42 research outputs found

    End-to-end security for video distribution

    Get PDF

    Framework for reversible data hiding using cost-effective encoding system for video steganography

    Get PDF
    Importances of reversible data hiding practices are always higher in contrast to any conventional data hiding schemes owing to its capability to generate distortion free cover media. Review of existing approaches on reversible data hiding approaches shows variable scheme mainly focussing on the embedding mechanism; however, such schemes could be furthermore improved using encoding scheme for optimal embedding performance. Therefore, the proposed manuscript discusses about a cost-effective scheme where a novel encoding scheme has been used with larger block sizes which reduces the dependencies over larger number of blocks. Further a gradient-based image registration technique is applied to ensure higher quality of the reconstructed signal over the decoding end. The study outcome shows that proposed data hiding technique is proven better than existing data hiding scheme with good balance between security and restored signal quality upon extraction of data

    WG1N5315 - Response to Call for AIC evaluation methodologies and compression technologies for medical images: LAR Codec

    Get PDF
    This document presents the LAR image codec as a response to Call for AIC evaluation methodologies and compression technologies for medical images.This document describes the IETR response to the specific call for contributions of medical imaging technologies to be considered for AIC. The philosophy behind our coder is not to outperform JPEG2000 in compression; our goal is to propose an open source, royalty free, alternative image coder with integrated services. While keeping the compression performances in the same range as JPEG2000 but with lower complexity, our coder also provides services such as scalability, cryptography, data hiding, lossy to lossless compression, region of interest, free region representation and coding

    Video Steganography Techniques: A Survey

    Get PDF
    In digital world, information security is the major issue in digital communication on a network from the third party hackers. Steganography techniques play an important role in information security. These are the secure techniques, used for concealing existence of secret information in any digital cover object viz. image, audio, video files. In last several decades, significant researches have been done on video and image steganography techniques because data embedding and data extraction is very simple. However, many researchers also take the audio file as a cover object where robustness and undetectability of information is very difficult task. The main objective of steganography is hiding the existence of the embedded data in any digital cover object. Steganography technique must be robust against the various image-processing attacks. Nowadays, video files are more accepted because of large size and memory requirements. This paper intends to provide a survey on video techniques and provide the fundamental concept of the steganography and their uses

    Comparative Analysis Among Steganographic LSB Variants

    Get PDF
    Combining the best features of steganography and cryptography is the trending concept which is being followed for the purpose of information security. Steganography provides the provision for hiding secret data in some cover file in order to make it undiscovered by the perpetrators. On the complementary, cryptography secures that secret data by manipulating its original form and converting it into an unintelligent form. Hence, making the data more powerful and secure against the prevailing security attacks and breaches. This paper represents the implementation of this combination on the two LSB variants namely sequential LSB and randomized LSB. A comparison among the two approaches is carried out by adding a secret text into a video cover file. The concept of chaotic sequence has been used as the security approach that converts the secret data into random bits pattern. The proposed work uses the traditional LSB approach as basic steganographic model. The inference on the basis of parameters concludes that the randomized LSB shows better results than the sequential LSB scheme

    Advances in digital media security and right management

    Get PDF

    A digital signature and watermarking based authentication system for JPEG2000 images

    Get PDF
    In this thesis, digital signature based authentication system was introduced, which is able to protect JPEG2000 images in different flavors, including fragile authentication and semi-fragile authentication. The fragile authentication is to protect the image at code-stream level, and the semi-fragile is to protect the image at the content level. The semi-fragile can be further classified into lossy and lossless authentication. With lossless authentication, the original image can be recovered after verification. The lossless authentication and the new image compression standard, JPEG2000 is mainly discussed in this thesis

    Preserving data integrity of encoded medical images: the LAR compression framework

    Get PDF
    International audienceThrough the development of medical imaging systems and their integration into a complete information system, the need for advanced joint coding and network services becomes predominant. PACS (Picture Archiving and Communication System) aims to acquire, store and compress, retrieve, present and distribute medical images. These systems have to be accessible via the Internet or wireless channels. Thus protection processes against transmission errors have to be added to get a powerful joint source-channel coding tool. Moreover, these sensitive data require confidentiality and privacy for both archiving and transmission purposes, leading to use cryptography and data embedding solutions. This chapter introduces data integrity protection and developed dedicated tools of content protection and secure bitstream transmission for medical encoded image purposes. In particular, the LAR image coding method is defined together with advanced securization services
    corecore