The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, various image encryption algorithms have been proposed in order to images from unauthorized access and distribution, and most of them only has the operation on encryption in spatial domain, but no consideration of its corresponding compression. Therefore, to ensure the level of compression ratio and image quality, a class of JPEG image encryption algorithm based on spatiotemporal chaos is...
In this paper a new image encryption algorithm is proposed based on Qi hyper-chaotic system. Pseudo random sequences generated from Qi hyper-chaotic system are used to hide the image visual information and to change the image characteristics in the frequency and spatial domains. In this method, a two-level encryption is employed. The first level consists of a selective encryption of Discrete Cosine...
In this paper a hyper-chaotic cryptosystem is proposed based on two encryption processes: the image substitution permutation cryptography process followed by masking of the ciphered image. In the substitution-permutation cryptography process, the selective encryption using exclusive or operation is performed in the frequency domain, and the image is further encrypted in the spatial domain using the...
In this research work, we have developed a novel lossless digital encryption system for multimedia using the orthogonal transforms for the encryption of all types of image and audio formats. In addition, we have used the symmetric properties of the orthogonal transforms to calculate the inverse of the orthogonal matrices during the execution of the decryption process to speed up the operations and...
Generally, DRM(Digital Rights Management) system is achieved with individual function modules of cryptography, watermarking and so on. In this typical system flow, all digital contents are temporarily disclosed with perfect condition via decryption process. This paper describes the fundamental idea of a novel DRM method which is composed of an incomplete cryptography and user identification mechanism...
Digital images are the most common cover files used for steganography. In this paper, a new steganography method called JMQT based on modified quantization table is proposed. This steganography method is compared with steganography method JPEG-JSteg. Two performance parameters namely capacity and stego size has been compared. As a result capacity increases and stego size increases. So JMQT provides...
This paper presents a novel method for protecting H.264/AVC streaming. The issues on the compression domain video encryption have been pointed out and fully addressed. To optimize the tradeoff between security level and computational complexity, only the most significant bits for reconstructed video quality in H.264/AVC streaming are extracted and encrypted, including the codewords of intra-prediction...
In this paper, we propose an efficient compression/decompression technology and encryption/decryption technology for a multimedia communication system. In order to reduce the volume of multimedia data over wireless channels, data compression techniques are widely used. Discrete cosine transform (DCT) is one of the major compression Scheme. Hence, we present Dynamic bit-width adaptation scheme in discrete...
In this paper, we propose an independent efficient compression and encryption techniques for an image in multimedia applications. In order to reduce the volume of multimedia data over wireless channels, data compression techniques are widely used. Discrete cosine transform (DCT) is one of the major compression Scheme. In this paper, we present Dynamic bit-width adaptation scheme in discrete cosine...
In this paper, a novel Joint Watermarking and Encryption scheme is presented. The design of proposed joint watermarking and encryption scheme involves the development of the encryption and watermarking schemes such that both the techniques are compliant with each other. Based on statistical analysis of continuous-tone still images, media data, in DCT domain, is partitioned into two parts. The encryption...
The objective of this research is to design a new JPEG-based compression scheme which simultaneously considers the security issue. Our method starts from dividing image into non-overlapping blocks with size 8×8. Among these blocks, some are used as reference blocks and the rest are used as query blocks. A query block is the combination of the residual and the resultant of a filtered reference block...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in this work. We model the DCT coefficients recovery problem as an optimization problem and recover all missing DCT coefficients via linear programming. The visual quality of the recovered image gradually decreases as the number of missing DCT coefficients increases. For some images, the quality is surprisingly...
According to the current e-government development, analysis of the characteristics of digital watermarking technology, a digital watermarking-based solutions for electronic seals to increase the security of electronic data.
This work proposes light weight video encryption algorithms suitable for real time applications. The objective of these encryption algorithms is to reduce the total amount of time taken for encryption while encrypting the entire video which is necessary in certain applications like video conferencing. Two proposals are suggested in this work. In the first proposal, Intra frames and motion vectors...
Traditional fast Discrete Cosine Transforms (DCT)/ Inverse DCT (IDCT) algorithms have focused on reducing the arithmetic complexity. In this manuscript, we implemented a new architecture simultaneous for image compression and encryption technique suitable for real-time applications. Here, contrary to traditional compression algorithms, only special points of DCT outputs are calculated. For the encryption...
It has been demonstrated in our earlier works [1, 2] that perceptual video encryption can be effectively achieved by using multiple transforms where the block size 4×4 has been considered. In this paper, we study the extension to the transforms of size 8×8. In this case, a more complex flow-graph structure is resulted, thus leading to a larger room for encryption. In addition, special technique on...
Encryption and decryption technique is normally applied for security enhancement namely by hiding data, messages or images. In this paper, encryption and decryption method based on Hill Cipher is implemented in a car park is discussed. The main focus of applying encryption and decryption on the system is to conceal the images of car plate stored in the database. In addition, prevention from attackers...
With digital multimedia distribution, intellectual property rights (IPR) are at a more risk than ever, due to the possibility of unlimited copying without fidelity loss. Encryption and copy protection mechanisms do not fully efficiently deal with the issue. Encryption usually protects the data only on the transport channel, and as soon as the data are decrypted for exhibit or playback, they can be...
In our earlier work <citerefgrp><citeref refid="ref1"/></citerefgrp>, we proposed for the first time that the perceptual video encryption be performed at the transformation stage by selecting one out of multiple unitary transforms according to the encryption key. In this letter, we aim to design some more efficient transforms to be used in this framework. Two criteria are...
This paper proposes an algorithm of image digital watermarking based on chaotic encryption and SVD. In this algorithm, cover image is transformed into 8 × 8 blocks using DCT and we can get a transform matrix. SVD is used on the matrix. At the same time, the watermark image is encrypted using chaos sequence. Then the singular values of cover image are used to add watermark value to embed watermark...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.