Results 1 -
8 of
8
Compression independent object encryption for ensuring privacy in video surveillance
- IEEE International Conference on Multimedia and Expo
, 2008
"... One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting objects ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting objects that reveal identity (e.g., faces or vehicle tags) is necessary to preserve individuals ’ right to privacy. This paper presents a compression algorithm independent solution that provides privacy in video surveillance applications. The proposed approach is based on the use of permutation based encryption to hide identity revealing features. The permutation based encryption tolerates lossy compression and allows decryption at a later time. The use of permutation based encryption makes the proposed solution independent of the compression algorithms used. The paper presents the performance of the system when using H.264 video encoding. Index Terms — video surveillance, compression, privacy, identity, encryption
Format-compliant Encryption of H.264/AVC and SVC
, 2008
"... An encryption approach for H.264/AVC and SVC is proposed. Although the bitstream (format stream) is encrypted with state-of-the-art symmetric ciphers, H.264/AVC and SVC compliance is preserved. Standard compliant encoder/decoder and conventional symmetric ciphers, e.g., in specialized hardware, can ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
An encryption approach for H.264/AVC and SVC is proposed. Although the bitstream (format stream) is encrypted with state-of-the-art symmetric ciphers, H.264/AVC and SVC compliance is preserved. Standard compliant encoder/decoder and conventional symmetric ciphers, e.g., in specialized hardware, can still be employed – a significant advantage compared to previous work. The approach is suitable for a wide range of application scenarios.
A Synopsis of Format-Preserving Encryption
- UNPUBLISHED MANUSCRIPT
, 2010
"... Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of the same format—for example, encrypting a social-security number into a social-security number. In this survey we describe FPE and review known techniques for achieving it. These include FFX, a rece ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of the same format—for example, encrypting a social-security number into a social-security number. In this survey we describe FPE and review known techniques for achieving it. These include FFX, a recent proposal made to NIST.
Business Systems
"... Network friendly media security refers to the security technologies that are specifically designed to cope with existing and future multimedia networking infrastructuresInternational Journal of Enterprise Computing and ..."
Abstract
- Add to MetaCart
(Show Context)
Network friendly media security refers to the security technologies that are specifically designed to cope with existing and future multimedia networking infrastructuresInternational Journal of Enterprise Computing and
A Novel Approach of Digital Video Encryption
"... In the recent years with the development of internet technologies, video technologies have been broadly used in TV, communication and multimedia, So security is required on video data. Although much video encryption technique has been develop but not give so much efficiency in terms of encryption an ..."
Abstract
- Add to MetaCart
(Show Context)
In the recent years with the development of internet technologies, video technologies have been broadly used in TV, communication and multimedia, So security is required on video data. Although much video encryption technique has been develop but not give so much efficiency in terms of encryption and decryption process. However, they are more complex to implement as a system and are difficult to be applied in a widespread manner. Here we propose a new novel scheme for digital video encryption. In this paper we give a method to generate an encrypted video by encrypted Video-frame. Based on novel secure video scheme, an effective and generalized scheme of video encryption. It is a matrix computation scheme which uses a concept of Videoframe and xor(�) operation. This paper proves that proposed scheme is able to fully encrypt the video frame and have a better performance that can be measured by different Parameters. Further we can extend our approach into a digital video stenography.
A Comparative Study of Un-optimized and Optimized Video Steganography
"... Abstract- This paper presents a comparison between un-optimized and optimized video steganography. In today’s world of internet communication, video is considered to be an effective and important tool for communication. Video steganography is a technique of hiding secret information in the video fra ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract- This paper presents a comparison between un-optimized and optimized video steganography. In today’s world of internet communication, video is considered to be an effective and important tool for communication. Video steganography is a technique of hiding secret information in the video frames or the audio beats of the given cover video so that the presence of the secret information is concealed. The un-optimized base technique used in this paper for video steganography is a 3-3-2 LSB based technique. The un-optimized video frames were then optimized using Modified Genetic Algorithm which generated an optimum imperceptibility of hidden data. Peak signal to noise ratio (PSNR), mean square error (MSE) and image fidelity (IF) are the important mathematical measures for analyzing any steganographic technique. In this paper, we have compared all these three parameters for both un-optimized and optimized video steganography. Experimental results show a considerable improvement in these parameters for the optimized video steganographic technique.
Research Article Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
"... Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications ..."
Abstract
- Add to MetaCart
(Show Context)
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discreteHenonmap for (i) generation of dynamic and key-dependent S-box that could be integratedwith symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security. 1.
Review Article Overview on Selective Encryption of Image and Video: Challenges and Perspectives
"... In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, IDEA, etc.). The specific characteristics of this kind of data (high-transmission rate with ..."
Abstract
- Add to MetaCart
(Show Context)
In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, IDEA, etc.). The specific characteristics of this kind of data (high-transmission rate with limited bandwidth) make standard encryption algorithms inadequate. Another limitation of fully layered systems consists of altering the whole bitstream syntax which may disable some codec functionalities. Selective encryption is a new trend in image and video content protection. It consists of encrypting only a subset of the data. The aim of selective encryption is to reduce the amount of data to encrypt while preserving a sufficient level of security. This computation saving is very desirable especially in constrained communications (real-time networking, high-definition delivery, and mobile communications with limited computational power devices). In addition, selective encryption allows preserving some codec functionalities such as scalability. This tutorial is intended to give an overview on selective encryption algorithms. The theoretical background of selective encryption, potential applications, challenges, and perspectives is presented. Copyright © 2008 A. Massoudi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 1.