1,418 research outputs found

    On the Design of Perceptual MPEG-Video Encryption Algorithms

    Get PDF
    In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a simpler and more effective design is suggested, which selectively encrypts fixed-length codewords (FLC) in MPEG-video bitstreams under the control of three perceptibility factors. The proposed design is actually an encryption configuration that can work with any stream cipher or block cipher. Compared with the previously-proposed schemes, the new design provides more useful features, such as strict size-preservation, on-the-fly encryption and multiple perceptibility, which make it possible to support more applications with different requirements. In addition, four different measures are suggested to provide better security against known/chosen-plaintext attacks.Comment: 10 pages, 5 figures, IEEEtran.cl

    Simultaneous Visual Cryptography

    Get PDF
    A visual cryptography scheme (VCS), as proposed by M. Naor and A. Shamir, encodes a secret image into n different shares. The scheme ensures that only certain designated combinations of shares can recover the original image, while other combinations yield, in probabilistic sense, no information about the secret image. In this thesis, we show that there exist simultaneous visual cryptography schemes (SVCS), i.e. cryptographic schemes that allow for multiple secret images to be encoded across a set of n shares. The essential part of this research is to derive a set of formal definitions used to construct a valid SVCS and to design and examine different approaches for establishing valid SVCS constructions. In particular, we describe an SVCS that allows encoding n 1 distinct secret images across a set of n shares, and include a program that demonstrates the successful use of this SVCS in the appendix

    Image Security using Visual Cryptography

    Get PDF
    Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information security. Visual cryptography is a secret sharing scheme as it breaks an original image into image shares such that, when the shares are stacked on one another, a hidden secret image is revealed. The Visual Cryptography Scheme is a secure method that encrypts a secret document or image by breaking it into image shares. A unique property of Visual Cryptography Scheme is that one can visually decode the secret image by superimposing shares without computation. Even to make the visual cryptography image shares more secure, public key encryption scheme is applied. Public key encryption technique makes image shares so secure that it becomes very hard for a third party to decode the secret image information without having required data that is a private key

    A NOVEL JOINT PERCEPTUAL ENCRYPTION AND WATERMARKING SCHEME (JPEW) WITHIN JPEG FRAMEWORK

    Get PDF
    Due to the rapid growth in internet and multimedia technologies, many new commercial applications like video on demand (VOD), pay-per-view and real-time multimedia broadcast etc, have emerged. To ensure the integrity and confidentiality of the multimedia content, the content is usually watermarked and then encrypted or vice versa. If the multimedia content needs to be watermarked and encrypted at the same time, the watermarking function needs to be performed first followed by encryption function. Hence, if the watermark needs to be extracted then the multimedia data needs to be decrypted first followed by extraction of the watermark. This results in large computational overhead. The solution provided in the literature for this problem is by using what is called partial encryption, in which media data are partitioned into two parts - one to be watermarked and the other is encrypted. In addition, some multimedia applications i.e. video on demand (VOD), Pay-TV, pay-per-view etc, allow multimedia content preview which involves „perceptual‟ encryption wherein all or some selected part of the content is, perceptually speaking, distorted with an encryption key. Up till now no joint perceptual encryption and watermarking scheme has been proposed in the literature. In this thesis, a novel Joint Perceptual Encryption and Watermarking (JPEW) scheme is proposed that is integrated within JPEG standard. The design of JPEW involves the design and development of both perceptual encryption and watermarking schemes that are integrated in JPEG and feasible within the „partial‟ encryption framework. The perceptual encryption scheme exploits the energy distribution of AC components and DC components bitplanes of continuous-tone images and is carried out by selectively encrypting these AC coefficients and DC components bitplanes. The encryption itself is based on a chaos-based permutation reported in an earlier work. Similarly, in contrast to the traditional watermarking schemes, the proposed watermarking scheme makes use of DC component of the image and it is carried out by selectively substituting certain bitplanes of DC components with watermark bits. vi ii Apart from the aforesaid JPEW, additional perceptual encryption scheme, integrated in JPEG, has also been proposed. The scheme is outside of joint framework and implements perceptual encryption on region of interest (ROI) by scrambling the DCT blocks of the chosen ROI. The performances of both, perceptual encryption and watermarking schemes are evaluated and compared with Quantization Index modulation (QIM) based watermarking scheme and reversible Histogram Spreading (RHS) based perceptual encryption scheme. The results show that the proposed watermarking scheme is imperceptible and robust, and suitable for authentication. Similarly, the proposed perceptual encryption scheme outperforms the RHS based scheme in terms of number of operations required to achieve a given level of perceptual encryption and provides control over the amount of perceptual encryption. The overall security of the JPEW has also been evaluated. Additionally, the performance of proposed separate perceptual encryption scheme has been thoroughly evaluated in terms of security and compression efficiency. The scheme is found to be simpler in implementation, have insignificant effect on compression ratios and provide more options for the selection of control factor

    Mixing Biometric Data For Generating Joint Identities and Preserving Privacy

    Get PDF
    Biometrics is the science of automatically recognizing individuals by utilizing biological traits such as fingerprints, face, iris and voice. A classical biometric system digitizes the human body and uses this digitized identity for human recognition. In this work, we introduce the concept of mixing biometrics. Mixing biometrics refers to the process of generating a new biometric image by fusing images of different fingers, different faces, or different irises. The resultant mixed image can be used directly in the feature extraction and matching stages of an existing biometric system. In this regard, we design and systematically evaluate novel methods for generating mixed images for the fingerprint, iris and face modalities. Further, we extend the concept of mixing to accommodate two distinct modalities of an individual, viz., fingerprint and iris. The utility of mixing biometrics is demonstrated in two different applications. The first application deals with the issue of generating a joint digital identity. A joint identity inherits its uniqueness from two or more individuals and can be used in scenarios such as joint bank accounts or two-man rule systems. The second application deals with the issue of biometric privacy, where the concept of mixing is used for de-identifying or obscuring biometric images and for generating cancelable biometrics. Extensive experimental analysis suggests that the concept of biometric mixing has several benefits and can be easily incorporated into existing biometric systems

    A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method

    Get PDF
    Steganography is the art and science of hiding information by embedding data into cover media. In this paper we propose a new method of information hiding in digital image in spatial domain. In this method we use Plane Bit Substitution Method (PBSM) technique in which message bits are embedded into the pixel value(s) of an image. We first, proposed a Steganography transformation machine (STM) for solving Binary operation for manipulation of original image with help to least significant bit (LSB) operator based matching. Second, we use pixel encryption and decryption techniques under theoretical and experimental evolution. Our experimental, techniques are sufficient to discriminate analysis of stego and cover image as each pixel based PBSM, and operand with LSB

    A dual watermarking scheme for identity protection

    Get PDF
    A novel dual watermarking scheme with potential applications in identity protection, media integrity maintenance and copyright protection in both electronic and printed media is presented. The proposed watermarking scheme uses the owner’s signature and fingerprint as watermarks through which the ownership and validity of the media can be proven and kept intact. To begin with, the proposed watermarking scheme is implemented on continuous-tone/greyscale images, and later extended to images achieved via multitoning, an advanced version of halftoning-based printing. The proposed watermark embedding is robust and imperceptible. Experimental simulations and evaluations of the proposed method show excellent results from both objective and subjective view-points

    Design of data validation solutions using high density 2D colored codes and a (2,2) xor-based color interference visual cryptography scheme

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018.A validação de dados nos sistemas de informação utiliza majoritariamente algoritmos criptográficos em sistemas que, geralmente, não utilizam materiais não eletrônicos como parte da infraestrutura do criptossistema. Nesse trabalho, foram desenvolvidos dois sistemas de armazenamento e recuperação de dados através da proposta de uma nova tecnologia de códigos de barra colorido bidimensional e de um novo esquema de criptografia visual. Os códigos de barras bidimensionais têm sido amplamente estudados, mas ainda continuam sem contar com um padrão que consiga transmitir alta quantidade de informação em pequenos espaços impressos. As aplicações desse modelo de transmissão tem como motivação a necessidade de armazenar (e recuperar) uma alta quantidade de informação em pequenas áreas impressas, como por exemplo, para utilização de dados criptográficos que sejam processados sem conexão e armazenados em pequenos espaços impressos, como os de caixas de remédios ou caixas de cigarros. O código de barras colorido 2D proposto nesse trabalho é chamado de High Density 2 Dimensional Code (HD2DC) e possui 8 diferentes tamanhos. O HD2DC permite a utilização de 5 ou 8 cores em cada tamanho e conta com o algoritmo de correção de erro Reed-Solomon com 3 diferentes níveis (10%, 20% e 30%). O HD2DC foi desenvolvido com o objetivo de ser um padrão de código de barras colorido 2D para operações de transmissão de grande quantidade de informações em pequenas ou médias áreas de impressão. Criptografia visual é uma técnica que cifra uma imagem secreta em duas ou mais imagens chave. A decodificação de qualquer esquema de criptografia visual depende do sistema visual humano e a maioria das propostas existentes consideram para a decodificação a utilização da sobreposição de duas ou mais lâminas físicas com n x n (n ≥ 2) pixels expandidos. O esquema de criptografia visual proposto nesse trabalho considera a utilização de duas imagens. A primeira é uma lâmina física feita por uma impressão colorida em Policloreto de Polivinila (PVC) transparente de 3 milímetros, enquanto que a segunda é uma imagem colorida apresentada na tela do visor de um smartphone. Ambas as imagens não geram expansão de pixels. A obtenção das melhores cores utilizadas nesse criptossistema foi realizada através de estudos físicos do comportamento da interferência de cor entre a tela do smartphone e a cor utilizada na impressão do PVC transparente. Essa nova proposta possui um alto nível de usabilidade para validação de dados em transações eletrônicas e conta com um custo muito baixo de implementação. Um sistema robusto de validação de dados é criado quando é combinada a criptografia visual proposta com o HD2DC. O HD2DC tem a capacidade de armazenar uma das imagens chave, no caso a que deve ser mostrada no visor do celular, essa arquitetura de codificação aumenta a percepção de segurança e explora a usabilidade do celular por meio da utilização da câmera e da tela como ferramentas para mostrar a imagem cifrada da criptografia visual.Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Digital data validation generally requires that algorithms are ran into on cryptographic systems that, usually, do not use non-electronic devices as part of their information security infrastructure. This work presents two information storage and retrieval systems: a new colored two-dimensional barcode technology and a novel visual cryptography scheme. Two-dimensional barcodes have been a topic of research for several decades, but there is still no standard that stores and retrieves high amounts of data. Recently, new requirements have been imposed on applications that use 2D barcodes as a communication channel, such as the capability of storing information into a small printed area. This particular requirement is specially important for 2D barcodes that store cryptographic primitives to be processed off-line. This is the case of barcodes in products like cigarettes and medicines, which are used for data validation and product verification. The proposed 2D colored barcode is called High Density Two-Dimensional Code (HD2DC) and is currently one of the 2D barcodes with the highest data density. HD2DC can be generated in 8 different sizes, with 5 or 8 colors. To increase robustness, the system uses a Reed-Solomon error correction algorithm with 3 different levels: Low, Medium and High, which provide approximately 10%, 20% and 30% error correction, respectively. Visual cryptography (VC) is a technique that encodes the content of a secret image into two or more images, which are called shares. These shares are printed on transparencies and superimposed (requiring a good alignment) to reveal (visually) the original secret image, i.e. without requiring any computation. Current visual cryptography schemes use at least 2 shares (transparencies) as keys. With respect to the secret image size, most of these schemes produce a n x n (n ≥ 2) size expansion of the shares and the decoded image. The proposed Visual Cryptography scheme, on the other hand, uses two shares and does not require a size expansion. The first share is a colored film printed on a Polyvinyl Chloride (PVC) surface of 3 millimeters, while the second share is a colored image displayed on a smartphone or tablet. In this work, we performed a physical evaluation of the color interference properties of these two shares (the printed PVC transparency and the image displayed on the mobile device) to find the most adequate color space to be used in the proposed cryptosystem. We also propose a strong validation system combining our Xor-Based Visual Cryptography scheme with HD2DC. HD2DC has the capability of storing the share that is shown on the mobile device display. This encoding architecture enhances security perception and explores the mobile device usability, using its screen to display a Visual Cryptography share
    corecore