1. Introduction
Conventional cryptographic algorithms, which are generally aimed at encrypting like text data (known as Naïve approach) not well suited for video encryption. This is due to the fact that conventional cryptographic algorithms cannot process the large volume of video data in real-time. Selective encryption of the H.264/AVC bitstream puts decoder to fully decode the encrypted video with degradation in video quality. This perceptual encryption has low encryption and decryption time. The video data are compressed to reduce the storage space required and to save bandwidth for transmission. Video compression removes redundancy, so that it is difficult to guess about a portion of a compressed bitstream to another. In addition, decompression algorithms depend upon some part of the syntax of compression than other for reconstruction. The combination of these properties suggests selective encryption, the idea that a compressed bitstream can be adequately secured from attackers with only part of the bitstream encrypted. The reduction of the fraction of encryption can help to reduce the overall complexity of the application leading to reduced encryption and decryption time. Selective encryption has been suggested for a number of specific real time applications [1, 2]. The survey given by F. Liu and H. Koenig [2], shows that almost all proposed selective video encryption algorithms have a relatively low security level. After that, Shahid et al. proposed encrypting non-zero quantized coefficients by using permutation of codes with the same level_suffix length for CAVLC in H.264/AVC [3]. Compared to encrypting sign bits of non-zero coefficients, this method encrypts higher bits, which seems to provide better scrambling effect and ...
... middle of paper ...
...7/s11042-007-0150-7.
[6] S. Lian, X. Chen, Secure and traceable multimedia distribution for convergent mobile TV services, Computer Communications 33 (14) (2010) 1664-1673. doi:10.1016/j.comcom.2010.03.015.
[7] B. Bhargava, C. Shi, S.-Y. Wang, MPEG video encryption algorithms, Multimedia Tools and Applications 24 (1) (2004), 57-79. doi:10.1023/B:MTAP.0000033983.62130.00.
[8] A. Boho, G. Van Wallendael, A. Dooms, J. De Cock, G. Braeckman, P. Schelkens, B. Preneel, R. Van de Walle, End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation, Signal Processing Magazine, IEEE 30 (2) (2013), 97-107. doi:10.1109/MSP.2012.2230220.
[9] L. Varlakshmi, G. Sudha, G. Jaikishan, An efficient scalable video encryption scheme for real time applications, Procedia Engineering 30 (0) (2012), 852 - 860. doi:10.1016/j.proeng.2012.01.937.
M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proceedings of the IEEE
Technological development in digital wallets continue to fascinate the world and offer to make the Bitcoin environment more secure for users. One of the latest innovation in digital wallet promises to keep users’ private access keys secure as encrypted audio. The encrypted login key is converted into
Created by Philip Zimmermann in 1991, this program has been widely used throughout the global computer community to protect the confidentiality and integrity of the users’ data, giving them the privacy of delivering messages and files only to their intended individual or authorized person (Singh, 2012). Not only being useful for individuals as a privacy-ensuring program, it has also been used in many corporations to protect their company’s data from falling into the wrong hands (Rouse, 2005).
A TV signal is captured by a camera and then manipulated during program production. At this point the video must be at its highest quality and full bandwidth for recording, editing and special effects purposes. Then the TV signal needs to be compressed for economical transmission and storage. The possible efficiency of compression depends on a couple of factors. If a signal will be further edited and manipulated in the receiving studio it must maintain a relatively high quality and therefore can’t be compressed as much as a signal that will be sent directly to the viewer’s TV set. Also, the extent to which a signal can be successfully compressed depends on the type of program (E.g. movies can be compressed more than sports). Nevertheless, a typical program mix will fit up to 10 digital television channels on one transmission line.
CCTV which means closed circuit television, this is a system utilizes cameras to provide security by sending specific signal to destination, were it is used surveillance and observation of a place or people. In this paper I will seek to analyze how CCTV can be used as a comprehensive security solution by show the roles that a CCTV system would have to fulfill before it can be considered or viewed as a comprehensive security solution. These roles include deterrence, detection, delaying, assessment and response I will briefly explain each and give example. I will then move to explain how CCTV aids in the prevention and reduction of crime, by look at a reach and how the effect of CCTV in parking lots and other public places. I will also illustrate how CCTV can assist Law enforcement and other security practitioners in their investigations. Readers will be given short synapse of the different types of cameras and systems that are available, and examples of how they can be used and utilized. Last but not least I shall speak about the down side and concerns that come with having a CCTV system. This will be done by showing how the cost may affect the whole system, as it will take a good some of money to install, maintain and monitor the CCTV systems. Afterwards I will elaborate on one of the public major concern, which is surveillance system being intrusive and impeding on their right to privacy. The last concern that I shall discuss is the threat of hacker to CCTV system.
The history of the modern media surveillance systems begins first with the invention of the computer and the use of software. Before the internet, information was only transported between computers by a physical storage device or an extremely expensive network. Software for media surveillance was only used to scan the media that was available in data form for particular key words. It could then be stored and indexed to be later analyzed. (Sarlós, 1982)
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
Due to the sensitive and confidential information that would exist on such devices, it is imperative that security solutions and processes are implemented in order to protect and secure such content from the proliferation of threats and vulnerabilities which can affect mobile devices (Juniper Networks, n.d.).
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
Cryptography is the use of codes and ciphers to protect secrets and has been around for centuries. It has its beginnings in ancient Egypt and has played a role in every part of history to its current role in protecting communications across today’s computer networks.
The protection of data being transferred between ATMs and the bank, and the use of cell phones is the most common everyday encounter with encryption. To encrypt and decrypt information a cipher is used. In a cipher there is a set of well-defined steps that can be followed to encrypt and decrypt messages. The use of a cipher relies greatly on the use of an encryption key. The key may contain any auxiliary information added to the cipher to produce certain
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.