Developing technology threaten to the information security and privacy. Today, for data transfer in a private and secure environment, the use of encryption methods or cryptographic systems are inevitable. In this stud...
详细信息
Developing technology threaten to the information security and privacy. Today, for data transfer in a private and secure environment, the use of encryption methods or cryptographic systems are inevitable. In this study WHT (Walsh-Hadamard Transform) that is used, one of the transforms that used image processing techniques such as attribute extraction on image files, text analysis, filtering, compression. image pixel values obtained at the end of transformation encrypt with AES (Advanced encryption Standard) encryption algorithm. Using encryption pixel values encrypted txt file was obtained.
The transfer of medical data is too done securely over the community network and manipulated in an effective manner. For the enhancement of safety and verification of medical records, watermarking method is used for m...
详细信息
ISBN:
(纸本)9781467385497
The transfer of medical data is too done securely over the community network and manipulated in an effective manner. For the enhancement of safety and verification of medical records, watermarking method is used for more identification then references. So there is great need of elimination such illegal copyright of digital media. Digital watermarking is the powerful solution to this problem. The information is embedded in image which is used in some other applications as fingerprint; owner identification etc. The paper proposes SHA 256, AES (Advanced encryption standard) and arithmetic compression techniques. The ROI of medical image is irregularly shaped and it is an area which contains important information. The medical image and protection of information and the whole image of SHA 256 is embedded in the least significant bits of the ROI. The compression of recovered SHA 256 image and extracted watermarking used for validation. Fragile watermarking scheme can detect tamper and recover the images. The watermarking technique being developed to confirm and simplify files verification, safety and copyright protection, privacy protection, safety and management of digital media.
With the development of digital technologies, compression and encryption have become important aspects of information. In many applications, encryption of compressed images is considered vital for hiding data. In this...
详细信息
With the development of digital technologies, compression and encryption have become important aspects of information. In many applications, encryption of compressed images is considered vital for hiding data. In this work, we implemented the image compression-encryption hardware on a FPGA. JPEG was used as a compression standard and Tiny encryption Algorithm was used as an encryption algorithm. Discrete Cosine Transform coefficients were encrypted by using two methods. First, only DC coefficients of each 8×8 block of image were encrypted. Then, along with DC coefficients, first five AC coefficients of each 8×8 block of image were encrypted. In the result, encrypted images and PSNR values were given in order to determine success of the work. This work is novel from the point of view encryption methods.
The concept of data compression in CODECs is based on pixel prediction to avoid redundancy. For the security of data compressed with the H.264/AVC CODEC, researchers are thinking to selective encryption. This paper pr...
详细信息
The concept of data compression in CODECs is based on pixel prediction to avoid redundancy. For the security of data compressed with the H.264/AVC CODEC, researchers are thinking to selective encryption. This paper presents a chaos based encryption method inserted in the H.264/AVC used for video conferencing application. It consists of the encryption of Intra prediction mode. The results show that the proposed method preserves format compliance of the H.264/AVC and has a low impact on the compression ratio. It is secure and very efficient. Moreover it can be realized in real time application. The metrics used to evaluate our scheme are Peak Signal to Noise Ratio (PSNR), Structural SIMilarity (SSIM) and the encryption Rate (ER). We also discuss the key sensitivity of our algorithm and histograms of encrypted videos.
data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving a...
详细信息
data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by malicious attacks even in limited area network environment. Apart from the need of reducing data volume, an implementation of encryption is an important concern in order to transmit data over perfect security. This paper presents feasible approach in minimizing quantity of data and ensuring its security; data is compressed using a lossless algorithm, i.e. Huffman coding and then the compressed data is encrypted using symmetric encryption, AES algorithm. In this work, key exchange concept is also proposed based on Diffie Hellman Key Exchange (DHKE) which is used to exchange secret key for dataencryption and decryption. The data is transferred in a local network between two computers through simple file transfer protocol known as Trivial File Transfer Protocol (TFTP). This protocol has been used widely for updating and transferring files especially to embedded devices and it would provide more benefit if security features were incorporated into this protocol. Thus, a lightweight security strategy which includes compression and encryption is an efficient solution to the security issue and to reducing file sizes in this type of environment. Experimental results based on proposed methodology are provided to analyze execution time of transmitting compressed-encrypted data and percentage reduction of file space.
The development of data communications enabling the exchange of information via mobile devices more easily. Security in the exchange of information on mobile devices is very important. One of the weaknesses in stegano...
详细信息
The development of data communications enabling the exchange of information via mobile devices more easily. Security in the exchange of information on mobile devices is very important. One of the weaknesses in steganography is the capacity of data that can be inserted. With compression, the size of the data will be reduced. In this paper, designed a system application on the Android platform with the implementation of LSB steganography and cryptography using TEA to the security of a text message. The size of this text message may be reduced by performing lossless compression technique using LZW method. The advantages of this method is can provide double security and more messages to be inserted, so it is expected be a good way to exchange information data. The system is able to perform the compression process with an average ratio of 67.42 %. Modified TEA algorithm resulting average value of avalanche effect 53.8%. Average result PSNR of stego image 70.44 dB. As well as average MOS values is 4.8.
Huge revolution in mobile systems opens the field toward exploit of video streaming, enabling broadcasting a real time video through the network, also live event can be seen from anywhere, the video data has to be com...
详细信息
Huge revolution in mobile systems opens the field toward exploit of video streaming, enabling broadcasting a real time video through the network, also live event can be seen from anywhere, the video data has to be compressed before transmitting, in addition to that, the encryption process is compulsory in order to secure a transmitted data stream. This leads to increase the resource consumption requirements such as computational overhead. Hence, in this paper, an overview of video streaming security in limited resources devices is presented, a new method for secure video streaming. In the proposed method, we will focus on: The data structure of video streaming, explaining the encryption and decryption process that performed in a video transmitting, and to exploit the structure of the H.264/AVC standard for encrypting a specific syntaxes. The method will be performed in two phases; (1) encodingvideo streaming and (2) decode video bitstream, in the first phase, the encryption for a specific part of encoded video data will be performed using AES algorithm, in the second phase, the encrypted syntaxes of the bitstream will be decrypted. By APPLYING this method; the technique for securing the video stream in a limited resource device will be enhanced, mitigate the effects of compression and encryption process on the computational overhead during real-time multimedia transmission. This method is capable to prevent attacks on video streaming data, as well as the compliance format between the encoder and decoder will be maintained.
In this paper, we describe a novel encryption algorithm, which converts a greyscale image into a colored JPEG image. Firstly, it creates MCU (Minimum coding Unit) of the colored JPEG image from the DU (data Unit) of t...
详细信息
ISBN:
(纸本)9783037858646
In this paper, we describe a novel encryption algorithm, which converts a greyscale image into a colored JPEG image. Firstly, it creates MCU (Minimum coding Unit) of the colored JPEG image from the DU (data Unit) of the greyscale image by the 8 x 8 construction matrix randomly. Secondly, it shuffles all the DUs with quantized DCT (Discrete Cosine Transform) coefficients according to a random ergodic matrix. Lastly, it rearranges the DUs as the format of the colored JPEG image and proceeds with the normal compression and encoding. The results show that the encryption speed of the algorithm is fast enough for real-time transmission and the encrypted image has almost the same size as original image after direct compression.
The development in communication and use of multimedia applications has created a remarkable demand for robust ways to store and transmit large databases of images. The current communication system demands compression...
详细信息
The development in communication and use of multimedia applications has created a remarkable demand for robust ways to store and transmit large databases of images. The current communication system demands compression techniques to store and transmit data in an apposite manner. compression schemes for images can be used to manage data of high sensitivity with less computational complexity. In this paper we suggest a novel algorithm for image compression and pattern matching called Difference Component Analysis (DCA). DCA extract the most relevant image feature components that identify the image. The DCA is based on the premise that matching images have minimal difference components. The experiment on DCA is done using more than 1000 human face images. The results show that the image can be compressed to a single decimal value and uses less computational steps. The concept can be applied for pattern recognition encryption techniques.
Reversible data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a vital role in such situations. Securin...
详细信息
Reversible data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a vital role in such situations. Securing the multimedia content can be achieved by performing encryption. Transmission time is further decreased by compressing such encrypted images. The process of compression reduces the amount of data required for representing the image. The content owner thus encrypts the original image using Stream Cipher process. The encrypted image is then used as the media for hiding secret image. The embedded image can then be compressed using wavelet compression. The receiver does all the three processes in reverse for getting back the original image and the secret image. Thus the compressed image is first decompressed. Second, the data hiding key is employed to extract the secret message. Third, the encryption key is employed to decrypt and get back the original content. Thus this paper focuses on achieving better security and improved transmission rate.
暂无评论