• 제목/요약/키워드: Image Scrambling

검색결과 25건 처리시간 0.021초

SVC에서 스케일러블 암호화를 이용한 스크램블링 기술 (Scrambling Technology using Scalable Encryption in SVC)

  • 권구락
    • 한국멀티미디어학회논문지
    • /
    • 제13권4호
    • /
    • pp.575-581
    • /
    • 2010
  • 트리밍 미디어와 압축 기술의 발전과 인터넷 사용의 확대로 디지털 음악, 비디오, 영상은 인터넷을 이용하여 사용자에게 순간적으로 배포되어질 수 있다. 하지만, 대부분 기존의 디지털 저작권의 관리는 안전하지 못하고 실시간적인 멀티미디어 응용에 의해 야기되는 데이터의 방대한 양의 처리를 빠르게 수행하지 못한다. Scalable video codec (SVC) 은 변화하는 네트워크 대역과 다양한 어플리케이션 목적에 적응 가능한 Spatial, Temporal, SNR 스케일러빌러티를 제공한다. 한편, 많은 멀티미디어 서비스에서 보안성은 인증받지 않은 사용자의 컨텐츠 접근과 분배를 제한하는 중요한 요소이다. 따라서 MPEG4-SVC에 적합한 새로운 암호화 시스템의 구현은 반드시 필요하다. 본 논문에서는 MPEG4-SVC의 스케일러빌러티 특성을 그대로 유지시켜주는 스케일러블 암호화 기술을 제안한다. 기본 레이어에는 선택적 암호화 기법을 적용하여 암호화하고 확장 레이어에는 다양한 Motion Vector Scrambling(MVS)과 인트라 모드 암호화 방법을 적용하였다. 복호화 단계에서는 각 암호화된 레이어마다 다른 암호화 키로 접근이 가능하다. 실험 결과에서 제안된 기술은 암호화 속도가 빠르고 에러에 강한 특성과 추가되는 비트스트림의 크기가 아주 적은 장점이 있다.

Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain

  • Li, Jianzhong
    • Journal of the Optical Society of Korea
    • /
    • 제20권1호
    • /
    • pp.42-54
    • /
    • 2016
  • A hybrid color and grayscale images encryption scheme based on the quaternion Hartley transform (QHT), the two-dimensional (2D) logistic map, the double random phase encoding (DRPE) in gyrator transform (GT) domain and the three-step phase-shifting interferometry (PSI) is presented. First, we propose a new color image processing tool termed as the quaternion Hartley transform, and we develop an efficient method to calculate the QHT of a quaternion matrix. In the presented encryption scheme, the original color and grayscale images are represented by quaternion algebra and processed holistically in a vector manner using QHT. To enhance the security level, a 2D logistic map-based scrambling technique is designed to permute the complex amplitude, which is formed by the components of the QHT-transformed original images. Subsequently, the scrambled data is encoded by the GT-based DRPE system. For the convenience of storage and transmission, the resulting encrypted signal is recorded as the real-valued interferograms using three-step PSI. The parameters of the scrambling method, the GT orders and the two random phase masks form the keys for decryption of the secret images. Simulation results demonstrate that the proposed scheme has high security level and certain robustness against data loss, noise disturbance and some attacks such as chosen plaintext attack.

Compression-friendly Image Encryption Algorithm Based on Order Relation

  • Ganzorig Gankhuyag;Yoonsik Choe
    • Journal of Internet Technology
    • /
    • 제21권4호
    • /
    • pp.1013-1024
    • /
    • 2020
  • In this paper, we introduce an image encryption algorithm that can be used in combination with compression algorithms. Existing encryption algorithms focus on either encryption strength or speed without compression, whereas the proposed algorithm improves compression efficiency while ensuring security. Our encryption algorithm decomposes images into pixel values and pixel intensity subsets, and computes the order of permutations. An encrypted image becomes unpredictable after permutation. Order permutation reduces the discontinuity between signals in an image, increasing compression efficiency. The experimental results show that the security strength of the proposed algorithm is similar to that of existing algorithms. Additionally, we tested the algorithm on the JPEG and the JPEG2000 with variable compression ratios. Compared to existing methods applied without encryption, the proposed algorithm significantly increases PSNR and SSIM values.

가변 얼굴 생체템플릿 생성 방법에 대한 연구 (A Study of Generation for Changeable Face Template)

  • 정민이;김재희
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2007년도 하계종합학술대회 논문집
    • /
    • pp.391-392
    • /
    • 2007
  • Changeable biometries has been suggested as a solution to the problems of enhancing privacy. In this paper, we proposed changeable biometrics for face recognition using on ICA based approach. ICA coefficient vector extracted from an input face image. The vector is scrambled randomly and a new face template is generated by addition of a couple of scrambled coefficients. When a transformed template is compromised, it is replaced by a new scrambling rule and addition.

  • PDF

Asymmetric Multiple-Image Encryption Based on Octonion Fresnel Transform and Sine Logistic Modulation Map

  • Li, Jianzhong
    • Journal of the Optical Society of Korea
    • /
    • 제20권3호
    • /
    • pp.341-357
    • /
    • 2016
  • A novel asymmetric multiple-image encryption method using an octonion Fresnel transform (OFST) and a two-dimensional Sine Logistic modulation map (2D-SLMM) is presented. First, a new multiple-image information processing tool termed the octonion Fresneltransform is proposed, and then an efficient method to calculate the OFST of an octonion matrix is developed. Subsequently this tool is applied to process multiple plaintext images, which are represented by octonion algebra, holistically in a vector manner. The complex amplitude, formed from the components of the OFST-transformed original images and modulated by a random phase mask (RPM), is used to derive the ciphertext image by employing an amplitude- and phase-truncation approach in the Fresnel domain. To avoid sending whole RPMs to the receiver side for decryption, a random phase mask generation method based on SLMM, in which only the initial parameters of the chaotic function are needed to generate the RPMs, is designed. To enhance security, the ciphertext and two decryption keys produced in the encryption procedure are permuted by the proposed SLMM-based scrambling method. Numerical simulations have been carried out to demonstrate the proposed scheme's validity, high security, and high resistance to various attacks.

IMAGE ENCRYPTION USING NONLINEAR FEEDBACK SHIFT REGISTER AND MODIFIED RC4A ALGORITHM

  • GAFFAR, ABDUL;JOSHI, ANAND B.;KUMAR, DHANESH;MISHRA, VISHNU NARAYAN
    • Journal of applied mathematics & informatics
    • /
    • 제39권5_6호
    • /
    • pp.859-882
    • /
    • 2021
  • In the proposed paper, a new algorithm based on Nonlinear Feedback Shift Register (NLFSR) and modified RC4A (Rivest Cipher 4A) cipher is introduced. NLFSR is used for image pixel scrambling while modified RC4A algorithm is used for pixel substitution. NLFSR used in this algorithm is of order 27 with maximum period 227-1 which was found using Field Programmable Gate Arrays (FPGA), a searching method. Modified RC4A algorithm is the modification of RC4A and is modified by introducing non-linear rotation operator in the Key Scheduling Algorithm (KSA) of RC4A cipher. Analysis of occlusion attack (up to 62.5% pixels), noise (salt and pepper, Poisson) attack and key sensitivity are performed to assess the concreteness of the proposed method. Also, some statistical and security analyses are evaluated on various images of different size to empirically assess the robustness of the proposed scheme.

PSNR Enhancement in Image Streaming over Cognitive Radio Sensor Networks

  • Bahaghighat, Mahdi;Motamedi, Seyed Ahmad
    • ETRI Journal
    • /
    • 제39권5호
    • /
    • pp.683-694
    • /
    • 2017
  • Several studies have focused on multimedia transmission over wireless sensor networks (WSNs). In this paper, we propose a comprehensive and robust model to transmit images over cognitive radio WSNs (CRWSNs). We estimate the spectrum sensing frequency and evaluate its impact on the peak signal-to-noise ratio (PSNR). To enhance the PSNR, we attempt to maximize the number of pixels delivered to the receiver. To increase the probability of successful image transmission within the maximum allowed time, we minimize the average number of packets remaining in the send buffer. We use both single- and multi-channel transmissions by focusing on critical transmission events, namely hand-off (HO), No-HO, and timeout events. We deploy our advanced updating method, the dynamic parameter updating procedure, to guarantee the dynamic adaptation of model parameters to the events. In addition, we introduce our ranking method, named minimum remaining packet best channel selection, to enable us to rank and select the best channel to improve the system performance. Finally, we show the capability of our proposed image scrambling and filtering approach to achieve noticeable PSNR improvement.

적응 산술 부호화를 이용한 고화질 영상 암호화 전략 (Enhanced Image Encryption Scheme using Context Adaptive Variable Length Coding)

  • 심갑용;이말례
    • 한국인터넷방송통신학회논문지
    • /
    • 제13권3호
    • /
    • pp.119-126
    • /
    • 2013
  • 실시간 부호 매김과 비디오데이터 부호화 변환을 위한 비디오 부호화 방법은 비디오 압축 과정을 가진 통합 부호화 기법을 사용한다. 본 연구에서는 접근이 허용되지 않은 비디오 데이터를 가진 사람이 접근을 하지 못하도록 비디오 데이터 부호화 기법에 대해서 연구 하였다. H.264 엔트로피 코딩에 대한 연구와 H.264 CAVLC 부호화 방법을 이용하여 진보된 비디오 부호화 알고리즘에 대한 연구이다. 특히 보다 더 강한 보안 부호화 프레임을 만들기 위하여 혼합 알고리즘을 제안하였다. 제안한 방법은 비디오 데이터 암호화 기능과 압축률이 호전됨을 실험을 통하여 알 수 있었다.

모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호 (Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device)

  • 권구락;김영로
    • 디지털산업정보학회논문지
    • /
    • 제4권1호
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.

주성분 분석 기반의 얼굴 인식을 위한 가변 생체정보 생성 방법 (Changeable Biometrics for PCA based Face recognition)

  • 정민이;이철한;최정윤;김재희
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.331-332
    • /
    • 2006
  • To enhance security and privacy in biometrics, changeable (or cancelable) biometrics have recently been introduced. The idea is to transform a biometric signal or feature into a new one for enrollment and matching. In this paper, we proposed changeable biometrics for face recognition using on PCA based approach. PCA coefficient vector extracted from an input face image. The vector is scrambled randomly and removed. When a transformed template is compromised, it is replaced by a new scrambling rule. In our experiment, we compared the performance between when PCA coefficient vectors are used for verification and when the transformed coefficient vectors are used for verification.

  • PDF