ABSTRACT
In this paper, address the problem of encryption/decryption regions of interest in a video sequence for the purpose of security in video data. The proposed an efficient solution based on 3D encryption/decryption based. More specifically the videos files breaks different frames as 2D based digital images, after 2D based images encrypt/decrypt by the 2D generalized algorithms. The simulation results show that the mechanism can be successfully applied to obscure information in regions of the interest in the scene which provides the different level of security. Further, the keys values are flexible and allow choosing different types for security purpose.
- Bin B. Zhu, Mitchell D. Swanson and Shipeng Li, "Encryption and authentication for scalable multimedia: Current state of the art and challenges," in Proceedings SPIE International Symposium Information Technology & Communication Philadelphia, PA USA, pp. 157--170, 2004.Google Scholar
- Borko Furht, Daniel Socek, Ahmet M. Eskicioglu "Fundamentals of Multimedia Encryption Techniques" Department of Computer and Information Science Brooklyn College of the City University of New York 2900 Bedford Avenue, Brooklyn, NY 11210, USA 2004.Google Scholar
- Dah-Jyh Guan, "Generalized Gray Code with applications," Proc. Natl.Sci. Counc. ROC (A), vol. 22, pp. 841--848, 1998.Google Scholar
- Darko Kirovski Borko Furht, "Multimedia Security Handbook": CRC, Press LLC in December 2004. Google ScholarDigital Library
- Eric Wharton1, Karen Panetta, and Sos Agaian "Simultaneous Encryption/Compression of Images Using Alpha Rooting" in IEEE 2008.Google Scholar
- Frederic Dufaux and Touradj Ebrahimi, "Scrambling for Video Surveillance with Privacy," in Conference on Computer Vision and Pattern Recognition Workshop, New York City, pp. 160--160 IEEE 2006. Google ScholarDigital Library
- K. Jaya Sankar, V. M. Pandharipande and P. S. Moharir, "Generalized Gray Codes," in ISPACS 2004. Proceedings of 2004 International Symposium on, pp. 654--659 IEEE 2004.Google Scholar
- Klara Nahrstedt, Jana Dittmnn, Petra Wohlmacher "Approaches to Multimedia and Security" U. S. A 0-7803-6536-4/00(c) IEEE 2000.Google Scholar
- Paul Mecklenburg, William K. Pehlert, Daniel D. Sullivan "Correction of Errors in Multilevel Gray-Coded Data" IEEE Transaction on Information Theory, VOL. IT-19, NO. 3, May 1973.Google Scholar
- Rajkumar gaur, suneeta agrwal "New Generalized P-Gray Code Based Algorithms for Multimedia Security" enc2sp, IEEE Bangalore(India) 2009Google Scholar
- Wenjun Zeng and Shawmin Lei, "Efficient frequency domain selective scrambling of digital video," IEEE transaction on multimedia, vol. 5, pp. 118--129, 2003. Google ScholarDigital Library
- Xiliang Liu and Ahmet M. Eskicioglu, "Selective encryption of multimedia content in distribution networks: Challenges and new directions," in Second IASTED International Conference on Communications, Internet and Information Technology Scottsdale, AZ, USA, pp. 527--533, 2003.Google Scholar
- Yicong Zhou, Karen Panetta "Partial Multimedia Encryption with Different Security Levels" 978-1-4244-1978-4/08/IEEE 2008.Google Scholar
- Yicong Zhou, Karen Panetta and Sos Agaian, "P-recursive sequence and key-dependent multimedia scrambling," in Mobile Multimedia/Image Processing for Military and Security Applications, SPIE Defence and Security Symposium Orlando, FL USA 2008.Google Scholar
- Z. Bojkovi C, D. Milovanovic "Mu1timedia Contents security: Watermarking Diversity and Secure Protocols" IEEE 2003.Google Scholar
- Zhaoyu Liu, Yuliang Zheng, Edd Hauser, Jeffrey Liu and E. Winters Mabry, "Secure Internetworking Video Surveillance for DHS Protection Mission," in the Department of Homeland Security Conference- Working Together: Research & Development (R&D) Partnerships in Homeland Security, Boston, MA, USA, 2005.Google Scholar
- Zhou Wang, Alan C. Bovik, Hamid R. Sheikh, and Eero P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity" ieee transactions on image processing, vol. 13, no. 4, april 2004. Google ScholarDigital Library
Index Terms
- Security in real time multimedia data based on generalized keys
Recommendations
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityChu et al. (ASIACCS 2012) proposed group signature with time-bound keys (GS-TBK) where each signing key is associated to an expiry time τ. In addition to prove the membership of the group, a signer needs to prove that the expiry time has not passed, ...
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of the sender to any third party if the sender repudiates her signature later. ...
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security
Theory of CryptographyAbstractAn important theme in the research on attribute-based encryption (ABE) is minimizing the sizes of secret keys and ciphertexts. In this work, we present two new ABE schemes with constant-size secret keys, i.e., the key size is independent of the ...
Comments