نتایج جستجو برای: multimedia encryption systems

تعداد نتایج: 1232148  

Journal: :IEEE Trans. Signal Processing 2003
Darko Kirovski Fabien A. P. Petitcolas

Billions of dollars allegedly lost to piracy of multimedia content have recently triggered the industry to rethink the way music and films are distributed on the Internet. As encryption is vulnerable to digital or analog re-recording, currently almost all copyright protection mechanisms rely to a certain extent on watermarking. A watermark is an imperceptive secret hidden into a host signal. In...

2012
Mayank Arya Chandra Ravindra Purwar Navin Rajpal

In the recent years with the development of internet technologies, video technologies have been broadly used in TV, communication and multimedia, So security is required on video data. Although much video encryption technique has been develop but not give so much efficiency in terms of encryption and decryption process. However, they are more complex to implement as a system and are difficult t...

Journal: :CoRR 2013
Quist-Aphetsi Kester

The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary...

2010
V. Vijayalakshmi L. M. Varalakshmi G. Florence Sudha

The growth in multimedia based Internet applications can be seen in the quantity of growth in video telephony, video on demand, media server etc. With the current cyber threats, sensitive video need to be protected before transmission. Streaming video applications requires high security as well as high computational performance. The need for video data protection is on rise hence encryption of ...

Journal: :VLSI Signal Processing 2005
Regunathan Radhakrishnan Mehdi Kharrazi Nasir D. Memon

It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganograp...

Journal: :Intelligent Automation & Soft Computing 2011
Xi Chen Shiguo Lian

Some joint fingerprinting and decryption (JFD) schemes used for copyright protection were reported recently. However, most of them need to be investigated before practical applications. In this paper, the typical one proposed by Lemma et al. is investigated and evaluated. Since this scheme aims to distribute multimedia content by encryption and watermarking, some important performances determin...

2016
Sridhar C. Iyer Shiwani Gupta

Data security is of utmost importance in today’s world. Especially when the data is travelling through an insecure communication network. There are symmetric key encryption techniques which use only one key for both encryption and decryption of the data. They are simple in design but can be easily cracked using brute force attacks. The entire security of such a cipher could be compromised if th...

1998
Aura Ganz Zvi Ganz

To secure real-time communication in wireless LANs it is pertinent to implement real time cryptographic services in software or hardware. In this paper we evaluate the use of software based inline encryption algorithms for wireless LANs that are implemented in the Layer Service Provider as de ned by WinSock 2 for Windows. The evaluated encryption algorithms run on each PC that is part of the wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید