952 research outputs found

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh

    Get PDF
    Due to the huge growth in communication and digital technologies in support of multimedia sharing, video security has recently attracted the attention of researchers. Since video data representation takes up a large amount of data, it has to be minimized before being transmitted through the channels. To do so, that data has to be subjected to a compression process. This process is performed according to the video coding standard (video compression). There have been different types of video coding standards, but High Efficiency Video Coding (HEVC) is the latest video coding standard being introduced. Whereas, in the field of video security, there are several types of encryption algorithms utilized by researchers, such as Rivest- Shamir-Adleman (RSA), Data Encryption Standard (DES) and Advanced Encryption Standard (AES). All of those encryption algorithms are classified as asymmetric and symmetric algorithms. Since the video data is still huge even after the compression process, most researchers apply their encryption approaches on a selective part of the video data whereas the compression process is performed by a different type of coding standard. Most of the existing video encryption methods are not adequate to secure the video contents against the modern security attacks and eavesdropping. Furthermore, those methods have become impractical especially for the video sharing through the internet using the new coding standard HEVC because of the limited resources on the devices

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh

    Get PDF
    Due to the huge growth in communication and digital technologies in support of multimedia sharing, video security has recently attracted the attention of researchers. Since video data representation takes up a large amount of data, it has to be minimized before being transmitted through the channels. To do so, that data has to be subjected to a compression process. This process is performed according to the video coding standard (video compression). There have been different types of video coding standards, but High Efficiency Video Coding (HEVC) is the latest video coding standard being introduced. Whereas, in the field of video security, there are several types of encryption algorithms utilized by researchers, such as Rivest-Shamir-Adleman (RSA), Data Encryption Standard (DES) and Advanced Encryption Standard (AES). All of those encryption algorithms are classified as asymmetric and symmetric algorithms. Since the video data is still huge even after the compression process, most researchers apply their encryption approaches on a selective part of the video data whereas the compression process is performed by a different type of coding standard. Most of the existing video encryption methods are not adequate to secure the video contents against the modem security attacks and eavesdropping. Furthermore, those methods have become impractical especially for the video sharing through the internet using the new coding standard HEVC because of the limited resources on the devices. Wherein those approaches have fallen into some limitations, such as low-security level, high computational overhead, not maintaining the bitstream compliance and result in the increase of video bitrate. In this thesis, three lightweight selective encryption approaches have been developed to provide a visual video and moving objects protection of HEVC bitstream that can be utilized for real-time video streaming, while maintaining the computational cost and video bit rate. Those approaches named as, Encryption for Absolute Coefficient Level, Encryption of Intra Prediction Mode, and Encryption of Motion Vector Difference (MVD). In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. Whereas the third method is dedicated to secure the moving object information in the video by exploiting the syntax element of motion vector difference, and this method is encrypted by AES as well. The experimental results for the first and the second of the proposed approaches has shown that a reliable security level of visual video perception was provided, in addition to having no observed effects on compression efficiency. Furthermore, from the test results of the third method, the moving objects information was encrypted and at the same time, the compression efficiency was maintained. The proposed schemes provide a trade-off between encryption reliability, flexibility, and computational complexity, where the encryption time in the first scheme increased by 13% and zero in the second and the third schemes, and the increase in bitrate is 1% in the first and the third schemes and zero in the second scheme. Thus, these methods can be considered as feasible techniques to secure the HEVC/H.265 bitstream, and can be applied in real-time applications

    Measuring the service quality factors of perspective international students to improve their satisfaction and loyalty towards University Tun Hussein Onn Malaysia (UTHM)

    Get PDF
    Student satisfaction and quality of education are of compelling interest to students, academic staff, policymakers and higher education researchers internationally. Students’ expectations can influence levels of student satisfaction before their study and their pre-conceived beliefs regarding the value of their education. It concerns that with less emphasis on the quality of services that provided by the Higher Education Institution (HEI) to the students may pose a threat regarding the satisfaction, retention and recruitment of the students which reduces the competitiveness of the institution. This study seeks to measure the service quality success factors through the perspective of international students to improve their satisfaction and loyalty towards University Tun Hussein Onn Malaysia. A questionnaire survey was carried out among international students in UTHM. A total of 246 questionnaires were collected and found valid. Analysis of Moment Structures Equation Modelling (AMOS-SEM) model was developed and found that seven groups of factors for service quality influences the satisfaction and loyalty towards UTHM, these factors are namely teaching, course content and supervision; administrative services; academic facilities; campus infrastructure; support services; student’s satisfaction and student’s loyalty. The findings from the critical factors of service quality through path analysis using structural model indicated that administrative services; academic facilities and support services have a significant effect on student's satisfaction, and student's satisfaction has a significant impact on student's loyalty while teaching, course content and supervision; and campus infrastructure groups were not supported. The implication of this research could enhance and further strengthen UTHM structures and creating new output as an adaptable strategy and education management tool

    Actual evapotranspiration evaluation based on multi-sensed data

    Get PDF
    The importance of active and passive remote sensing data integration appears strongly on cloudy days. The lack of passive remote sensing data on cloudy days prevents the benefit of large-scale satellite data in cloudy areas, while the advantage of active remote sensing, it could penetrate the cloud and collect data underneath the cloud. The main objective of this paper is to determine the benefits of combining active and passive remote sensing data to detect actual evapotranspiration (ETa). Sentinel-1 radar data represents active data, while Landsat-8 represents passive data. Multi-date data for Landsat-8 and Sentinel-1 were used during the 2016 summer season. The characteristic soil texture in the study region is clay. The meteorological data were used to estimate ETo based on the FAO-Penman-Monteith (FPM) process, while the Lysimeter data were used to test the estimated ETa. Landsat-8 data are used to measure the Normalized Difference Vegetation Index (NDVI) and the Crop Water Stress Index (CWSI). Crop Coefficient (Kc) is calculated on the basis of NDVI. The CWSI, Kc, and ETo were then used to determine ETa. Backscattering (dB) C-band Synthetic Aperture Radar (SAR) data extracted from the Sentinel-1 satellite was correlated with Kc and used to estimate ETa. The Root Mean Square Error (RMSE) reported relevant results for active and passive satellite data separately and the combination process. For Sentinel-1, Landsat-8 and combination methods, the RMSE reported 0.89, 0.24, and 0.31 (mm/day) respectively

    A short survey on next generation 5G wireless networks

    Get PDF
    Current 4G - the fourth-generation wireless communication, which exists in most countries, represents an advance of the previous 3 generation wireless communication. However, there are some challenges and limitations, associated with an explosion of wireless devices, which cannot be accommodated by 4G. Increasing the proliferation of smart devices, the development of new multimedia applications, and the growing demand for high data rates are among the main problems of the existing 4G system. As a solution, the wireless system designers have started research on the fifth-generation wireless systems. 5G will be the paradigm shift that could provide with ultra-high data rate, low latency, an increase of the base station capacity, and the improved quality of services. This paper is a review of the changes through the evolution of existing cellular networks toward 5G.  It represented a comprehensive study associated with 5G, requirements for 5G, its advantages, and challenges. We will explain the architecture changes – radio access network (RAN), air interfaces, smart antennas, cloud RAN, and HetNet. Furthermore, it discussed physical layer technologies, which include new channel modes estimation, new antenna design, and MIMO technologies. Also, it discussed MAC layer protocols. The article included three kinds of technologies: heterogeneous networks, massive multiple-input and output, and millimeter-wave. Finally, it explained the applications, supported by 5G, new features, various possibilities, and predictions

    Detour Polynomials of Generalized Vertex Identified of Graphs

    Get PDF
    تعد مسافة الالتفاف من أهم أنواع المسافات التي لها تطبيقات حديثة في الكيمياء وشبكات الكمبيوتر، لذلك حصلنا في هذا البحث على متعددات حدود الالتفاف وأدلتها لـ  nمن البيانات المنفصلة عن بعضها البعض بالنسبة للرؤوس ، n≥3. أيضًا وجدنا متعددات حدود الالتفاف وأدلتها لبعض البيانات الخاصة والتي لها تطبيقات مهمة في الكيمياء.The Detour distance is one of the most common distance types used in chemistry and computer networks today. Therefore, in this paper, the detour polynomials and detour indices of vertices identified of n-graphs which are connected to themselves and separated from each other with respect to the vertices for n≥3 will be obtained. Also, polynomials detour and detour indices will be found for another graphs which have important applications in Chemistry.
    corecore