نتایج جستجو برای: multimedia encryption systems
تعداد نتایج: 1232148 فیلتر نتایج به سال:
Bucketization is the splitting of large amount of data into smaller chunks and storing the parts in different sub servers called buckets. This paper deals with ordered bucketization (OB), which makes use of a random key generator algorithm and a deterministic bucketing algorithm, to propose a secure storage and retrieval system for multimedia files. In OB, plaintext-space is split into a number...
Modern still image codecs furnish more than just good distortion-rate performances. They must also provide some services. Scalability in resolution and quality, error resilience and embedded bitstreams were among the first one to be available. There is still room for enhancement, especially when it comes to security-oriented features. Image encryption is one of the aspect of image security. Thi...
We show that the Fast Encryption Algorithm for Multimedia (FEA-w proposed by Yi et a1 is insecure. In particular, we present a simple attack that reduces the key to solving a set of linear equations. The low complexity of the attack combined with its simplicity makes it feasible in many multimedia applications. 11. FEA-M DESCRIPTION FEA-M encrypts 64 x 64 Boolean plaintext matrices using encryp...
Due to the growth of multimedia applications, the protection of this multimedia data becomes a very important issue of communication and storage; especially when it is transferred over an insecure channel, where apart from preventing illegal data access, images are used in many fields such as medical science and military. The protection of images can be done with image encryption. The majority ...
Borko Furht Department of Computer Science and Engineering Florida Atlantic University, 777 Glades Road Boca Raton, FL 33431-0991, USA E-mail: [email protected] Daniel Socek Department of Computer Science and Engineering Florida Atlantic University, 777 Glades Road Boca Raton, FL 33431-0991, USA E-mail: [email protected] Ahmet M. Eskicioglu Department of Computer and Information Science...
An asymmetric watermarking algorithm is presented, involving a private key for embedding and a public key for detection, joint with a suitable encryption scheme, thus achieving a double security level for digital data protection. A commutative scheme is designed based on linear algebra and on a secret random permutation, allowing both to cipher watermarked data and to mark encrypted data withou...
! Desirable intermediate processing in multimedia transmission Unequal error protection Scalability by transcoding or scalable coding " heterogeneous environment: various bandwidth condition, computing capability, and power limit ! Quality, Time, and Value of multimedia High quality version need to be protected with much bigger effort Commercial value of movie usually decrease rapidly w...
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important issue. Many researchers have proposed...
In multimedia conferencing systems the need for confidentiality gains in importance. This goal can be achieved by encry:,ptiotr. III real-time video processing systems there is a special need jar partial data encryption. Existing methods and their weaknesses are investigated. In this paper we present a new approach for partial encryption of’ video data, which allows a security level of nearly e...
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید