An Overview of the Use of Distributed Source Coding in Multimedia Security
نویسندگان
چکیده
In the 1970’s Slepian and Wolf proved that lossless source coding without side information at the encoder may perform as well as encoding with side information at the encoder. Wyner and Ziv extended the result to establish ratedistortion bounds for lossy compression. This has been used to examine the problem of coding multiple correlated distributed sources. In distributed coding, source statistics are exploited at the decoder and the encoder can be simplified. Since then these theoretic results were revisited in the late 1990s and several methods have been developed to achieve the results predicted by the theory. They are generally based on the channel coding techniques. In the past several years we have seen a great deal of work done in distributed video coding. In this paper we will describe some of the new uses of distributed source coding methods to address several interesting problems in multimedia security. In particular we describe the use of distributed coding principles to address problems in authentication, forensics, and secure multimedia delivery.
منابع مشابه
چند پخشی اطلاعات ویدئویی کدشده باH.264 درشبکه های ناهمگن مبتنی بر کدینگ منابع چند پایانه ای
In MTSC, correlated sources are separately encoded but jointly decoded. With appropriate modeling of all kinds of correlation among three non binary correlated sources, in this paper we propose a method for performing IMTSC among three sources. Due to the possibility of providing an approach for practical code design for more than two correlated sources in IMTSC/CEO setup, the multicast system ...
متن کاملRobust Distributed Source Coding with Arbitrary Number of Encoders and Practical Code Design Technique
The robustness property can be added to DSC system at the expense of reducing performance, i.e., increasing the sum-rate. The aim of designing robust DSC schemes is to trade off between system robustness and compression efficiency. In this paper, after deriving an inner bound on the rate–distortion region for the quadratic Gaussian MDC based RDSC system with two encoders, the structure of...
متن کاملIntroduction of flaxseed (Linum usitatissimum L.) and an overview on its role in aquatics nutrition
One of the challenges facing the increasing growth of the aquaculture industry in the last decade is paying attention to the production of economical aquafeeds. Fishmeal as a source of protein required by aquatic species faces problems such as price increment, quality fluctuation and the presence of various chemical and microbial contaminants. Therefore, attention to the use of alternative prot...
متن کاملoverview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کامل