The proceedings contain 23 papers. The topics discussed include: biorthogonal wavelets of maximum coding through pseudoframes for subspaces;a skinning prediction scheme for dynamic 3D mesh compression;multi-modal mult...
详细信息
ISBN:
(纸本)0819463949
The proceedings contain 23 papers. The topics discussed include: biorthogonal wavelets of maximum coding through pseudoframes for subspaces;a skinning prediction scheme for dynamic 3D mesh compression;multi-modal multi-fractal boundary encoding in object-based image compression;perspectives on data compression methods for network-level management of multi-sensor systems;exploiting data compression methods for network-level management of multi-sensor systems;a model utilizing artificial neural network for perceptual image;use of adaptive models in watermark identification;data payload optimality: a key issue for for video watermarking applications;quantization index modulation-based watermarking using holography;the optimum estimation of statistical signals based on systematic expression of many types of sample arrays in multidimensional space;and segmentation of motion textures using mixed-state Markov random fields.
In this paper, we present an implementation of the IDEA algorithm for imageencryption. The imageencryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method,...
详细信息
ISBN:
(纸本)0819437670
In this paper, we present an implementation of the IDEA algorithm for imageencryption. The imageencryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method, Embedded Wavelet Zero-tree coding is used for image compression. Experimental results show that our proposed scheme enhances data security and reduces the network bandwidth required for video transmissions. A software implementation and system architecture for hardware implementation of the IDEA imageencryption algorithm based on Field Programmable Gate Array (FPGA) technology are presented in this paper.
In this paper an attack strategy on the dataencryption Standard (DES) that is different from the existing ones is developed. The attack strategy is based on a theorem proved by the author, called LR theorem. The atta...
详细信息
In this paper an attack strategy on the dataencryption Standard (DES) that is different from the existing ones is developed. The attack strategy is based on a theorem proved by the author, called LR theorem. The attack can be done by means of a personal computer, i.e. a Pentium IV based machine. Obviously, more information than a sample of plaintext and ciphertext is required. However, this additional requirement is reduced to a minimum of just 24 bits. The LR theorem uncovers 16 trapdoors of which 2 are of importance. With this knowledge, an attack on Triple-DES can be performed using the aforementioned personal computer. A simple solution to this kind of attack is proposed, preserving the complexity of the Triple-DBS, 2112.
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact...
详细信息
ISBN:
(纸本)0819441899
In this work, we extend arithmetic coding and present a dataencryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact that the decoding process of arithmetic coding scheme can be considered as the repetition of Bernoulli shift map. dataencryption is achieved by controlling the piecewise linear maps by a secret key in three kinds of approach: (i) perturbation method, (ii) switching method, and (iii) source extension method. Experimental results show that the obtained arithmetic codes for a message are randomly distributed on the mapping domain [0,1) by using different keys without seriously deteriorating the compression ratio, and the transition of the orbits in the domain [0,1) is similar to the chaotic dynamics.
Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be...
详细信息
Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be transmitted over bandwidth-constrained wireless networks. This work investigates compression efficiency of JPEG and JPEG 2000 standards for encrypted images. An encryption technique proposed by Kuo et al. in [4] is employed. The technique scrambles the phase spectrum of an image by addition of the phase of an all-pass pre-filter. The post-filter inverts the encryption process, provided the correct pseudo-random filter coefficients are available at the receiver. Additional benefits of pre/post-filter encryption include the prevention of blocking effects and better robustness to channel noise [4]. Since both JPEG and JPEG 2000 exploit spatial and perceptual redundancies for compression, pre/post-filtered (encrypted) images are susceptible to compression inefficiencies. The PSNR difference between the unencrypted and pre/post-filtered images after decompression is determined for various compression rates. compression efficiency decreases with an increase in compression rate. For JPEG and JPEG 2000 compression rates between 0.5 to 2.5 bpp, the difference in PSNR is negligible. Partial encryption is proposed wherein a subset of image phase coefficients are scrambled. Due to the phase sensitivity of images, even partial scrambling of the phase information results in unintelligible data. The effect of compression on partially encrypted images is observed for various bit-rates. When 25% of image phase coefficients are scrambled, the JPEG and JPEG 2000 compression performance of encrypted images is almost similar to that of unencrypted images for compression rates in the 0.5 to 3.5 bpp range.
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitabl...
详细信息
ISBN:
(纸本)0819454990
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitable for encryption. Nevertheless, adaptive modelling, which offers a huge model, variable in structure, and as completely as possible a function of the entire text that has been transmitted since the time the model was initialised, is a suitable candidate for a possible encryption-compression combine. The focus of the work presented in this paper has been to incorporate recent results of chaos theory, proven to be cryptographically secure, into arithmetic coding, to devise a convenient method to make the structure of the model unpredictable and variable in nature, and yet to retain, as far as is possible, statistical harmony, so that compression is possible. A chaos-based adaptive arithmetic coding-encryption technique has been designed, developed and tested and its implementation has been discussed. For typical text files, the proposed encoder gives compression between 67.5% and 70.5%, the zero-order compression suffering by about 6% due to encryption, and is not susceptible to previously carried out attacks on arithmetic coding algorithms.
暂无评论