246 research outputs found

    A Case for Multi-key Secure Video Proxy: Theory, Design and Implementation

    Get PDF

    Asymmetric reversible parametric sequences approach to design a multi-key secure multimedia proxy: theory, design and implementation.

    Get PDF
    Yeung Siu Fung.Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.Includes bibliographical references (leaves 52-53).Abstracts in English and Chinese.Abstract --- p.iiAcknowledgement --- p.vChapter 1 --- Introduction --- p.1Chapter 2 --- Multi-Key Encryption Theory --- p.7Chapter 2.1 --- Reversible Parametric Sequence --- p.7Chapter 2.2 --- Implementation of ARPSf --- p.11Chapter 3 --- Multimedia Proxy: Architectures and Protocols --- p.16Chapter 3.1 --- Operations to Request and Cache Data from the Server --- p.16Chapter 3.2 --- Operations to Request Cached Data from the Multimedia Proxy --- p.18Chapter 3.3 --- Encryption Configuration Parameters (ECP) --- p.19Chapter 4 --- Extension to multi-level proxy --- p.24Chapter 5 --- Secure Multimedia Library (SML) --- p.27Chapter 5.1 --- Proxy Pre-fetches and Caches Data --- p.27Chapter 5.2 --- Client Requests Cached Data From the Proxy --- p.29Chapter 6 --- Implementation Results --- p.31Chapter 7 --- Related Work --- p.40Chapter 8 --- Conclusion --- p.42Chapter A --- Function Prototypes of Secure Multimedia Library (SML) --- p.44Chapter A.1 --- CONNECTION AND AUTHENTICATION --- p.44Chapter A.1.1 --- Create SML Session --- p.44Chapter A.1.2 --- Public Key Manipulation --- p.44Chapter A.1.3 --- Authentication --- p.45Chapter A.1.4 --- Connect and Accept --- p.46Chapter A.1.5 --- Close Connection --- p.47Chapter A.2 --- SECURE DATA TRANSMISSION --- p.47Chapter A.2.1 --- Asymmetric Reversible Parametric Sequence and En- cryption Configuration Parameters --- p.47Chapter A.2.2 --- Bulk Data Encryption and Decryption --- p.48Chapter A.2.3 --- Entire Data Encryption and Decryption --- p.49Chapter A.3 --- Secure Proxy Architecture --- p.49Chapter A.3.1 --- Proxy-Server Connection --- p.49Chapter A.3.2 --- ARPS and ECP --- p.49Chapter A.3.3 --- Initial Sever Encryption --- p.50Chapter A.3.4 --- Proxy Re-Encryption --- p.51Chapter A.3.5 --- Client Decryption --- p.51Bibliography --- p.5

    Utilização da Norma JPEG2000 para codificar proteger e comercializar Produtos de Observação Terrestre

    Get PDF
    Applications like, change detection, global monitoring, disaster detection and management have emerging requirements that need the availability of large amounts of data. This data is currently being capture by a multiplicity of instruments and EO (Earth Observation) sensors originating large volumes of data that needs to be stored, processed and accessed in order to be useful – as an example, ENVISAT accumulates, in a yearly basis, several hundred terabytes of data. This need to recover, store, process and access brings some interesting challenges, like storage space, processing power, bandwidth and security, just to mention a few. These challenges are still very important on today’s technological world. If we take a look for example at the number of subscribers of ISP (Internet Service Providers) broadband services on the developed world today, one can notice that broadband services are still far from being common and dominant. On the underdeveloped countries the picture is even dimmer, not only from a bandwidth point of view but also in all other aspects regarding information and communication technologies (ICTs). All this challenges need to be taken into account if a service is to reach the broadest audience possible. Obviously protection and securing of services and contents is an extra asset that helps on the preservation of possible business values, especially if we consider such a costly business as the space industry. This thesis presents and describes a system which allows, not only the encoding and decoding of several EO products into a JPEG2000 format, but also supports some of the security requirements identified previously that allows ESA (European Space Agency) and related EO services to define and apply efficient EO data access security policies and even to exploit new ways to commerce EO products over the Internet.Aplicações como, detecção de mudanças no terreno, monitorização planetária, detecção e gestão de desastres, têm necessidades prementes que necessitam de vastas quantidades de dados. Estes dados estão presentemente a ser capturados por uma multiplicidade de instrumentos e sensores de observação terrestre, que originam uma enormidade de dados que necessitam de ser armazenados processados e acedidos de forma a se tornarem úteis – por exemplo, a ENVISAT acumula anualmente varias centenas de terabytes de dados. Esta necessidade de recuperar, armazenar, processar e aceder introduz alguns desafios interessantes como o espaço de armazenamento, poder de processamento, largura de banda e segurança dos dados só para mencionar alguns. Estes desafios são muito importantes no mundo tecnológico de hoje. Se olharmos, por exemplo, ao número actual de subscritores de ISP (Internet Service Providers) de banda larga nos países desenvolvidos podemos ficar surpreendidos com o facto do número de subscritores desses serviços ainda não ser uma maioria da população ou dos agregados familiares. Nos países subdesenvolvidos o quadro é ainda mais negro não só do ponto de vista da largura de banda mas também de todos os outros aspectos relacionados com Tecnologias da Informação e Comunicação (TICs). Todos estes aspectos devem ser levados em consideração se se pretende que um serviço se torne o mais abrangente possível em termos de audiências. Obviamente a protecção e segurança dos conteúdos é um factor extra que ajuda a preservar possíveis valores de negócio, especialmente considerando industrias tão onerosas como a Industria Espacial. Esta tese apresenta e descreve um sistema que permite, não só a codificação e descodificação de diversos produtos de observação terrestre para formato JPEG2000 mas também o suporte de alguns requisitos de segurança identificados previamente que permitem, á Agência Espacial Europeia e a outros serviços relacionados com observação terrestre, a aplicação de politicas eficientes de acesso seguro a produtos de observação terrestre, permitindo até o aparecimento de novas forma de comercialização de produtos de observação terrestre através da Internet

    Study and Implementation of Watermarking Algorithms

    Get PDF
    Water Making is the process of embedding data called a watermark into a multimedia object such that watermark can be detected or extracted later to make an assertion about the object. The object may be an audio, image or video. A copy of a digital image is identical to the original. This has in many instances, led to the use of digital content with malicious intent. One way to protect multimedia data against illegal recording and retransmission is to embed a signal, called digital signature or copyright label or watermark that authenticates the owner of the data. Data hiding, schemes to embed secondary data in digital media, have made considerable progress in recent years and attracted attention from both academia and industry. Techniques have been proposed for a variety of applications, including ownership protection, authentication and access control. Imperceptibility, robustness against moderate processing such as compression, and the ability to hide many bits are the basic but rat..

    A Cross Domain Next Generation Network IPTV Client for Media Center environments

    Get PDF
    Functions, which can be summarized to the keyword Internet Protocol Television (IPTV) describe the transmission of video services to users via Internet Protocol (IP). Accompanying to this new television transmission path Home Theatre PCs (HTPC) running a so called Media Center platform are more and more entering the living rooms as a companion for the popular LCD and Plasma displays. Perfect ease of use and the visual integration on the screen and also into the living room is raising their acceptance. These HTPCs are a central node for multimedia services such as TV, radio and email within the networked household. Thus, there are good preconditions for the use of a HTPC as end device for Telco operator driven IPTV and telecommunication services. In the context of this diploma thesis possibilities for the provisioning of IPTV and Next Generation Network (NGN) services on a converged multimedia home entertainment platform for the living room will be investigated, especially Vista Media Center platforms. For this reason, standardization activities will be investigated, which deal with the integration of IPTV and telecommunication services into NGN. The validation of the results will be achieved by the design and implementation of a Vista Media Center Add-In, which can be integrated as an IP Multimedia Subsystem (IMS) based User Agent (UA) in ETSI TISPAN Release 2 IPTV infrastructures. Additionally, a Cross Domain messaging service for IMS based UA is created, which enables a cross-network communication between users
    corecore