266 research outputs found

    QUALITY-DRIVEN CROSS LAYER DESIGN FOR MULTIMEDIA SECURITY OVER RESOURCE CONSTRAINED WIRELESS SENSOR NETWORKS

    Get PDF
    The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges such as extremely limited energy, computing and bandwidth resources. This dissertation provides a quality-driven security design and resource allocation framework for WMSNs. The contribution of this dissertation bridges the inter-disciplinary research gap between high layer multimedia signal processing and low layer computer networking. It formulates the generic problem of quality-driven multimedia resource allocation in WMSNs and proposes a cross layer solution. The fundamental methodologies of multimedia selective encryption and stream authentication, and their application to digital image or video compression standards are presented. New multimedia selective encryption and stream authentication schemes are proposed at application layer, which significantly reduces encryption/authentication complexity. In addition, network resource allocation methodologies at low layers are extensively studied. An unequal error protection-based network resource allocation scheme is proposed to achieve the best effort media quality with integrity and energy efficiency guarantee. Performance evaluation results show that this cross layer framework achieves considerable energy-quality-security gain by jointly designing multimedia selective encryption/multimedia stream authentication and communication resource allocation

    On the Design of Perceptual MPEG-Video Encryption Algorithms

    Get PDF
    In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a simpler and more effective design is suggested, which selectively encrypts fixed-length codewords (FLC) in MPEG-video bitstreams under the control of three perceptibility factors. The proposed design is actually an encryption configuration that can work with any stream cipher or block cipher. Compared with the previously-proposed schemes, the new design provides more useful features, such as strict size-preservation, on-the-fly encryption and multiple perceptibility, which make it possible to support more applications with different requirements. In addition, four different measures are suggested to provide better security against known/chosen-plaintext attacks.Comment: 10 pages, 5 figures, IEEEtran.cl

    Space and Planetary Imaging using JPEG2000

    Get PDF
    The raising demand for Digital content Rights Management (DRM), protection and security, enabling effective on-line access, exchange and trading of all types of digital media items (ranging from a simple text file to a large space or planetary image) and, at the same time, supporting global interoperability of customer devices and traded items, can only be met by a good mix of open architectures and proprietary technologies. In this paper, we present a novel integrated architecture that supports the secure handling of large remote sensing ISO JPEG2000 coded images, obtained from satellite. This effort is within the scope of further developments and new extensions for this standard, namely: - Trans-coding of proprietary digital image formats used in satellite imagery, to the new JPEG2000 format; - Inexpensive network clusters for parallel computing to improve the algorithmic process of coding very large digital images obtained from satellites. - Coding of multi-component and multi-spectral images as well as volumetric images (JP3D); - Exploration of interactive on-line image satellite catalogues (JPIP); - Secure transmission, and protection of the image content based in OpenSDRM (JPSEC)

    Accessing earth observation data using JPEG2000

    Get PDF
    Applications like, change detection, global monitoring, disaster detection and management have emerging requirements that need the availability of large amounts of data. This data is currently being captured by a multiplicity of instruments and Earth Observation (EO) sensors originating large volumes of data that needs to be stored, processed and accessed in order to be useful. The authors of this paper have been involved on an ESA-founded project, called HICOD2000 to study the applicability of the new image encoding standard JPEG2000 - to EO products. This paper presents and describes the system that was developed for HICOD2000 project, which allows, not only the encoding and decoding of several EO products, but also supports some of the security requirements identified previously that allows ESA to define and apply efficient EO data access security policies and even to exploit some EO products electronic commerce over the Internet. This system was integrated with the existing ESA Ground Segment systems specifically the Services Support Environment (SSE).info:eu-repo/semantics/acceptedVersio

    Envisat products secure browsing in mobile clients using JPEG2000 interactivity protocol

    Get PDF
    Taking advantage of the mobile platforms to interact with the HICOD2000 system has been the motivation for the work described in this paper. Regardless of the limited resources available in mobile platforms the authors demonstrate that using the features of the HICOD2000 system the mobile device might be of major assistance in the field where satellite imagery may have an important and useful role. This paper describes an extension of the HICOD2000 system, available to the public through the ESA Service Support Environment. The EO JPEG2000 compressed products have achieved good compression ratios, minimizing both storage space and bandwidth. Regarding security to sensitive data the system enforces user access rights via a digital rights management platform called OpenSDRM. The mobile device has been endowed with the implementation of the JPIP protocol to optimize network bandwidth as well as the necessary components to interface with the OpenSDRM platform and decode JPSEC protected images: the OpenSDRM wallet and the protection tool.info:eu-repo/semantics/publishedVersio

    A method for protecting and controlling access to JPEG2000 images

    Get PDF
    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. Ibis paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management) [16], which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.info:eu-repo/semantics/acceptedVersio

    A SECURED AUTHENTICATED WATERMARKING TECHNIQUE

    Get PDF
    Whenever media contents transmitted through the network, compressed and encrypted media data is used so it is important to give proper protection to the data items to avoid unauthorized access and for that we need to enhance media authentication and for that the compressed encrypted media data which is used to distribute through the network is watermarked for providing proof of ownership or distributorship. For doing compression JPEG 2000 compression and while doing compression the data is packed to  low  number of bits and to this data encryption is applied so  stream cipher technique is used for avoiding media quality degradation and also this technique allow to do watermarking in a predictable manner. And a robust watermarking algorithm is used for watermarking this compressed and encrypted media data
    corecore