Partial encryption of video for communication and storage

Download
2003
Yüksel, Turan
In this study, a new method is proposed to protect video data through partial encryption. Unlike previous methods, the bit rate of the encrypted portion can be controlled. In order to accomplish this task, a simple model for the time to break the partial encryption by a chipertext-only attack is defined. Then, the encrypted bit budget distribution strategy maximizing the time subject to the bitrate constraint is found. An algorithm to estimate the model parameters is constructed and it isthen implemented over an MPEG-4 natural video codec together with the bit budget distribution strategy. The encoder is tested with various image sequences and the output is analyzed. In addition to the developed video encryption method, a file format is defined to store encryption related side information.

Suggestions

An image encryption algorithm robust to post-encryption bitrate conversion
Akdağ, Sadık Bahaettin; Candan, Çağatay; Department of Electrical and Electronics Engineering (2006)
In this study, a new method is proposed to protect JPEG still images through encryption by employing integer-to-integer transforms and frequency domain scrambling in DCT channels. Different from existing methods in the literature, the encrypted image can be further compressed, i.e. transcoded, after the encryption. The method provides selective encryption/security level with the adjustment of its parameters. The encryption method is tested with various images and compared with the methods in the literature ...
Reliable Transmission of Short Packets Through Queues and Noisy Channels Under Latency and Peak-Age Violation Guarantees
Devassy, Rahul; Durisi, Giuseppe; Ferrante, Guido Carlo; Simeone, Osvaldo; Uysal, Elif (Institute of Electrical and Electronics Engineers (IEEE), 2019-04-01)
This paper investigates the probability that the delay and the peak-age of information exceed a desired threshold in a point-to-point communication system with short information packets. The packets are generated according to a stationary memoryless Bernoulli process, placed in a single-server queue and then transmitted over a wireless channel. A variable-length stop-feedback coding scheme-a general strategy that encompasses simple automatic repetition request (ARQ) and more sophisticated hybrid ARQ techniq...
Distributed Content Based Video Identification in Peer-to-Peer Networks: Requirements and Solutions
Koz, Alper; Lagendijk, R. (Inald) L. (2017-03-01)
In this paper, we first discuss the essential requirements for a fingerprint (perceptual hash)-based distributed video identification system in peer-to-peer (P2P) networks in comparison with traditional central database implementations of fingerprints. This discussion reveals that first, fingerprint sizes of existing video fingerprint methods are not compatible with the cache sizes of current P2P clients; second, fingerprint extraction durations during a query are not at tolerable levels for a user in the n...
Providing Automated Actions in Wireless Multimedia Sensor Networks via Active Rules
Oztarak, Hakan; Akkaya, Kemal; Yazıcı, Adnan (2011-09-28)
Manual processing of multimedia data in Wireless Multimedia Sensor Networks (WMSNs) may not always be possible. This necessitates autonomous operation of data processing at the sink for taking actions as well as communicating with the appropriate personnel whenever needed. In this paper, we propose a framework for fusing and automated processing of incomplete/imprecise WMSN data using active rules. First, data fusion is performed via fuzzy logic to handle the uncertainty in the received data at the sink. We...
SIMULATION CONCEPTS FOR INFORMATION-SYSTEM
MOURANT, RR; Tarı, Zehra Sibel (Elsevier BV, 1993-09-01)
Recent Improvements in document image systems and their low-cost implementation on networks of microcomputers is leading to the reengineering of many information systems. We describe how document image systems can be applied to information systems. In order to compare the performance of a conventional information system with one implemented with document imaging processing capability we conducted a discrete event simulation. We modeled the conventional information system for processing graduate student ...
Citation Formats
T. Yüksel, “Partial encryption of video for communication and storage,” M.S. - Master of Science, Middle East Technical University, 2003.