In medical image applications, the diagnostic observations of a patient are transmitted to a remote location through internet. Since the information being transmitted is really sensitive as far as the diagnosis is con...
详细信息
Emerging computer network technologies promise to provide distributed multimedia in real-time. The security of real-time video, an important component of distributed multimedia applications, is increasingly becoming o...
详细信息
Emerging computer network technologies promise to provide distributed multimedia in real-time. The security of real-time video, an important component of distributed multimedia applications, is increasingly becoming one of the major concerns of the computer networking community. This study presents Aegis, a security system for Motion Picture Experts Group (MPEG) compressed video transmissions. Aegis utilizes the concepts of the MPEG video compression algorithm in order to provide an effective and efficient security mechanism. A prototype implementation is used to evaluate its effectiveness in securing video transmissions. Simulation results of Aegis in an Asynchronous Transfer Mode (ATM) technology environment are also presented in order to demonstrate its performance in comparison to traditional encryption/decryption methods.
In the realm of IoT healthcare, safeguarding medical data is of paramount importance. This study introduces a comprehensive approach that combines hybrid encryption, post-quantum cryptography, and deep learning techni...
详细信息
This paper presents the concept of imagecompression after encryption and study about the various technologies applied on encryption-then-compression technology. It is also analyses the various secured compression tec...
详细信息
ISBN:
(纸本)9781509052417
This paper presents the concept of imagecompression after encryption and study about the various technologies applied on encryption-then-compression technology. It is also analyses the various secured compressiontechnologies and can be applied to different types of images. This survey addresses the recipe for the secured imagecompressiontechnologies based on JPEG, JPEG2000 and JPEG XR and presents the pros and cons of those secured imagecompressiontechnologies. To choose the best technology for the secured imagecompression some general strategies are suggested based on this survey. The performance of these technologies are analysed by By analying compression Ratio (CR), Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE).
Transmission of critical data over the link, in the presence of an attacker has augmented the demand for secure communication. Particularly in the military field, exchange of classified images has to be executed with ...
详细信息
ISBN:
(纸本)9781479930807
Transmission of critical data over the link, in the presence of an attacker has augmented the demand for secure communication. Particularly in the military field, exchange of classified images has to be executed with extreme caution. Advanced digital technologies require encryption, authentication and key distribution techniques to facilitate reliable and secure communication. In this paper, Discrete Wavelet Transform (DWT) Sub-band Exchange based color image fusion scheme for enhanced security is proposed. In this method, the horizontal and vertical sub-bands of two colored images are replaced by chrominance information of each other. This permits generation of uniquely fused gray-scale textured images. This method facilitates fused images which are extremely difficult to intercept by the attacker, since the probability of getting hold on all the information pertaining to one single image is negligible. Also, this method offers reduced bandwidth utilization and less transmission time as it converts colored images to compressed textured gray-scale images. In addition to proposing a novel image fusion technique and compression scheme, this paper illustrates detailed analysis of the algorithm.
The proceedings contain 130 papers. The topics discussed include: application of cloud computing in biomedicine big data analysis cloud computing in big data;analysis on the development of the evaluation methods for m...
ISBN:
(纸本)9781509033782
The proceedings contain 130 papers. The topics discussed include: application of cloud computing in biomedicine big data analysis cloud computing in big data;analysis on the development of the evaluation methods for machine translation;prevention of denial of service (DOS) attack in OLSR protocol using fictitious nodes and ECC algorithm;vehicle layout optimization using multi-objective genetic algorithms;pattern-based grasping force estimation from surface electromyography;air-swipe gesture recognition using OpenCV in Android devices;pixel based imageencryption using magic square;research on dynamic response and stability analysis of high slope subgrade;secure data transfer in Android using elliptical curve cryptography;study on 500 kv autotransformer with neutral point grounded through small reactance;an efficient approach for opinion mining from skewed Twitter corpus using under sampling approach;fuzzy controller for error control of on - chip communication;model predictive coordinating control of dynamically interacting systems with stochastic disturbances;and a hardware implementation of discrete wavelet transform for compression of a natural image.
Data hiding approaches in Joint Photographic Experts Group (JPEG) compression that use discrete cosine transform (DCT) coefficients are gaining popularity due to their capacity to integrate more data into JPEG picture...
详细信息
A novel reversible data hiding method based on vacating room for specific encryption process in encrypted image is proposed by Huang and Wang in 2020. In their method, they applied pixel value expansion approach to va...
详细信息
A novel technique is proposed for encryption and compression. Here an image is first encrypted using the stream cipher and then compressing the encrypted image using SPIHT. The panorama here stands for using the highl...
详细信息
A novel technique is proposed for encryption and compression. Here an image is first encrypted using the stream cipher and then compressing the encrypted image using SPIHT. The panorama here stands for using the highly efficient encryption standard and unabating experience of compression techniques. The stream ciphers are chosen for their high encryption rate and they are mainly of bit-by-bit encryption. They don't simply mean encryption but provides authenticity and integrity. Then on the compression section we prefer SPIHT for their unique factors such as larger bit depth, progress from lossy to lossless compression, unrestricted dimensions in image, etc. This paper focuses mainly on highly secure encryption and high compression rate using SPIHT method in Larger images.
In an era of large information and systems administration, it is an important to create a safe and hearty computerized watermarking plan with high computational productivity to secure copyrights of advanced works. Non...
详细信息
暂无评论