A New Framework for Encryption and Authentication of Multimedia Data
نویسندگان
چکیده
The multiple Huffman table (MHT) based encryption technique for multimedia encryption gained much popularity, due to its simplicity, less complexity and good compression performance. At the same time, it is proved that the MHT based encryption system is vulnerable to several types of attacks. In this paper, the security issues of the MHT based encryption system are analyzed. On the basis of analysis, the paper proposes a modified version of MHT based encryption system, with minimal impact on its simplicity and compression performance. It is proposed to perform blockwise shuffling of the transformed image (in DCT domain) based on a chaotic map prior to the MHT stage, so that an attacker cannot retrieve the key because of the changes in the spatial arrangement caused by the blockwise shuffling in the transform domain. Moreover, to ensure copyright protection as well as traitor tracing, it is proposed to incorporate joint fingerprinting and decryption (JFD) technique at the receiver stage. The system is subjected to the known forms of attacks and it has been proved that the proposed system is able to resist the same with minimal level of increase in the system complexity.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملA Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)
In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملAn improved hybrid image watermarking scheme in shearlet and wavelet domain
Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...
متن کامل