263 research outputs found

    デジタル チョサクケン ホゴ ノ タメ ノ オンセイ シゴウ ノ コウソク アンゴウカ シ ュホウ ニ カンスル ケキュウ

    Full text link
    This paper is based on “Partial Encryption Method That Enhances MP3 Security” , by the same authors, which appeared in the Proceedings of 2014 IEEE Asia Pacific Conference on Circuits and Systems, Copyright(C)2014 IEICE. The material in this paper was presented in part at the Proceedings of 2014 IEEE Asia Pacific Conference on Circuits and Systems, and all the figures of this paper are reused form under the permission of the IEICE.© 2014 IEEE. Reprinted, with permission, from T. T. Oo and T. Onoye, "Progressive audio scrambling via wavelet transform," 2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Ishigaki, 2014, pp. 97-100. doi: 10.1109/APCCAS.2014.7032728© 2014 IEEE. Reprinted, with permission, from T. T. Oo and T. Onoye, "Progressive audio scrambling via complete binary tree's traversal and wavelet transform," Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, Siem Reap, 2014, pp. 1-7. doi: 10.1109/APSIPA.2014.7041525In reference to IEEE copyrighted material which is used with permission in this thesis, the IEEE does not endorse any of Osaka University’s products or services. Internal or personal use of this material is permitted. If interested in reprinting/republishing IEEE copyrighted material for advertising or promotional purposes or for creating new collective works for resale or redistribution, please go to http://www.ieee.org/publications_standards/publications/rights/rights_link.html to learn how to obtain a License from RightsLink. If applicable, University Microfilms and/or ProQuest Library, or the Archives of Canada may supply single copies of the dissertation

    Audio scrambling technique based on cellular automata

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s11042-012-1306-7Scrambling is a process that has proved to be very effective in increasing the quality of data hiding, watermarking, and encryption applications. Cellular automata are used in diverse and numerous applications because of their ability to obtain complex global behavior from simple and localized rules. In this paper we apply cellular automata in the field of audio scrambling because of the potential it holds in breaking the correlation between audio samples effectively. We also analyze the effect of using different cellular automata types on audio scrambling and we test different cellular automata rules with different Lambda values. The scrambling degree is measured and the relation between the robustness and the scrambling degree obtained is studied. Experimental results show that the proposed technique is robust to data loss attack where 1/3 of the data is lost and that the algorithm can be applied to music and speech files of different sizes.This work is partially supported by the Spanish Ministry of Science and Innovation under coordinated research projects TIN2011-28260-C03-00 and TIN2011-28260-C03-02 and by the Comunidad Autónoma de Madrid under research project e-madrid S2009/TIC-165

    On the data hiding theory and multimedia content security applications

    Get PDF
    This dissertation is a comprehensive study of digital steganography for multimedia content protection. With the increasing development of Internet technology, protection and enforcement of multimedia property rights has become a great concern to multimedia authors and distributors. Watermarking technologies provide a possible solution for this problem. The dissertation first briefly introduces the current watermarking schemes, including their applications in video,, image and audio. Most available embedding schemes are based on direct Spread Sequence (SS) modulation. A small value pseudo random signature sequence is embedded into the host signal and the information is extracted via correlation. The correlation detection problem is discussed at the beginning. It is concluded that the correlator is not optimum in oblivious detection. The Maximum Likelihood detector is derived and some feasible suboptimal detectors are also analyzed. Through the calculation of extraction Bit Error Rate (BER), it is revealed that the SS scheme is not very efficient due to its poor host noise suppression. The watermark domain selection problem is addressed subsequently. Some implications on hiding capacity and reliability are also studied. The last topic in SS modulation scheme is the sequence selection. The relationship between sequence bandwidth and synchronization requirement is detailed in the work. It is demonstrated that the white sequence commonly used in watermarking may not really boost watermark security. To address the host noise suppression problem, the hidden communication is modeled as a general hypothesis testing problem and a set partitioning scheme is proposed. Simulation studies and mathematical analysis confirm that it outperforms the SS schemes in host noise suppression. The proposed scheme demonstrates improvement over the existing embedding schemes. Data hiding in audio signals are explored next. The audio data hiding is believed a more challenging task due to the human sensitivity to audio artifacts and advanced feature of current compression techniques. The human psychoacoustic model and human music understanding are also covered in the work. Then as a typical audio perceptual compression scheme, the popular MP3 compression is visited in some length. Several schemes, amplitude modulation, phase modulation and noise substitution are presented together with some experimental results. As a case study, a music bitstream encryption scheme is proposed. In all these applications, human psychoacoustic model plays a very important role. A more advanced audio analysis model is introduced to reveal implications on music understanding. In the last part, conclusions and future research are presented

    A method for protecting and controlling access to JPEG2000 images

    Get PDF
    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. Ibis paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management) [16], which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.info:eu-repo/semantics/acceptedVersio

    Audio, Text, Image, and Video Digital Watermarking Techniques for Security of Media Digital

    Get PDF
    The proliferation of multimedia content as digital media assets, encompassing audio, text, images, and video, has led to increased risks of unauthorized usage and copyright infringement. Online piracy serves as a prominent example of such misuse. To address these challenges, watermarking techniques have been developed to protect the copyright of digital media while maintaining the integrity of the underlying content. Key characteristics evaluated in watermarking methods include capability, privacy, toughness, and invisibility, with robustness playing a crucial role. This paper presents a comparative analysis of digital watermarking methods, highlighting the superior security and effective watermark image recovery offered by singular value decomposition. The research community has shown significant interest in watermarking, resulting in the development of various methods in both the spatial and transform domains. Transform domain approaches such as Discrete Cosine Transform, Discrete Wavelet Transform, and Singular Value Decomposition, along with their interconnections, have been explored to enhance the effectiveness of digital watermarking methods

    Digital Futures: A Need-to-Know Policy Guide for Independent Filmmakers

    Get PDF
    Identifies hot issues in digital filmmaking, and discusses policies that best support the creativity and diversity that independent filmmakers represent. A joint project of the Center for Social Media and Independent Television

    The Webcasting Music Revolution is Ready to Begin, as Soon as We Figure out the Copyright Law: The Story of the Music Industry at War with Itself

    Get PDF
    No one has yet been able to agree on the meaning of the copyright laws related to webcast licensing and fees or how to define and treat new technological advances, innovations and uses. This article provides background into the history of the copyright law as it relates to music webcasting, including the Digital Performance Right in Sound Recordings Act of 1995 ( DPRA ) and the DMCA, explains the various forms of copyright protection held in recorded sound performances and its relation to online transmissions, discusses the history of the complex, legal situation which has resulted, new developments surrounding the proposed Music Online Competition Act ( MOCA ), and offers commentary and suggestions

    WGLT Program Guide, September-October, 2012

    Get PDF
    This guide details programming for WGLT, a public radio station owned by Illinois State University.https://ir.library.illinoisstate.edu/wgltpg/1243/thumbnail.jp

    The Information Commons: a public policy report

    Get PDF
    This report describes the history of the information commons, presents examples of online commons that provide new ways to store and deliver information, and concludes with policy recommendations. Available in PDF and HTML versions.BRENNAN CENTER FOR JUSTICE at NYU SCHOOL OF LAW Democracy Program, Free Expression Policy Project 161 Avenue of the Americas, 12th floor New York NY 10013 Phone: (212) 998-6730 Web site: www.brennancenter.org Free Expression Policy Project: www.fepproject.or

    The Information Commons: a public policy report

    Full text link
    This report describes the history of the information commons, presents examples of online commons that provide new ways to store and deliver information, and concludes with policy recommendations. Available in PDF and HTML versions.BRENNAN CENTER FOR JUSTICE at NYU SCHOOL OF LAW Democracy Program, Free Expression Policy Project 161 Avenue of the Americas, 12th floor New York NY 10013 Phone: (212) 998-6730 Web site: www.brennancenter.org Free Expression Policy Project: www.fepproject.or
    corecore