553 research outputs found

    Mikey for Keys Management of H.264 Scalable Video Coded Layers

    Get PDF
    The paper investigates the problem of managing multiple encryption keys generation overhead issues in scalable video coding (H.264/SVC) and proposes a hierarchical top down keys generation and distribution system by using a standard key management protocol MIKEY (Multimedia Internet Keying Protocol). The research goal is two-fold; (1) prevention of information leakage by the selective encryption of network abstraction layer (NAL) units with AES-CTR block cipher algorithm, and (2) reduction of multiple layer encryption keys overhead for scalable video distribution. We combine a MIKEY with the digital rights management (DRM) techniques to derive a mechanism in which every entitled user of each layer has only one encryption key to use, but this key will transparently open the doors of all layers below. The timing results are calculated for the encryption/decryption and the key generation processes relative to encoding/decoding time of test video files, which are noticeably negligible. The scheme is enormously suitable for video distribution to users who have subscribed to various video qualities regarding their desire or constraints on their devices and helps in preventing the loss of revenue of paid services

    Molecular basis of arsenite (As+3)-induced acute cytotoxicity in human cervical epithelial carcinoma cells

    Get PDF
    Background: Rapid industrialization is discharging toxic heavy metals into the environment, disturbing human health in many ways and causing various neurologic, cardiovascular, and dermatologic abnormalities and certain types of cancer. The presence of arsenic in drinking water from different urban and rural areas of the major cities of Pakistan, for example, Lahore, Faisalabad, and Kasur, was found to be beyond the permissible limit of 10 parts per billion set by the World Health Organization. Therefore the present study was initiated to examine the effects of arsenite (As+3) on DNA biosynthesis and cell death.Methods: After performing cytotoxic assays on a human epithelial carcinoma cell line, expression analysis was done by quantitative polymerase chain reaction, western blotting, and flow cytometry.Results: We show that As+3 ions have a dose- and time-dependent cytotoxic effect through the activation of the caspase-dependent apoptotic pathway. In contrast to previous research, the present study was designed to explore the early cytotoxic effects produced in human cells during exposure to heavy dosage of As+3 (7.5 Îźg/ml). Even treatment for 1 h significantly increased the mRNA levels of p21 and p27 and caspases 3, 7, and 9. It was interesting that there was no change in the expression levels of p53, which plays an important role in G2/M phase cell cycle arrest.Conclusion: Our results indicate that sudden exposure of cells to arsenite (As+3) resulted in cytotoxicity and mitochondrial-mediated apoptosis resulting from up-regulation of caspases.Keywords: apoptosis; epithelial carcinoma; cytotoxicity; arsenite; caspases; Pakistan Responsible Editor: Amin Bredan, VIB Inflammation Research Center & Ghent University, Belgium

    Towards Estimation of Emotions From Eye Pupillometry With Low-Cost Devices

    Get PDF
    Emotional care is important for some patients and their caregivers. Within a clinical or home care situation, technology can be employed to remotely monitor the emotional response of such people. This paper considers pupillometry as a non-invasive way of classifying an individual's emotions. Standardized audio signals were used to emotionally stimulate the test subjects. Eye pupil images of up to 32 subjects of different genders were captured as video images by low-cost, infrared, Raspberry Pi board cameras. By processing of the images, a dataset of pupil diameters according to gender and age characteristics was established. Appropriate statistical tests for inference of the emotional state were applied to that dataset to establish the subjects' emotional states in response to the audio stimuli. Results showed agreement between the test subjects' opinions of their emotional state and the classification of emotions according to the range of pupil diameters found using the described method

    SLEPX: An Efficient Lightweight Cipher for Visual Protection of Scalable HEVC Extension

    Get PDF
    This paper proposes a lightweight cipher scheme aimed at the scalable extension of the High Efficiency Video Coding (HEVC) codec, referred to as the Scalable HEVC (SHVC) standard. This stream cipher, Symmetric Cipher for Lightweight Encryption based on Permutation and EXlusive OR (SLEPX), applies Selective Encryption (SE) over suitable coding syntax elements in the SHVC layers. This is achieved minimal computational complexity and delay. The algorithm also conserves most SHVC functionalities, i.e. preservation of bit-length, decoder format-compliance, and error resilience. For comparative analysis, results were taken and compared with other state-of-art ciphers i.e. Exclusive-OR (XOR) and the Advanced Encryption Standard (AES). The performance of SLEPX is also compared with existing video SE solutions to confirm the efficiency of the adopted scheme. The experimental results demonstrate that SLEPX is as secure as AES in terms of visual protection, while computationally efficient comparable with a basic XOR cipher. Visual quality assessment, security analysis and extensive cryptanalysis (based on numerical values of selected binstrings) also showed the effectiveness of SLEPX’s visual protection scheme for SHVC compared to previously-employed cryptographic technique

    Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing

    Get PDF
    Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. Similarly, video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. This article presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos by means of hashing and steganography. The method conforms to the data protection regulations, which are increasingly adopted by governments, and is applicable to network edge storage. Encryption keys are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored steganographically within video frames themselves, independently of the content. Added protection is provided by hiding information within the two least-valued of pixel bitplanes, using a newly introduced technique that randomizes the pixel storage locations on a per video frame and video-capture device basis. Overall, the proposed method has turned out to not only preserve the integrity of stored video data but also results in minimal degradation of the video data resulting from steganography. Despite the inclusion of hidden information, video frames will still be available for common image-processing tasks such as tracking and classification, as their objective video quality is almost unchanged

    MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos

    Get PDF
    Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, which must be privacy protected, sometimes along with the locations of the surveillance and other sensitive information. Within the Surveillance System, these videos are processed and stored on a variety of devices. The processing and storage heterogeneity of those devices, together with their network requirements, make real-time surveillance systems complex and challenging. This paper proposes a surveillance system, named as Multi-Level Video Security (MuLViS) for privacy-protected cameras. Firstly, a Smart Surveillance Security Ontology (SSSO) is integrated within the MuLViS, with the aim of autonomously selecting the privacy level matching the operating device's hardware specifications and network capabilities. Overall, along with its device-specific security, the system leads to relatively fast indexing and retrieval of surveillance video. Secondly, information within the videos are protected at the times of capturing, streaming, and storage by means of differing encryption levels. An extensive evaluation of the system, through visual inspection and statistical analysis of experimental video results, such as by the Encryption Space Ratio (ESR), has demonstrated the aptness of the security level assignments. The system is suitable for surveillance footage protection, which can be made General Data Protection Regulation (GDPR) compliant, ensuring that lawful data access respects individuals' privacy rights

    Post-Transcriptional Regulation of BCL2 mRNA by the RNA-Binding Protein ZFP36L1 in Malignant B Cells

    Get PDF
    The human ZFP36 zinc finger protein family consists of ZFP36, ZFP36L1, and ZFP36L2. These proteins regulate various cellular processes, including cell apoptosis, by binding to adenine uridine rich elements in the 3′ untranslated regions of sets of target mRNAs to promote their degradation. The pro-apoptotic and other functions of ZFP36 family members have been implicated in the pathogenesis of lymphoid malignancies. To identify candidate mRNAs that are targeted in the pro-apoptotic response by ZFP36L1, we reverse-engineered a gene regulatory network for all three ZFP36 family members using the ‘maximum information coefficient’ (MIC) for target gene inference on a large microarray gene expression dataset representing cells of diverse histological origin. Of the three inferred ZFP36L1 mRNA targets that were identified, we focussed on experimental validation of mRNA for the pro-survival protein, BCL2, as a target for ZFP36L1. RNA electrophoretic mobility shift assay experiments revealed that ZFP36L1 interacted with the BCL2 adenine uridine rich element. In murine BCL1 leukemia cells stably transduced with a ZFP36L1 ShRNA lentiviral construct, BCL2 mRNA degradation was significantly delayed compared to control lentiviral expressing cells and ZFP36L1 knockdown in different cell types (BCL1, ACHN, Ramos), resulted in increased levels of BCL2 mRNA levels compared to control cells. 3′ untranslated region luciferase reporter assays in HEK293T cells showed that wild type but not zinc finger mutant ZFP36L1 protein was able to downregulate a BCL2 construct containing the BCL2 adenine uridine rich element and removal of the adenine uridine rich core from the BCL2 3′ untranslated region in the reporter construct significantly reduced the ability of ZFP36L1 to mediate this effect. Taken together, our data are consistent with ZFP36L1 interacting with and mediating degradation of BCL2 mRNA as an important target through which ZFP36L1 mediates its pro-apoptotic effects in malignant B-cells

    Performance of CMS muon reconstruction in pp collision events at sqrt(s) = 7 TeV

    Get PDF
    The performance of muon reconstruction, identification, and triggering in CMS has been studied using 40 inverse picobarns of data collected in pp collisions at sqrt(s) = 7 TeV at the LHC in 2010. A few benchmark sets of selection criteria covering a wide range of physics analysis needs have been examined. For all considered selections, the efficiency to reconstruct and identify a muon with a transverse momentum pT larger than a few GeV is above 95% over the whole region of pseudorapidity covered by the CMS muon system, abs(eta) < 2.4, while the probability to misidentify a hadron as a muon is well below 1%. The efficiency to trigger on single muons with pT above a few GeV is higher than 90% over the full eta range, and typically substantially better. The overall momentum scale is measured to a precision of 0.2% with muons from Z decays. The transverse momentum resolution varies from 1% to 6% depending on pseudorapidity for muons with pT below 100 GeV and, using cosmic rays, it is shown to be better than 10% in the central region up to pT = 1 TeV. Observed distributions of all quantities are well reproduced by the Monte Carlo simulation.Comment: Replaced with published version. Added journal reference and DO

    Performance of CMS muon reconstruction in pp collision events at sqrt(s) = 7 TeV

    Get PDF
    The performance of muon reconstruction, identification, and triggering in CMS has been studied using 40 inverse picobarns of data collected in pp collisions at sqrt(s) = 7 TeV at the LHC in 2010. A few benchmark sets of selection criteria covering a wide range of physics analysis needs have been examined. For all considered selections, the efficiency to reconstruct and identify a muon with a transverse momentum pT larger than a few GeV is above 95% over the whole region of pseudorapidity covered by the CMS muon system, abs(eta) < 2.4, while the probability to misidentify a hadron as a muon is well below 1%. The efficiency to trigger on single muons with pT above a few GeV is higher than 90% over the full eta range, and typically substantially better. The overall momentum scale is measured to a precision of 0.2% with muons from Z decays. The transverse momentum resolution varies from 1% to 6% depending on pseudorapidity for muons with pT below 100 GeV and, using cosmic rays, it is shown to be better than 10% in the central region up to pT = 1 TeV. Observed distributions of all quantities are well reproduced by the Monte Carlo simulation.Comment: Replaced with published version. Added journal reference and DO
    • …
    corecore