The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes lossless compression algorithms for multisets of sequences, taking advantage of the multiset’s unordered structure. Multisets are a generalization of sets, where members are allowed to occur multiple times. A multiset can be encoded naïvely by simply storing its elements in some sequential order, but then information is wasted on the ordering. We propose a technique that transforms...
This article describes lossless compression algorithms for multisets of sequences, taking advantage of the multiset's unordered structure. Multisets are a generalisation of sets where members are allowed to occur multiple times. A multiset can be encoded naïvely by storing its elements in some sequential order, but then information is wasted on the ordering. We propose a technique that...
In general, JPEG2000 code streams have marker codes in the header, which define particular meanings such as start of packet and end of code stream. Marker codes do not exist in the data part of code streams. The selective encryption of the data part has been considered to avoid generating marker codes. Such encryption is effective in business content exchange. To handle this issue, some schemes have...
Joint Video Compression and Encryption (JVCE) has gained increased attention in the past couple of years to reduce the computational complexity of video compression, as well as provide encryption of multimedia content for web services. In this paper, we present a JVCE framework based on Binary Arithmetic Coding (BAC). We first present an interpretation of BAC in terms of a skewed binary map and then...
In this paper, an efficient and secure encryption scheme for JPEG2000 codestream is proposed. The scheme encrypts each codeblock contribution to a packet (CCP) and does not introduce superfluous JPEG2000 markers in the protected codestream. It achieves full information protection for data confidentiality, and maintains all the advanced features of the original JPEG2000 codestream such as error resilience...
Fingerprinting of digital content is often employed to prevent a small coalition of legitimate users from constructing a copy whose fingerprint is registered to a user not in the coalition. Sets of fingerprints that prevent t or fewer users from framing another user in this way are frameproof codes. A frameproof code is termed secure when no fingerprint constructed by a coalition of t or fewer users...
Exponential growth of the internet provided new ways of propagating and sharing digital video data. Thus ownership protection of the video data is critical and important in this era. Though there are many standards and technologies available to efficiently share the digital video, almost all of them lack ownership protection mechanism. This paper proposes new compressed domain secure digital watermarking...
The Internet traffic is increasing day by day. Also, secure data communication is the need of the hour. But the standard compression techniques which are in use, are independent and do not consider the security issues. Hence, we present a general encoding technique for secure data communication over a language L with a finite alphabet set ??. The encoded message is a bi-tuple of which, the first is...
Summary form only given. A pseudo-random sequence generator (PRNG), L12RC4, inspired by the LZSS compression algorithm and RC4 stream cipher, was presented and implemented. In LZSS, the encoded file consists of a sequence of items, each of which is either a single character (literal) or a pointer of the form (index, length). The probability distributions of the literal, length and flag bit values...
The characteristics of video data are very large amount and real time processing request, and H.264 is a high-complexity video compression standard, so a high speed arithmetic is needed for encrypting video data which is encoded by H.264 standard. But, for a high security video application, it's difficult to find an algorithm to meet the two requests: high security, high speed. A new stream cipher...
We put forward a new method for using dynamic keys to encrypt video information on the theory and characteristics of the H.264 video compression standard. The dynamic key encrypts the most important parts of video information, not only to ensure the safety of the information but also to improve the transmission rate. The algorithm is implemented in JM12.4, experimental results show that the new algorithm...
Continuous, long-term (up to 10 days) electrophysiological monitoring using hybrid intracranial electrodes is an emerging tool for presurgical epilepsy evaluation and fundamental investigations of seizure generation. Detection of high-frequency oscillations and microseizures could provide valuable insights into causes and therapies for the treatment of epilepsy, but requires high spatial and temporal...
This paper presents an approach of data encoding algorithm and forming of electronic digital signature in the residue number system, in what cryptography stability depends not only on length and numbers of the keys, but also from the chosen system of bases.
This paper proposes a new method to embed data in binary images, including scanned text, figures, and cartoon images. The proposed method is based on the manipulating of chains, which are a representation of binary image, to hide data. The chain records the edge information of an image, and the modifications of chains are modifications of edge area. It is difficult to be recognized by human eyes....
Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software...
In this paper, we present a DCT domain watermarking approach for H.264/AVC video coding standard. This scheme is resilient to compressed-domain temporal adaptation. A cryptographic hash function is used to generate a semi-fragile watermark to provide content-based authentication. The embedded watermark can withstand frame-dropping due to temporal adaptation, yet it is able to detect malicious attacks...
In this paper, the compressed sensing (CS) methodology is applied to the harmonic part of sinusoidally-modeled audio signals. As this part of the model is sparse by definition in the frequency domain, we investigate how CS can be used to encode this signal at low bitrates, instead of encoding the sinusoidal parameters (amplitude, frequency, phase) as current state-of-the-art methods do. We extend...
In this paper we propose using the compression method, Shannon-Fano-Elias coding, for encryption. Shannon-Fano-Elias codes lend themselves for encryption because code-words depend on the order in which the symbols that need to be coded are written and it does not matter if the probability mass function of the symbols is known to everyone. If there are n symbols then there are n! orderings, each leading...
According to security demands of video conference system, this paper presented three schemes to encrypt parts of video data using permutation code and DES encryption algorithm based on the newest coding standard H.264. Comparing with encryption effects of three encryption schemes using two encryption algorithms respectively, this paper determined one of three schemes as a last encryption scheme. This...
It is important to construct more efficient index used for query over encrypted character strings in database. A few of approaches to deal with such issues have been worked out. In this paper, an bloom filter based index to support fuzzy query over encrypted character data is proposed on the principle of two-phase query. Firstly a triple is used to express a character string, then we use bloom filter...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.