Multimedia Content Encryption for Secure Multimedia Communication

Author(s):  
Shiguo Lian

The principal concern of this chapter is to provide those in the secure multimedia communication or content protection community with an overview of multimedia content encryption technology. Multimedia (image, audio or video) content encryption technologies are reviewed, from the background, brief history, and performance requirement, to research progress. Additionally, the general encryption algorithms are classified, and their performances are analyzed and compared. Furthermore, some special encryption algorithms are introduced. Finally, some open issues and potential research topics are presented, followed by some conclusions. The author hopes that the chapter will not only inform researchers of the progress of multimedia content encryption but also guide the design of practical applications in industry field.

Author(s):  
Shiguo Lian

The principal concern of this chapter is to provide those in the multimedia or content protection community with an overview of multimedia content encryption technology. Multimedia (image, audio, or video) content encryption technologies are reviewed, from the background, brief history, performance requirement, to research progress. Additionally, the general encryption algorithms are classified, and their performances are analyzed and compared. Furthermore, some special encryption algorithms are introduced. Finally, some open issues and potential research topics are presented, followed by some conclusions. The author hopes that the chapter will not only inform researchers of the progress of multimedia content encryption, but also guide the design of practical applications in the industry field.


Author(s):  
B. Aparna ◽  
S. Madhavi ◽  
G. Mounika ◽  
P. Avinash ◽  
S. Chakravarthi

We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. The proposed system can be used to protect different multimedia content types, including videos, images, audio clips, songs, and music clips. The system can be deployed on private and/or public clouds. Our system has two novel components: (i) method to create signatures of videos, and (ii) distributed matching engine for multimedia objects. The signature method creates robust and representative signatures of videos that capture the depth signals in these videos and it is computationally efficient to compute and compare as well as it requires small storage. The distributed matching engine achieves high scalability and it is designed to support different multimedia objects. We implemented the proposed system and deployed it on two clouds: Amazon cloud and our private cloud. Our experiments with more than 11,000 videos and 1 million images show the high accuracy and scalability of the proposed system. In addition, we compared our system to the protection system used by YouTube and our results show that the YouTube protection system fails to detect most copies of videos, while our system detects more than 98% of them.


Energies ◽  
2021 ◽  
Vol 14 (8) ◽  
pp. 2231
Author(s):  
Alencar Franco de Souza ◽  
Fernando Lessa Tofoli ◽  
Enio Roberto Ribeiro

This work presents a review of the main topologies of switched capacitors (SCs) used in DC-DC power conversion. Initially, the basic configurations are analyzed, that is, voltage doubler, series-parallel, Dickson, Fibonacci, and ladder. Some aspects regarding the choice of semiconductors and capacitors used in the circuits are addressed, as well their impact on the converter behavior. The operation of the structures in terms of full charge, partial charge, and no charge conditions is investigated. It is worth mentioning that these aspects directly influence the converter design and performance in terms of efficiency. Since voltage regulation is an inherent difficulty with SC converters, some control methods are presented for this purpose. Finally, some practical applications and the possibility of designing DC-DC converters for higher power levels are analyzed.


2020 ◽  
Vol 11 (1) ◽  
pp. 1
Author(s):  
Amna Qureshi ◽  
David Megías Jiménez

In this paper, we provide a holistic survey of multimedia content protection applications in which blockchain technology is being used. A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital watermarking and fingerprinting (or transaction tracking), and performance criteria. The study of the literature reveals that there is currently no complete and systematic taxonomy dedicated to blockchain-based copyright protection applications. Moreover, the number of successfully developed blockchain-based content protection systems is very low. This points towards a research gap. To fill this gap, we propose a taxonomy that integrates technical aspects and application knowledge and can guide the researchers towards the development of blockchain-based multimedia copyright protection systems. Furthermore, the paper discusses some technical challenges and outlines future research directions.


Author(s):  
Xiaohua Li ◽  
Feitian Ran ◽  
Fan Yang ◽  
Jun Long ◽  
Lu Shao

AbstractA growing family of two-dimensional (2D) transition metal carbides or nitrides, known as MXenes, have received increasing attention because of their unique properties, such as metallic conductivity and good hydrophilicity. The studies on MXenes have been widely pursued, given the composition diversity of the parent MAX phases. This review focuses on MXene films, an important form of MXene-based materials for practical applications. We summarized the synthesis methods of MXenes, focusing on emerging synthesis strategies and reaction mechanisms. The advanced assembly technologies of MXene films, including vacuum-assisted filtration, spin-coating methods, and several other approaches, were then highlighted. Finally, recent progress in the applications of MXene films in electrochemical energy storage, membrane separation, electromagnetic shielding fields, and burgeoning areas, as well as the correlation between compositions, architecture, and performance, was discussed.


2021 ◽  
Vol 13 (1) ◽  
Author(s):  
Yingjie Yang ◽  
Yanhui Yu ◽  
Jing Li ◽  
Qingrong Chen ◽  
Yanlian Du ◽  
...  

AbstractThe investigation of highly effective, durable, and cost-effective electrocatalysts for the hydrogen evolution reaction (HER) is a prerequisite for the upcoming hydrogen energy society. To establish a new hydrogen energy system and gradually replace the traditional fossil-based energy, electrochemical water-splitting is considered the most promising, environmentally friendly, and efficient way to produce pure hydrogen. Compared with the commonly used platinum (Pt)-based catalysts, ruthenium (Ru) is expected to be a good alternative because of its similar hydrogen bonding energy, lower water decomposition barrier, and considerably lower price. Analyzing and revealing the HER mechanisms, as well as identifying a rational design of Ru-based HER catalysts with desirable activity and stability is indispensable. In this review, the research progress on HER electrocatalysts and the relevant describing parameters for HER performance are briefly introduced. Moreover, four major strategies to improve the performance of Ru-based electrocatalysts, including electronic effect modulation, support engineering, structure design, and maximum utilization (single atom) are discussed. Finally, the challenges, solutions and prospects are highlighted to prompt the practical applications of Ru-based electrocatalysts for HER.


2013 ◽  
Vol 427-429 ◽  
pp. 2094-2098
Author(s):  
Yang Li

According to the application of the computer network multimedia is more and more widely, and is also correspondingly strong shock by the network media and informatization for network communication and other requirements, progress and development of society constantly threatened by the impact of network multimedia communication. The paper theory-based with network multimedia communication to analysis the characteristics and performance requirements of network multimedia communication, combining to relevant material of the data flow, research and analyze the data flow of the mining technology, to carries on system analysis of the data flow, construct system model based on the network multimedia communication data stream, in order to better guide the dynamic analysis to network multimedia communication data flow, to master the multimedia communication data fusion and decision, so as to understand the users needs to network multimedia communication, to better guide the sustainable development of the network multimedia communication.


Author(s):  
Amirul Syafiq Sadun ◽  
Jamaludin Jalani ◽  
Suziana Ahmad ◽  
Amiera Saryati Sadun ◽  
Sumaiya Mashori

Recently, combat robot competition has become one of the most famous engineering competitions among schools and universities. The robots are usually built with a destructive weapon, which can immobilize or disable opponent’s robot and win the match. Despite the variety of robot design and concept, the trend has shown that most of the local contestant tend to design a horizontal axis weapon type. In this project, a wireless vertical axis bar spinner combat robot is designed and developed for the 3rd Malaysia Combat Robot Competition which was held at National Science Centre (PSN) in 2017. The robot is controlled using radio control (RC) and powered by a highly discharge 22.2V Lithium Polymer (LiPo) chemical battery. Furthermore, related analysis has been conducted to meet the design and performance requirement of the competition. With the DC brush motor and thick metal bar rotating in vertical axis, the robot has proven to produce high power, torque and speed during the competition.


Author(s):  
Shiguo Lian

Since the beginning of 1990s, some multimedia standards (Joan, Didier, & Chad, 2003) related to image compression, video compression, or audio compression have been published and widely used. These compression methods reduce media data’s volumes, and save the storage space or transmission bandwidth. After the middle of 1990s, network technology has been rapidly developed and widely spread, which increases the network bandwidth. With the development of network technology and multimedia (image, audio, video, etc.) technology, multimedia data are used more and more widely. In some applications related to politics, economics, militaries, entertainment, or education, multimedia content security becomes important and urgent. Some sensitive data need to be protected against unauthorized users. For example, only the customers paying for a TV program can watch the program online, while other customers cannot watch the content, only the administrator can update (delete, insert, copy, etc.) the TV program in the database, while others cannot modify the content, the TV program released over Internet can be traced, and so forth. Multimedia content protection technology protects multimedia data against the threats coming from unauthorized users, especially in network environment. Generally, protected properties include the confidentiality, integrity, ownership, and so forth. The confidentiality defines that only the authorized users can access the multimedia content, while others cannot know multimedia content. The integrity tells whether media data are modified or not. The ownership shows media data’s owner information that is used to authenticate or trace the distributor. During the past decade, various technologies have been proposed to protect media data, which are introduced in this chapter. Additionally, the threats to multimedia data are presented, the existing protection methods are compared, and some future trends are proposed.


2008 ◽  
pp. 880-897
Author(s):  
J. Magalhaes ◽  
Stefan Rüger

Most of the research in multimedia retrieval applications has focused on retrieval by content or retrieval by example. Since the classical review by Smeulders (2000) a new interest has grown immensely in the multimedia information retrieval community: retrieval by semantics. This exciting new research area arises as a combination of multimedia understanding, information extraction, information retrieval and digital libraries. This chapter presents a comprehensive review of analysis algorithms to extract semantic information from multimedia content. We discuss statistical approaches to analyse images and video content and conclude with a discussion regarding the described methods.


Sign in / Sign up

Export Citation Format

Share Document