117 research outputs found

    Video Encryption Based on Chaotic Systems in the Compression Domain

    Get PDF
    With the development of the internet and multimedia technology digital video encryption has attracted a great deal of research interest in the recent few years in applications. In this paper, we propose a method to encrypt video data. The proposed algorithm is based on the MPEG video coding standard. It selectively encrypts some DCT coefficients in the I frame, B frame and P frame in MPEG video compression by using chaotic systems. The key in this paper is chaotic sequence based on logistic mapping. It can produce the pseudo-random sequences with good randomness. The experimental results based on chaotic maps prove the effectiveness of the proposed method, showing advantages of large key space and high-level security. The proposed algorithm was measured through a series of tests and achieved good results. The results indicate that the algorithm can be implemented for video encryption efficiently and it provides considerable levels of security

    An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images

    Full text link
    Motivated by the work of Uehara et al. [1], an improved method to recover DC coefficients from AC coefficients of DCT-transformed images is investigated in this work, which finds applications in cryptanalysis of selective multimedia encryption. The proposed under/over-flow rate minimization (FRM) method employs an optimization process to get a statistically more accurate estimation of unknown DC coefficients, thus achieving a better recovery performance. It was shown by experimental results based on 200 test images that the proposed DC recovery method significantly improves the quality of most recovered images in terms of the PSNR values and several state-of-the-art objective image quality assessment (IQA) metrics such as SSIM and MS-SSIM.Comment: 6 pages, 6 figures, ICIP 201

    Secure Media Streaming for Android

    Get PDF
    Digital media distribution systems must protect the confidentiality and integrity of content and ensure its authenticity, without introducing excessive overhead. Of- ten, it is desirable to sacrifice some degree of cryptographic security for improved performance. In this project, we have implemented a secure streaming server for the Android platform. We consider various encryption strategies for streaming video and analyze the tradeoff between security and efficiency

    Survey of Video Encryption Algorithms

    Get PDF
    Research on security of digital video transmission and storage has been gaining attention from researchers in recent times because of its usage in various applications and transmission of sensitive information through the internet. This is as a result of the swift development in efficient video compression techniques and internet technologies. Encryption which is the widely used technique in securing video communication and storage secures video data in compressed formats. This paper presents a survey of some existing video encryption techniques with an explanation on the concept of video compression. The review which also explored the performance metrics used in the evaluation and comparison of the performance of video encryption algorithms is being believed to give readers a quick summary of some of the available encryption techniques

    A Novel approach for Privacy Preserving in Video using Extended Euclidean algorithm Based on Chinese remainder theorem

    Get PDF
    The development in the modern technology paved a path in the utilization of surveillance cameras in streets, offices and other areas but this significantly leads a threat to the privacy of visitors, passengers or employees, leakage of information etc.. To overcome this threat, privacy and security needs to be incorporated in the practical surveillance system. It secures the video information which is resided in various video file types. In this process we used an efficient framework to preserve the privacy while distributing secret among ‘N’ number of parties. In this paper we analyzed various techniques of Chinese Remainder Theorem

    WCAM: secured video surveillance with digital rights management

    Get PDF
    The WCAM project aims to provide an integrated system for secure delivery of video surveillance data over a wireless network, while remaining scalable and robust to transmission errors. To achieve these goals., the content is encoded in Motion-JPEG2000 and streamed with a specific RTP protocol encapsulation to prevent the loss of packets containing the most essential data. Protection of the video data is performed at content level using the standardized JPSEC syntax along with flexible encryption of quality layers or resolution levels. This selective encryption respects the JPEG2000 structure of the stream, not only ensuring end-to-end ciphered delivery, but also enabling dynamic content adaptation within the wireless network (quality of service, adaptation to the user's terminal). A DRM (Digital Rights Management) solution, called OpenSDRM is added to manage all authenticated peers on the WLAN (from end-users to cameras), as well as to manage the rights to access and display conditionally the video data. This whole integrated architecture addresses several security problems such as data encryption, integrity, access control and rights management. Using several protection lavers, the level of confidentiality can depend both on content characteristics and user rights, thus also addressing the critical issue of privacy.info:eu-repo/semantics/acceptedVersio

    A novel secure H.264 transcoder using selective encryption

    Get PDF
    • …
    corecore