Distributed video coding for wireless visual sensor networks using low power Huffman coding

Author(s):  
Hassan Abid ◽  
Saad Qaisar
2016 ◽  
Vol 25 (4) ◽  
pp. 041008 ◽  
Author(s):  
Jan Hanca ◽  
Nikos Deligiannis ◽  
Adrian Munteanu

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Qian Shen ◽  
Tao Jiang ◽  
Yongjun Zhu ◽  
Yin Wu

With the continuous improvement of encryption algorithms, some applications based on the architecture of wireless visual sensor networks have gradually shifted their attention to the imperceptibility and antijamming performance of secret images. To reduce the probability of secret images being detected, the current research focuses on hiding secret data in the least-significant bit of the cover image in the spatial domain or embedding data into the coefficients of the high-frequency band in the transformational domain, which usually leads to poor performance in a hostile environment. Therefore, some researchers proposed to substitute the coefficients of the medium-frequency band in the transformational domain with secret information to enhance the anti-interference performance. However, this idea would severely affect the imperceptibility of secret images. As a result, an improved version based on the partial preservation embedding algorithm was designed in this paper. Theory analysis and simulation results indicate that the proposed scheme performs better than the existing methods by directly substituting the coefficients of the medium-frequency band in the transformational domain, especially in the case of strong noise interference.


Author(s):  
Emőke Olti ◽  
Thomas Verbeke ◽  
Geert Braeckman ◽  
Vasile Teodor Dadarlat ◽  
Adrian Munteanu

Author(s):  
Julien Sebastien Jainsky ◽  
Deepa Kundur

In this chapter, we discuss the topic of security in wireless visual sensor networks. In particular, attention is brought to steganographic security and how it can be discouraged without challenging the primary objectives of the network. We motivate the development and implementation of more lightweight steganalytic solutions that take into account the resources made available by the network’s deployment and its application in order to minimize the steganalysis impact on the WVSN workload. The concept of preventative steganalysis is also introduced in this chapter as a means to protect the network from the moment it is deployed. Preventative steganalysis aims at discouraging any potential steganographic attacks by processing the WVSN collected data such that the possibility of steganography becomes very small and the steganalysis leads to high rate of success.


2020 ◽  
Vol 20 (2) ◽  
pp. 778-785
Author(s):  
Mohammadjavad Mirzazadeh Moallem ◽  
Ali Aghagolzadeh ◽  
Reza Ghazalian

Sign in / Sign up

Export Citation Format

Share Document