multimedia data security
Recently Published Documents


TOTAL DOCUMENTS

14
(FIVE YEARS 8)

H-INDEX

3
(FIVE YEARS 1)

2021 ◽  
Vol 1 (1) ◽  
pp. 47-58
Author(s):  
S. Benzegane ◽  
S. Sadoudi ◽  
M. Djeddou

In this paper, we present a software development of multimedia streaming encryption using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate keystream for encrypting and decrypting real-time multimedia data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme through image and audio security analysis confirms its robustness against different kind of attacks.


2020 ◽  
Vol 2020 ◽  
pp. 1-24
Author(s):  
Xiabing Zhou ◽  
Bin Li ◽  
Yanrong Qi ◽  
Wanying Dong

With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, provide safe and convenient encryption services, and effectively prevent network attacks. According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping, port number hopping, protocol camouflage, and network channel change to increase the attack threshold. Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet to achieve “one packet, one key.” Finally, through the cooperation of the ARM and the FPGA, an access control list can be used to filter illegal data and monitor the working status of the system in real time. If an abnormality is found, the feedback reconstruction mechanism is used to “clean” the FPGA to make it work normally again. The experimental results and analysis show that the mimic encryption box designed in this paper has high network encryption performance and can effectively prevent data leakage. At the same time, it provides a mimic security defense mechanism at multiple levels, which can effectively resist a variety of network attacks and has high security.


2020 ◽  
Vol 31 (1) ◽  
pp. 54
Author(s):  
Sadiq A. Mehdi ◽  
Zaydon Latif Ali

Due to the rapid evaluation in the field of communications and multimedia and the increasing use of the Internet, multimedia data security has become very urgent. of the best alternative way to achieve multimedia data security is encryption, which prevents unauthorized entities from accessing confidential data. In recent years, the chaotic system of image encryption becomes an efficient way to encrypt images due to its high security. It has certain special properties like sensitivity to initial conditions, and control parameters, pseudorandom, ergodicity, and non-convergence, etc. chaotic dynamics systems became a promising alternative to traditional encryption algorithms. In this paper, This paper presents a new algorithm for the image encryption/decryption scheme depended on a  novel six-dimensional hyper-chaotic system to achieve a high level of security, the chaotic sequence generated from system employ for permutation and diffusion the original image to create an encrypted image.  The performance of  the algorithm has been analyzed through analyzes statistical such  as  Histogram  Analysis,  Correlation  Coefficient  Analysis,  Information  Entropy Analysis, Key Space Analysis, Key Sensitivity Analysis, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Peak Signal to Noise Ratio, The experimental results show that the algorithm has good encryption performance, large keyspace equals to  and the high sensitivity  for  small  changes  in  secret key  which makes  the  algorithm  immune  to Brute  force  attacks,  and  it  can  resist  the  statistical  attacks, therefore,  the presented  encryption  algorithm depends on a novel hyperchaotic system is more secure against the statistical and differential attacks.


There are various existing techniques for cryptography and watermarking. The multimedia data security can be achieved by means of encryption and decryption i.e. cryptography. While watermarking is employed for hiding multimedia data using images. The proposed work focuses on the new method combining these strategies for producing effective solution to improve security of secrete multimedia data. In the proposed dissertation work the images will be used as multimedia data. The proposed method involves the encryption of data to be hid. The cover image is then used as the media for hiding encrypted data. The encrypted data combined with cover image is treated as embedded image. The embedded image then compressed using wavelet transforms compression.


2019 ◽  
Vol 2019 ◽  
pp. 1-2 ◽  
Author(s):  
Zhaoqing Pan ◽  
Ching-Nung Yang ◽  
Victor S. Sheng ◽  
Naixue Xiong ◽  
Weizhi Meng

Author(s):  
Kanimozhi Suguna S. ◽  
Dhanya V. S.

This chapter throws light on major multimedia data security techniques. It has become so essential in today's society which uses multimedia data in almost all walks of life. There are a lot of multimedia data transactions carried out every day. Thus, to ensure data security the techniques, steganography and watermarking are frequently used. In steganography and watermarking techniques, the data to be hidden is encrypted and fed into a transparent layer like documents, images, and it is decrypted at the receiving end by the recipient. Generally, steganographic communications are one-to-one while watermarking is one-to-many. Besides these techniques, certain other techniques are also used in the application for providing security to multimedia data. From this chapter, a detailed content about steganography and watermarking can be obtained.


2017 ◽  
Vol 24 (4) ◽  
pp. 58-66 ◽  
Author(s):  
Yan Li ◽  
Young-Sik Jeong ◽  
Byeong-Seok Shin ◽  
Jong Hyuk Park

Sign in / Sign up

Export Citation Format

Share Document