skip to main content
10.1145/2007052.2007071acmconferencesArticle/Chapter ViewAbstractPublication PagesacaiConference Proceedingsconference-collections
research-article

Security in real time multimedia data based on generalized keys

Published:21 July 2011Publication History

ABSTRACT

In this paper, address the problem of encryption/decryption regions of interest in a video sequence for the purpose of security in video data. The proposed an efficient solution based on 3D encryption/decryption based. More specifically the videos files breaks different frames as 2D based digital images, after 2D based images encrypt/decrypt by the 2D generalized algorithms. The simulation results show that the mechanism can be successfully applied to obscure information in regions of the interest in the scene which provides the different level of security. Further, the keys values are flexible and allow choosing different types for security purpose.

References

  1. Bin B. Zhu, Mitchell D. Swanson and Shipeng Li, "Encryption and authentication for scalable multimedia: Current state of the art and challenges," in Proceedings SPIE International Symposium Information Technology & Communication Philadelphia, PA USA, pp. 157--170, 2004.Google ScholarGoogle Scholar
  2. Borko Furht, Daniel Socek, Ahmet M. Eskicioglu "Fundamentals of Multimedia Encryption Techniques" Department of Computer and Information Science Brooklyn College of the City University of New York 2900 Bedford Avenue, Brooklyn, NY 11210, USA 2004.Google ScholarGoogle Scholar
  3. Dah-Jyh Guan, "Generalized Gray Code with applications," Proc. Natl.Sci. Counc. ROC (A), vol. 22, pp. 841--848, 1998.Google ScholarGoogle Scholar
  4. Darko Kirovski Borko Furht, "Multimedia Security Handbook": CRC, Press LLC in December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Eric Wharton1, Karen Panetta, and Sos Agaian "Simultaneous Encryption/Compression of Images Using Alpha Rooting" in IEEE 2008.Google ScholarGoogle Scholar
  6. Frederic Dufaux and Touradj Ebrahimi, "Scrambling for Video Surveillance with Privacy," in Conference on Computer Vision and Pattern Recognition Workshop, New York City, pp. 160--160 IEEE 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Jaya Sankar, V. M. Pandharipande and P. S. Moharir, "Generalized Gray Codes," in ISPACS 2004. Proceedings of 2004 International Symposium on, pp. 654--659 IEEE 2004.Google ScholarGoogle Scholar
  8. Klara Nahrstedt, Jana Dittmnn, Petra Wohlmacher "Approaches to Multimedia and Security" U. S. A 0-7803-6536-4/00(c) IEEE 2000.Google ScholarGoogle Scholar
  9. Paul Mecklenburg, William K. Pehlert, Daniel D. Sullivan "Correction of Errors in Multilevel Gray-Coded Data" IEEE Transaction on Information Theory, VOL. IT-19, NO. 3, May 1973.Google ScholarGoogle Scholar
  10. Rajkumar gaur, suneeta agrwal "New Generalized P-Gray Code Based Algorithms for Multimedia Security" enc2sp, IEEE Bangalore(India) 2009Google ScholarGoogle Scholar
  11. Wenjun Zeng and Shawmin Lei, "Efficient frequency domain selective scrambling of digital video," IEEE transaction on multimedia, vol. 5, pp. 118--129, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Xiliang Liu and Ahmet M. Eskicioglu, "Selective encryption of multimedia content in distribution networks: Challenges and new directions," in Second IASTED International Conference on Communications, Internet and Information Technology Scottsdale, AZ, USA, pp. 527--533, 2003.Google ScholarGoogle Scholar
  13. Yicong Zhou, Karen Panetta "Partial Multimedia Encryption with Different Security Levels" 978-1-4244-1978-4/08/IEEE 2008.Google ScholarGoogle Scholar
  14. Yicong Zhou, Karen Panetta and Sos Agaian, "P-recursive sequence and key-dependent multimedia scrambling," in Mobile Multimedia/Image Processing for Military and Security Applications, SPIE Defence and Security Symposium Orlando, FL USA 2008.Google ScholarGoogle Scholar
  15. Z. Bojkovi C, D. Milovanovic "Mu1timedia Contents security: Watermarking Diversity and Secure Protocols" IEEE 2003.Google ScholarGoogle Scholar
  16. Zhaoyu Liu, Yuliang Zheng, Edd Hauser, Jeffrey Liu and E. Winters Mabry, "Secure Internetworking Video Surveillance for DHS Protection Mission," in the Department of Homeland Security Conference- Working Together: Research & Development (R&D) Partnerships in Homeland Security, Boston, MA, USA, 2005.Google ScholarGoogle Scholar
  17. Zhou Wang, Alan C. Bovik, Hamid R. Sheikh, and Eero P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity" ieee transactions on image processing, vol. 13, no. 4, april 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security in real time multimedia data based on generalized keys

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
            July 2011
            248 pages
            ISBN:9781450306355
            DOI:10.1145/2007052

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 21 July 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate173of395submissions,44%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader