21,943 research outputs found

    Encryption for high efficiency video coding with video adaptation capabilities

    Get PDF
    Video encryption techniques enable applications like digital rights management and video scrambling. Applying encryption on the entire video stream can be computationally costly and prevents advanced video modifications by an untrusted middlebox in the network, like splicing, quality monitoring, watermarking, and transcoding. Therefore, encryption techniques are proposed which influence a small amount of the video stream while keeping the video compliant with its compression standard, High Efficiency Video Coding. Encryption while guaranteeing standard compliance can cause degraded compression efficiency, so depending on their bitrate impact, a selection of encrypted syntax elements should be made. Each element also impacts the quality for untrusted decoders differently, so this aspect should also be considered. In this paper, multiple techniques for partial video encryption are investigated, most of them having a low impact on rate-distortion performance and having a broad range in scrambling performance(1)

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh

    Get PDF
    Due to the huge growth in communication and digital technologies in support of multimedia sharing, video security has recently attracted the attention of researchers. Since video data representation takes up a large amount of data, it has to be minimized before being transmitted through the channels. To do so, that data has to be subjected to a compression process. This process is performed according to the video coding standard (video compression). There have been different types of video coding standards, but High Efficiency Video Coding (HEVC) is the latest video coding standard being introduced. Whereas, in the field of video security, there are several types of encryption algorithms utilized by researchers, such as Rivest-Shamir-Adleman (RSA), Data Encryption Standard (DES) and Advanced Encryption Standard (AES). All of those encryption algorithms are classified as asymmetric and symmetric algorithms. Since the video data is still huge even after the compression process, most researchers apply their encryption approaches on a selective part of the video data whereas the compression process is performed by a different type of coding standard. Most of the existing video encryption methods are not adequate to secure the video contents against the modem security attacks and eavesdropping. Furthermore, those methods have become impractical especially for the video sharing through the internet using the new coding standard HEVC because of the limited resources on the devices. Wherein those approaches have fallen into some limitations, such as low-security level, high computational overhead, not maintaining the bitstream compliance and result in the increase of video bitrate. In this thesis, three lightweight selective encryption approaches have been developed to provide a visual video and moving objects protection of HEVC bitstream that can be utilized for real-time video streaming, while maintaining the computational cost and video bit rate. Those approaches named as, Encryption for Absolute Coefficient Level, Encryption of Intra Prediction Mode, and Encryption of Motion Vector Difference (MVD). In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. Whereas the third method is dedicated to secure the moving object information in the video by exploiting the syntax element of motion vector difference, and this method is encrypted by AES as well. The experimental results for the first and the second of the proposed approaches has shown that a reliable security level of visual video perception was provided, in addition to having no observed effects on compression efficiency. Furthermore, from the test results of the third method, the moving objects information was encrypted and at the same time, the compression efficiency was maintained. The proposed schemes provide a trade-off between encryption reliability, flexibility, and computational complexity, where the encryption time in the first scheme increased by 13% and zero in the second and the third schemes, and the increase in bitrate is 1% in the first and the third schemes and zero in the second scheme. Thus, these methods can be considered as feasible techniques to secure the HEVC/H.265 bitstream, and can be applied in real-time applications

    Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    Full text link
    The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the stego file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42

    An intelligent real-time occupancy monitoring system with enhanced encryption and privacy

    Get PDF
    corecore