1. Introduction
Conventional cryptographic algorithms, which are generally aimed at encrypting like text data (known as Naïve approach) not well suited for video encryption. This is due to the fact that conventional cryptographic algorithms cannot process the large volume of video data in real-time. Selective encryption of the H.264/AVC bitstream puts decoder to fully decode the encrypted video with degradation in video quality. This perceptual encryption has low encryption and decryption time. The video data are compressed to reduce the storage space required and to save bandwidth for transmission. Video compression removes redundancy, so that it is difficult to guess about a portion of a compressed bitstream to another. In addition, decompression algorithms depend upon some part of the syntax of compression than other for reconstruction. The combination of these properties suggests selective encryption, the idea that a compressed bitstream can be adequately secured from attackers with only part of the bitstream encrypted. The reduction of the fraction of encryption can help to reduce the overall complexity of the application leading to reduced encryption and decryption time. Selective encryption has been suggested for a number of specific real time applications [1, 2]. The survey given by F. Liu and H. Koenig [2], shows that almost all proposed selective video encryption algorithms have a relatively low security level. After that, Shahid et al. proposed encrypting non-zero quantized coefficients by using permutation of codes with the same level_suffix length for CAVLC in H.264/AVC [3]. Compared to encrypting sign bits of non-zero coefficients, this method encrypts higher bits, which seems to provide better scrambling effect and ...
... middle of paper ...
...7/s11042-007-0150-7.
[6] S. Lian, X. Chen, Secure and traceable multimedia distribution for convergent mobile TV services, Computer Communications 33 (14) (2010) 1664-1673. doi:10.1016/j.comcom.2010.03.015.
[7] B. Bhargava, C. Shi, S.-Y. Wang, MPEG video encryption algorithms, Multimedia Tools and Applications 24 (1) (2004), 57-79. doi:10.1023/B:MTAP.0000033983.62130.00.
[8] A. Boho, G. Van Wallendael, A. Dooms, J. De Cock, G. Braeckman, P. Schelkens, B. Preneel, R. Van de Walle, End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation, Signal Processing Magazine, IEEE 30 (2) (2013), 97-107. doi:10.1109/MSP.2012.2230220.
[9] L. Varlakshmi, G. Sudha, G. Jaikishan, An efficient scalable video encryption scheme for real time applications, Procedia Engineering 30 (0) (2012), 852 - 860. doi:10.1016/j.proeng.2012.01.937.
CCTV which means closed circuit television, this is a system utilizes cameras to provide security by sending specific signal to destination, were it is used surveillance and observation of a place or people. In this paper I will seek to analyze how CCTV can be used as a comprehensive security solution by show the roles that a CCTV system would have to fulfill before it can be considered or viewed as a comprehensive security solution. These roles include deterrence, detection, delaying, assessment and response I will briefly explain each and give example. I will then move to explain how CCTV aids in the prevention and reduction of crime, by look at a reach and how the effect of CCTV in parking lots and other public places. I will also illustrate how CCTV can assist Law enforcement and other security practitioners in their investigations. Readers will be given short synapse of the different types of cameras and systems that are available, and examples of how they can be used and utilized. Last but not least I shall speak about the down side and concerns that come with having a CCTV system. This will be done by showing how the cost may affect the whole system, as it will take a good some of money to install, maintain and monitor the CCTV systems. Afterwards I will elaborate on one of the public major concern, which is surveillance system being intrusive and impeding on their right to privacy. The last concern that I shall discuss is the threat of hacker to CCTV system.
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
By using my project one data file is converted into multimedia file of image video and audio file by cryptography and steganography. This is the most valid point in my project to accomplish the best results and this is my contribution to the field. The data of my system is collecting from different standards of cryptanalysis and used to validation of my project.
The idea of cryptography has been in existence since 1900 BC with the use of inscriptions on the tomb of Khnumhotep II, in Egypt (Red Hat). Ever since that time, the uses and methods have changed, but the overall idea of transferring information in a secret and efficient manner has been the driving force for faster and safer data transfer. This paper will define cryptography, discuss its long history, current trends and the future of the complex electronic security technology.
These peer-to-peer file-sharing systems have changed the way we think about sharing data over the Net and their success can be attributed to a number of factors. Firstly, these file-sharing systems have simple implementations that make them accessible to regular people. Not only is downloading a file using these systems simple, but uploading one is easy as well. Separate programs need not be used, and the process is often invisible to the user[5]. Further, because these systems are often used with media files such as MP3s, the same data exists on a number of different accessible computers. Because of this redundancy, accessing this data becomes reliable. In addition, because of the type of content that is being shared, a trust relationship is not required between the provider of the data and the person accessing it - there is little to no consequence to receiving a corrupted media file[6].
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Encryption has a very long history,1 which can be traced back to about 1900 B.C. Cryptography was first used in the form of hieroglyphic inscription by an ...
The task would not be easy due to the drastic changes in that industry during the 90’s. The two companies bet all their funds and based all their future wealth on two different alternatives. Nevertheless, these two alternatives were analogue based technologies that have been replaced rapidly in 1996 by the most cheap and higher quality digital satellite broadcasting with its standard known as DVB . The latter technology allows scrambling of the signals, stereo sounds and wide screen support. A lot of scrambling system has appeared during this period. The most secure one remains the Videoguard NDS system developed by an Israeli firm for BSkyB.
In this paper focus is on the implementation of lossless image data codec, when the input image data is encry
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
This system embeds varying number of bits in each wavelet coefficicient according to a hiding capacity function so as to maximize the hiding capacity without sacrificing the visual quality of resulting stego image. The system also minimizes the difference between original coefficients values and modified values by using the optimum pixel adjustment algorithm. Experiments and the achieved results showed that this system achieve high hiding capacity up to 48% of the cover image size with sound image quality and high security because of using random insertion of the secret message. But the system suffers from low robustness against various attacks like histogram equalization and JPEG
The protection of data being transferred between ATMs and the bank, and the use of cell phones is the most common everyday encounter with encryption. To encrypt and decrypt information a cipher is used. In a cipher there is a set of well-defined steps that can be followed to encrypt and decrypt messages. The use of a cipher relies greatly on the use of an encryption key. The key may contain any auxiliary information added to the cipher to produce certain
Due to growth of multimedia application, security becomes an important issue of communication and storage of images.Encryption is one of the ways to ensure high securityImages are used in many fields such as medical science, military; they are stored or transfer through network, security of such image data is important.This work proposes a novel scheme for the security of such images by the method of separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted imageusing a data-hiding key to create a sparse space to accommodate some additionaldata.With an encrypted image containing additional data, if a receiverhas the data-hiding key, he can extract the additional data thoughhe does not know the image content. If the receiver has the encryption key,he can decrypt the received data to obtain an image similar to the originalone, but cannot extract the additional data. If the receiver has both thedata-hiding key and the encryption key, he can extract the additional dataand recover the original content without any error by exploiting the spatialcorrelation in natural image when the amount of additional data is not toolarge.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Cryptography is the use of codes and ciphers to protect secrets and has been around for centuries. It has its beginnings in ancient Egypt and has played a role in every part of history to its current role in protecting communications across today’s computer networks.