共查询到20条相似文献,搜索用时 0 毫秒
1.
Multimedia Tools and Applications - In this era of internet transfer of information is in digital form using multimedia files such as image, video, audio, etc. which relies on secure communication... 相似文献
2.
Multimedia Tools and Applications - Recent advances in processing capabilities of hardware devices and 5 g spectrum availability has not only made the life of users heaven but has also... 相似文献
4.
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers. 相似文献
5.
In this paper, we propose two secret sharing approaches for 3D models using Blakely and Thien and Lin schemes. We show that encoding 3D models using lossless data compression algorithms prior to secret sharing helps reduce share sizes and remove redundancies and patterns that possibly ease cryptanalysis. The proposed approaches provide a higher tolerance against data corruption/loss than existing 3D protection mechanisms, such as encryption. Experimental results are provided to demonstrate the secrecy and safety of the proposed schemes. The feasibility of the proposed algorithms is demonstrated on various 3D models. 相似文献
7.
为了实现对数字图像信息的有效保护,提出了一种通用的数字图像加密算法.通过密钥产生一维混沌序列并排序,以排序后的序列的各数值的原来索引为序列,把图像像素移位到相应的序列位置,便实现像素位置置乱加密.通过自定义随机加密函数与图像像素异或运算实现像素值变换置乱加密,应用评价指标对加密效果和安全性进行分析.理论分析和实验结果表明,该算法密钥空间大,具有较好的加密效果和加密效率,并对统计分析具有较好的安全性和较强的抗剪切攻击能力. 相似文献
8.
Multimedia Tools and Applications - Nowadays, the use of real time video communication is growing with a rapid pace. For example, Search and Rescue (SAR) applications like earthquake rescue,... 相似文献
9.
Microsystem Technologies - The technique of hiding knowledge in certain details is steganography. One of the main trends of computer infrastructure and connectivity following the advent of the... 相似文献
10.
Multimedia Tools and Applications - Digital steganography is becoming a common tool for protecting sensitive communications in various applications such as crime/terrorism prevention whereby law... 相似文献
11.
In this research, we consider exploiting the large volume of audio/video data streams in compressed video clips/files for effective steganography. By observing that most of the distributed video files employ H.264 Advanced Video Coding (AVC) and MPEG Advanced Audio Coding (AAC) for video/audio compression, we examine the coding features in these data streams to determine appropriate data for modification so that the reliable high-volume information hiding can be achieved. Such issues as the perceptual quality, compressed bit-stream length, payload of embedding, effectiveness of extraction and efficiency of execution will be taken into consideration. First, the effects of using different coding features are investigated separately and three embedding profiles, i.e. High, Medium and Low, which indicate the amount of payload, will then be presented. The High profile is used to embed the maximum amount of hidden information when the high payload is the only major concern in the target application. The Medium profile is recommended since it is designed to achieve a good balance among several requirements. The Low profile is an efficient implementation for faster information embedding. The performances of these three profiles are reported and the suggested Medium profile can hide more than 10% of the compressed video file size in common Flash Video (FLV) files. 相似文献
12.
A semi-blind method that estimates the quality of a video distorted by H.264/AVC compression/decompression is introduced. The method embeds pseudo-random binary watermarks in the I-frames of the original undistorted video. To assess the quality of a segment of a distorted watermarked video, the watermark bits are extracted and the quality is estimated based on the similarity between the embedded and the extracted watermarks. To enable quality assessment for a large range of distortions, the derivative vectors of different scaled versions of each I-frame of the original video are obtained, using wavelet transform. The watermark bits that are embedded in the small wavelet scales are used to estimate the small distortions, while the bits embedded in the large wavelet scales are used to estimate large distortions. This is because the latter bits are more robust (to distortions) than those bits embedded in the small wavelet scales. The proposed method was tested on different video sequences which were distorted by compression/decompression using H.264/AVC with different quality factors. The simulation results show that the proposed method can accurately estimate the quality of a video and its frames in terms of the peak signal-to-noise ratio (PSNR) and the structural similarity (SSIM) quality measures. 相似文献
13.
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient property of chaos based security systems besides steganography applicability in providing secure communication, chaos based steganography algorithms served as a hot topic in recent researches. The proposed scheme possess novelties and advantageous such as: 1) Introducing a novel 3-dimensional chaotic map ( LCA map) with strong chaotic characteristics and maximum Lyapunov exponent 20.58, which is used for generating three chaotic sequences, each of them represents the number of row, column, and colour component, respectively. 2) Utilizing random selection procedure for selecting subsequences with length of 2 L, which L is the length of secret message 3) Specifying L pairs of triples host positions for embedding LSBs and MSBs of secret message by using three high level chaotic maps. 4) Entering some parameters dependent on elementary initial values, host image, and secret message features as a key point for adding additional layer of security alongside providing high sensitivity. 5) Providing high capacity for embedding secret message, which is equal to 50 % of whole image capacity ( M?×? N?×?12). The proposed method could be applied in different criterion such as, confidential communication and data storing, protection of data alteration, and etc. Our experimental results guarantees that our scheme is not only robust against differential attacks, but also has promising results such as highly sensitive keys, Quality index, PSNR, MSE, and hiding capacity as shown in statistical security analysis. 相似文献
14.
Tradition reference table based (RTB) methods employ two pixels to conceal a secret digit according to a two-dimensional reference table. In this paper, x-dimensional reference table framework is defined, which can be regarded as generalization of the prior works. The available pixels to be embedded are limited in two-dimensional space, so the proposed methods extend the dimensional space of reference table. Theoretical analyses are given to justify the effectiveness of the proposed construction. Two novel RTB methods named CRT (cubic reference table) and CRT-PVD (cubic reference table and pixel value differencing) are presented. The former is independent of image contents while embedding, and the latter is depended on the discriminated image smoothness. Experimental results show that two proposed methods can achieve better performance compared with the prior works. 相似文献
15.
本文介绍了数据加密与数字签名的概念、工作原理及其实现算法。最后对基于公开密钥密码体制的数据加密与数字签名技术的联系与区别进行了简要分析。 相似文献
16.
为了进一步提高现有数字签名技术的安全性,同时为以后密码学的发展提供一个新的角度,提出了混合加密的思路,提出了一种实现不同结构加密算法的融合思想。将ECC算法与传统的RSA算法结合起来,在结构上进行优化组合,应用于数字签名中去。该方案跳出了从结构上差异较大的局限,选择了二者相似的密钥数据结构的角度对算法进行混合。从理论上来说,该方案可以在安全性和运行开销上取得最优化的结果。 相似文献
17.
为了实现对数字图像内容的有效保护,在已有的图形融合算法的基础上,结合混沌序列良好的随机性和初值敏感性,给出了一种新的数字图像加密算法,该算法有效提高了图像加密算法的安全性,具有较高的效率和较好的加密效果.实验结果表明该加密算法安全高效. 相似文献
18.
Digital Rights Management (DRM) of videos is an important issue nowadays. Considering that H.264/AVC videos will be widely used in various applications, we propose a practical design, which combines the methodologies of selective encryption and fingerprinting, for effective DRM of H.264/AVC streaming videos. A selective encryption scheme is first presented to scramble the video content by encrypting a small amount of data in the compressed bit-stream. The scrambled video is H.264-compliant to reduce the complexity of decoder since it can still be played without triggering errors in the decoding process. A fingerprinting scheme is then introduced to provide further protection. We extract a reasonable amount of data from the video and embed the watermark acting as the fingerprint of the video recipient. To acquire the high-quality video for viewing, the user has to decrypt the video obtained from a video server and then combine it with the watermarked data provided from a user information server. The resulting viewable video is thus fingerprinted to deter the user from illegally redistributing the content. Experimental results will demonstrate the feasibility of the proposed approach. 相似文献
19.
分析了在线招投标系统的基本过程和研究意义,给出了一种基于网上在线招投标系统的不可否认数字签名认证方案,使得可在不暴露用户安全信息的前提下实现其身份认证。方案包括了基于Rijndael算法的投标信息加密方法、基于SHA算法的投标信息数字摘要方法、基于RSA算法的数字摘要加密方法等,并对Rijndael算法、RSA算法的应用问题及系统的安全性进行了分析。实验结果表明了该方法的有效性。 相似文献
20.
Multimedia Tools and Applications - Steganography is the technique of hiding any secret information like text, image or video behind a cover file. Audio steganography is one of the widespread data... 相似文献
|