30] Karki R, Hu P, Billinton R (2006) A Simplified Wind Power Generation Model. IEEE T Energ Convers 21: 533-540. doi: 10.1109/TEC.2006.874233
  • This article has been cited by:

    1. Carles Barril, Àngel Calsina, Sílvia Cuadrado, Jordi Ripoll, On the basic reproduction number in continuously structured populations, 2021, 44, 0170-4214, 799, 10.1002/mma.6787
    2. Horst R. Thieme, Discrete-time dynamics of structured populations via Feller kernels, 2021, 0, 1553-524X, 0, 10.3934/dcdsb.2021082
    3. Horst R. Thieme, 2020, Chapter 4, 978-3-030-60106-5, 59, 10.1007/978-3-030-60107-2_4
    4. Suli Liu, Michael Y. Li, Epidemic models with discrete state structures, 2021, 01672789, 132903, 10.1016/j.physd.2021.132903
    5. Eugenia Franco, Mats Gyllenberg, Odo Diekmann, One Dimensional Reduction of a Renewal Equation for a Measure-Valued Function of Time Describing Population Dynamics, 2021, 175, 0167-8019, 10.1007/s10440-021-00440-3
    6. Horst R. Thieme, Discrete-time population dynamics of spatially distributed semelparous two-sex populations, 2021, 83, 0303-6812, 10.1007/s00285-021-01649-4
    7. Horst R. Thieme, 2023, Chapter 23, 978-3-031-25224-2, 495, 10.1007/978-3-031-25225-9_23
    8. Horst R. Thieme, Continuity of the spectral radius, applied to structured semelparous two-sex population models, 2024, 30, 1023-6198, 967, 10.1080/10236198.2023.2249129
    9. Christian Düll, Piotr Gwiazda, Anna Marciniak-Czochra, Jakub Skrzeczkowski, Structured population models on Polish spaces: A unified approach including graphs, Riemannian manifolds and measure spaces to describe dynamics of heterogeneous populations, 2024, 34, 0218-2025, 109, 10.1142/S0218202524400037
    10. Eugenia Franco, Odo Diekmann, Mats Gyllenberg, Modelling physiologically structured populations: renewal equations and partial differential equations, 2023, 23, 1424-3199, 10.1007/s00028-023-00880-4
    11. B. Boldin, O. Diekmann, J. A. J. Metz, Population growth in discrete time: a renewal equation oriented survey, 2024, 30, 1023-6198, 1062, 10.1080/10236198.2023.2265499
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4628) PDF downloads(1102) Cited by(2)

Figures and Tables

Figures(10)  /  Tables(7)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog