This document discusses partial encryption of compressed video. It proposes a method where only crucial parts of compressed video are encrypted, rather than encrypting the entire video stream. This results in significant reductions in processing time, computational requirements, bit rate, and bandwidth needed for encryption and transmission. The document provides background on video compression standards like MPEG-4 and encryption techniques. It then describes testing of the partial encryption method on images and outlines the problems with fully encrypting video streams that partial encryption aims to address.
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This summarizes a document describing a novel watermarking scheme that provides copyright protection by encrypting the watermark. The proposed method encrypts a compressed input image using the MRC6 encryption algorithm. The encrypted output is then watermarked using rational dither modulation. This produces a watermarked encrypted image. The watermark can be detected in either the encrypted or decrypted domain. The scheme aims to provide secure copyright protection for digital data during transmission over networks. Experimental results showed the watermarked image had high visual clarity and security compared to previous methods.
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...CSCJournals
The document summarizes a proposed object-based watermarking solution for MPEG4 video authentication using shape adaptive-discrete wavelet transform (SA-DWT). The watermark is embedded in the wavelet coefficients by modulating the average of coefficients in each wavelet block. A visual model is used to determine high and low activity blocks to embed the watermark bits based on perceptual invisibility. The watermark can be detected without the original video and is robust against various attacks like lossy compression and format conversions. The proposed scheme embeds the watermark before MPEG4 encoding to protect against format changes.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
This document proposes a new block-based adaptive video data hiding method using forbidden zone data hiding (FZDH) and erasure correction capability of RA codes. The proposed method adaptively selects host video blocks and coefficients for data embedding. It uses frame synchronization markers and RA codes to handle errors from block selection. Experimental results show the proposed method using FZDH is more robust to attacks than quantization index modulation, especially at lower distortion levels. The method can be used for real-time video data hiding applications.
This document discusses video quality analysis for H.264 based on the human visual system. It proposes an improved video quality assessment method that adds color comparison to structural similarity measurement. The method separates similarity measurement into four comparisons: luminance, contrast, structure, and color. Experimental results on video sets with two distortion types show the proposed method's quality scores are more consistent with visual quality than classical methods. It also discusses the H.264 video coding standard and provides examples of encoding and decoding experimental results.
In this presentation both the major domains of information security is explored.
1) Watermarking
2) Steganography
factors affecting them,applications,various techiniques are discussed in the presentation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This summarizes a document describing a novel watermarking scheme that provides copyright protection by encrypting the watermark. The proposed method encrypts a compressed input image using the MRC6 encryption algorithm. The encrypted output is then watermarked using rational dither modulation. This produces a watermarked encrypted image. The watermark can be detected in either the encrypted or decrypted domain. The scheme aims to provide secure copyright protection for digital data during transmission over networks. Experimental results showed the watermarked image had high visual clarity and security compared to previous methods.
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...CSCJournals
The document summarizes a proposed object-based watermarking solution for MPEG4 video authentication using shape adaptive-discrete wavelet transform (SA-DWT). The watermark is embedded in the wavelet coefficients by modulating the average of coefficients in each wavelet block. A visual model is used to determine high and low activity blocks to embed the watermark bits based on perceptual invisibility. The watermark can be detected without the original video and is robust against various attacks like lossy compression and format conversions. The proposed scheme embeds the watermark before MPEG4 encoding to protect against format changes.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
This document proposes a new block-based adaptive video data hiding method using forbidden zone data hiding (FZDH) and erasure correction capability of RA codes. The proposed method adaptively selects host video blocks and coefficients for data embedding. It uses frame synchronization markers and RA codes to handle errors from block selection. Experimental results show the proposed method using FZDH is more robust to attacks than quantization index modulation, especially at lower distortion levels. The method can be used for real-time video data hiding applications.
This document discusses video quality analysis for H.264 based on the human visual system. It proposes an improved video quality assessment method that adds color comparison to structural similarity measurement. The method separates similarity measurement into four comparisons: luminance, contrast, structure, and color. Experimental results on video sets with two distortion types show the proposed method's quality scores are more consistent with visual quality than classical methods. It also discusses the H.264 video coding standard and provides examples of encoding and decoding experimental results.
In this presentation both the major domains of information security is explored.
1) Watermarking
2) Steganography
factors affecting them,applications,various techiniques are discussed in the presentation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
This document proposes a secure image hiding algorithm using cryptography and steganography. It first encrypts an image using the Blowfish encryption algorithm. Then, it hides the encrypted image in a video file using least significant bit (LSB) steganography. Blowfish was chosen for encryption due to its strong security and fast processing compared to other algorithms. LSB steganography in BMP images provides high invisibility and payload capacity. The proposed method provides two layers of security by encrypting the image before hiding it, making it difficult for unauthorized users to detect or extract the hidden information.
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
This document summarizes a research paper that proposes a method for secure compressed image transmission using self-organizing feature maps. The method involves compressing images using SOFM-based vector quantization, entropy coding the results, and encrypting the compressed data using a scrambler before transmission. Simulation results show the method achieves a compression ratio of up to 38:1 while providing security, outperforming JPEG compression by up to 1 dB. The paper presents the technical details and evaluation of the proposed secure image transmission system.
A Study on Video Steganographic Techniquesijceronline
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of Steganography is used to share the data secretly and securely. It is the science of embedding secret information into the cover media with the modification to the cover image, which cannot be easily identified by human eyes. Steganography algorithms can be applied in audio, video and image file. Hiding secret information in video file is known as video steganography. Video Steganography means hiding a secret message that can be either a secret text message or an image within a larger one in such a way that just by looking at it, an unwanted person cannot detect the presence of any hidden message. For hiding secret information in the video, there are many Steganography techniques which are further explained in this paper along with some of the research works done in some fields under video steganography by some authors. The paper describes the progress in the field of video Steganography and intends to give the comparison between its different uses and techniques
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...csandit
The video coding standards are being developed to satisfy the requirements of applications for
various purposes, better picture quality, higher coding efficiency, and more error robustness.
The new international video coding standard H.264 /AVC aims at having significant
improvements in coding efficiency, and error robustness in comparison with the previous
standards such as MPEG-2, H261, H263,and H264. Video stream needs to be processed from
several steps in order to encode and decode the video such that it is compressed efficiently with
available limited resources of hardware and software. All advantages and disadvantages of
available algorithms should be known to implement a codec to accomplish final requirement.
The purpose of this project is to implement all basic building blocks of H.264 video encoder and
decoder. The significance of the project is the inclusion of all components required to encode
and decode a video in MatLab .
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document describes an audio steganography technique that aims to increase security by introducing randomness. It discusses how traditional least significant bit (LSB) modification is vulnerable to attacks. The proposed technique randomly selects both the bit position (1st, 2nd, or 3rd LSB) and audio sample for embedding secret message bits. This is intended to prevent attackers from detecting the embedding pattern. The technique uses character encoding like Huffman coding before message bits are hidden in an audio file using the modified LSB method. Experimental results showed the stego audio maintained quality while providing improved security over fixed LSB techniques.
Video Compression Algorithm Based on Frame Difference Approaches ijsc
The huge usage of digital multimedia via communications, wireless communications, Internet, Intranet and cellular mobile leads to incurable growth of data flow through these Media. The researchers go deep in developing efficient techniques in these fields such as compression of data, image and video. Recently, video compression techniques and their applications in many areas (educational, agriculture, medical …) cause this field to be one of the most interested fields. Wavelet transform is an efficient method that can be used to perform an efficient compression technique. This work deals with the developing of an efficient video compression approach based on frames difference approaches that concentrated on the calculation of frame near distance (difference between frames). The
selection of the meaningful frame depends on many factors such as compression performance, frame details, frame size and near distance between frames. Three different approaches are applied for removing the lowest frame difference. In this paper, many videos are tested to insure the efficiency of this technique, in addition a good performance results has been obtained.
This document discusses steganography and image steganography techniques. It defines steganography as hiding information within other information to avoid detection. Image steganography is described as hiding data in digital images using techniques like least significant bit encoding. The document outlines the LSB algorithm, which replaces the least significant bits of image pixel values with bits of the hidden message. Examples are given to illustrate how short messages can be concealed in an image using this method.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
This document summarizes information hiding methods for compressed video, specifically focusing on the H.264 video compression standard. It first discusses the general framework of information hiding and data representation schemes. It then identifies possible venues for information hiding within the H.264 coding structure, such as the prediction process, transformation, quantization, and entropy coding. The document reviews related information hiding methods for each venue and presents applications. It also provides a timeline of information hiding method development and compares methods based on factors like payload, video quality, and complexity. Finally, it presents perspectives on current trends and opportunities in information hiding for compressed video.
This document proposes an adaptive LSB-OPAP based secret data hiding method for image steganography. It aims to enhance embedding capacity while maintaining imperceptibility and accuracy of extraction. The method uses two private keys - one to determine the number of LSBs substituted in different pixel value ranges, and another for digital signature verification. Secret data and signature are embedded adaptively into the cover image's LSBs using OPAP to adjust pixel values. Experimental results on Lena and Baboon images show payloads of up to 3.7 bits/pixel with PSNRs over 40dB, verifying the method is effective and efficient for secret communication and data protection applications.
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
This document summarizes a research paper that proposes a new data embedding technique called adaptive pixel pair matching (APPM) for digital image steganography. The APPM technique hides secret data by replacing pairs of pixels in the cover image with coordinates that represent the hidden data. This allows data to be hidden in any numerical system. The document outlines existing steganography techniques including least significant bit replacement and transform domain methods. It then describes the proposed APPM technique in more detail, asserting it offers lower distortion than other methods by providing more compact pixel neighborhoods and flexible numerical representation of hidden data.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Arm based human machine interface of plastic extrusion blow molding systemeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
This document proposes a secure image hiding algorithm using cryptography and steganography. It first encrypts an image using the Blowfish encryption algorithm. Then, it hides the encrypted image in a video file using least significant bit (LSB) steganography. Blowfish was chosen for encryption due to its strong security and fast processing compared to other algorithms. LSB steganography in BMP images provides high invisibility and payload capacity. The proposed method provides two layers of security by encrypting the image before hiding it, making it difficult for unauthorized users to detect or extract the hidden information.
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
This document summarizes a research paper that proposes a method for secure compressed image transmission using self-organizing feature maps. The method involves compressing images using SOFM-based vector quantization, entropy coding the results, and encrypting the compressed data using a scrambler before transmission. Simulation results show the method achieves a compression ratio of up to 38:1 while providing security, outperforming JPEG compression by up to 1 dB. The paper presents the technical details and evaluation of the proposed secure image transmission system.
A Study on Video Steganographic Techniquesijceronline
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of Steganography is used to share the data secretly and securely. It is the science of embedding secret information into the cover media with the modification to the cover image, which cannot be easily identified by human eyes. Steganography algorithms can be applied in audio, video and image file. Hiding secret information in video file is known as video steganography. Video Steganography means hiding a secret message that can be either a secret text message or an image within a larger one in such a way that just by looking at it, an unwanted person cannot detect the presence of any hidden message. For hiding secret information in the video, there are many Steganography techniques which are further explained in this paper along with some of the research works done in some fields under video steganography by some authors. The paper describes the progress in the field of video Steganography and intends to give the comparison between its different uses and techniques
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...csandit
The video coding standards are being developed to satisfy the requirements of applications for
various purposes, better picture quality, higher coding efficiency, and more error robustness.
The new international video coding standard H.264 /AVC aims at having significant
improvements in coding efficiency, and error robustness in comparison with the previous
standards such as MPEG-2, H261, H263,and H264. Video stream needs to be processed from
several steps in order to encode and decode the video such that it is compressed efficiently with
available limited resources of hardware and software. All advantages and disadvantages of
available algorithms should be known to implement a codec to accomplish final requirement.
The purpose of this project is to implement all basic building blocks of H.264 video encoder and
decoder. The significance of the project is the inclusion of all components required to encode
and decode a video in MatLab .
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document describes an audio steganography technique that aims to increase security by introducing randomness. It discusses how traditional least significant bit (LSB) modification is vulnerable to attacks. The proposed technique randomly selects both the bit position (1st, 2nd, or 3rd LSB) and audio sample for embedding secret message bits. This is intended to prevent attackers from detecting the embedding pattern. The technique uses character encoding like Huffman coding before message bits are hidden in an audio file using the modified LSB method. Experimental results showed the stego audio maintained quality while providing improved security over fixed LSB techniques.
Video Compression Algorithm Based on Frame Difference Approaches ijsc
The huge usage of digital multimedia via communications, wireless communications, Internet, Intranet and cellular mobile leads to incurable growth of data flow through these Media. The researchers go deep in developing efficient techniques in these fields such as compression of data, image and video. Recently, video compression techniques and their applications in many areas (educational, agriculture, medical …) cause this field to be one of the most interested fields. Wavelet transform is an efficient method that can be used to perform an efficient compression technique. This work deals with the developing of an efficient video compression approach based on frames difference approaches that concentrated on the calculation of frame near distance (difference between frames). The
selection of the meaningful frame depends on many factors such as compression performance, frame details, frame size and near distance between frames. Three different approaches are applied for removing the lowest frame difference. In this paper, many videos are tested to insure the efficiency of this technique, in addition a good performance results has been obtained.
This document discusses steganography and image steganography techniques. It defines steganography as hiding information within other information to avoid detection. Image steganography is described as hiding data in digital images using techniques like least significant bit encoding. The document outlines the LSB algorithm, which replaces the least significant bits of image pixel values with bits of the hidden message. Examples are given to illustrate how short messages can be concealed in an image using this method.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
This document summarizes information hiding methods for compressed video, specifically focusing on the H.264 video compression standard. It first discusses the general framework of information hiding and data representation schemes. It then identifies possible venues for information hiding within the H.264 coding structure, such as the prediction process, transformation, quantization, and entropy coding. The document reviews related information hiding methods for each venue and presents applications. It also provides a timeline of information hiding method development and compares methods based on factors like payload, video quality, and complexity. Finally, it presents perspectives on current trends and opportunities in information hiding for compressed video.
This document proposes an adaptive LSB-OPAP based secret data hiding method for image steganography. It aims to enhance embedding capacity while maintaining imperceptibility and accuracy of extraction. The method uses two private keys - one to determine the number of LSBs substituted in different pixel value ranges, and another for digital signature verification. Secret data and signature are embedded adaptively into the cover image's LSBs using OPAP to adjust pixel values. Experimental results on Lena and Baboon images show payloads of up to 3.7 bits/pixel with PSNRs over 40dB, verifying the method is effective and efficient for secret communication and data protection applications.
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
This document summarizes a research paper that proposes a new data embedding technique called adaptive pixel pair matching (APPM) for digital image steganography. The APPM technique hides secret data by replacing pairs of pixels in the cover image with coordinates that represent the hidden data. This allows data to be hidden in any numerical system. The document outlines existing steganography techniques including least significant bit replacement and transform domain methods. It then describes the proposed APPM technique in more detail, asserting it offers lower distortion than other methods by providing more compact pixel neighborhoods and flexible numerical representation of hidden data.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Arm based human machine interface of plastic extrusion blow molding systemeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Study on soundness of reinforced concrete structures by ndt approacheSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Detect and overcome the selfish problem in wifi network using energy sharingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Improving quality of service using ofdm technique for 4 th generation networkeSAT Publishing House
This document summarizes a research paper that compares the performance of 32QAM and 64QAM digital modulation techniques when used with OFDM for 4G networks. It finds that 32QAM has better performance with lower bit and packet loss over 64QAM. Specifically, when transmitting 1920 bits over an AWGN channel, 32QAM had 65 bit losses and 0 packet losses, while 64QAM had 80 bit losses and 0.04167 packet losses. Therefore, the document concludes 32QAM can be more efficiently used than 64QAM for digital transmission in 4G networks when combined with OFDM modulation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
No sql databases new millennium database for big data, big users, cloud compu...eSAT Publishing House
This document discusses NoSQL databases as a new type of database designed for big data, big users, and cloud computing. It describes how the growth of data volumes, increased numbers of global users, and cloud architectures are driving organizations to adopt NoSQL databases over traditional relational databases. The document provides an overview of the characteristics of NoSQL databases, including how they are classified based on the CAP theorem and how their scale-out architecture provides improved performance and scalability over relational databases. Security challenges of NoSQL databases are also mentioned.
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...eSAT Publishing House
This document studied the effect of grain moisture content on the dehulling characteristics of oat (OL-9 variety) using an indigenously developed small scale impact oat dehuller. Dehulling efficiency and groat recovery significantly increased as grain moisture increased from 10% to 16%, while broken content significantly decreased as moisture increased from 10% to 19%. Regression equations were developed relating grain moisture to dehulling parameters. Optimum moisture content for impact dehulling was determined to be 16%.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Growth and physical properties of pure and manganese doped strontium tartrate...eSAT Publishing House
This document summarizes the growth and characterization of pure and manganese-doped strontium tartrate trihydrate single crystals. Strontium tartrate crystals were grown using the single diffusion gel growth technique. Crystals of sizes up to 10x5x3 mm3 were obtained. The crystals were characterized through techniques such as PXRD, SXRD, FTIR, UV-Vis-NIR, PL, SHG, microhardness, and TGA measurements. Manganese doping was found to increase the PL yield, SHG efficiency, and microhardness of the crystals compared to pure strontium tartrate. The crystals were determined to be monoclinic with optical transparency and suitable for nonlinear
Eye sight determination on tablet based hand held device with image processin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Efficient and Robust Detection of Duplicate Videos in a Databaserahulmonikasharma
This document summarizes a research paper about efficiently detecting duplicate videos in a database. It discusses using color layout descriptors and opponent color space to extract features from video frames. These features are then clustered using k-means to generate fingerprints, which are encoded using vector quantization. A new distance measure is used to compute similarity between model and query videos. The system uses a coarse-to-fine matching scheme to efficiently retrieve the best matching video. Experiments showed the method can accurately detect duplicate videos that are on average 60 seconds long.
Efficient and Robust Detection of Duplicate Videos in a Databaserahulmonikasharma
In this paper, the duplicate detection method is to retrieve the best matching model video for a given query video using fingerprint. We have used the Color Layout Descriptor method and Opponent Color Space to extract feature from frame and perform k-means based clustering to generate fingerprints which are further encoded by Vector Quantization. The model-to-query video distance is computed using a new distance measure to find the similarity. To perform efficient search coarse-to-fine matching scheme is used to retrieve best match. We perform experiments on query videos and real time video with an average duration of 60 sec; the duplicate video is detected with high similarity.
Efficient and Robust Detection of Duplicate Videos in a Databaserahulmonikasharma
In this paper, the duplicate detection method is to retrieve the best matching model video for a given query video using fingerprint. We have used the Color Layout Descriptor method and Opponent Color Space to extract feature from frame and perform k-means based clustering to generate fingerprints which are further encoded by Vector Quantization. The model-to-query video distance is computed using a new distance measure to find the similarity. To perform efficient search coarse-to-fine matching scheme is used to retrieve best match. We perform experiments on query videos and real time video with an average duration of 60 sec; the duplicate video is detected with high similarity.
Robust video data hiding using forbidden zoneMadonna Ranjini
The document proposes a new video data hiding method that uses forbidden zone data hiding and selective embedding. It utilizes repeat accumulate codes to handle errors caused by differences in selected host signal samples between the embedder and decoder. Frames are selectively embedded with message bits or frame synchronization markers. Frame markers allow detection of frame drops, inserts and repeats to withstand temporal attacks. Simulation results show the method can successfully hide data and withstand various attacks like compression, frame rate conversion and other data hiding methods.
An Efficient Code-word Substitution Method for Data Embedding Technique in Encrypted H.264/AVC Video Streams Anisha Jose – PG Scholar,
Anu K Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
Nowadays, the demands of real-time video communication are increased rapidly. Search and rescue (SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in addition to highway surveillance are considered examples of real-time applications. In which, communication time is considered the most important metric to be optimized to ensure support for victims lives. Thus finding a simple and time efficient encryption technique for securing the transmitted data become mandatory. In this paper, we present an efficient encryption technique which has low computation complexity, low processing time and highly chaotic encrypted videos. The proposed technique is based on CABAC where the bin-string of Intra-Prediction Mode is encrypted with chaotic signals and the sign of MVD is toggled randomly. For residue coefficients the sign of the AC coefficients are flipped randomly and the first value of DC coefficients is encrypted by XORing the bin-string with random stream. All random streams are generated with chaotic systems using Logistic map. The experimental results shows that the proposed technique is highly effective for real-time application and robust against different types of attacks.
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
This document discusses techniques for improving video compression efficiency for surveillance videos. It proposes modifying the architecture of scalable video coding to make it surveillance-centric by allowing adaptive rate-distortion optimization at the GOP level based on whether events of interest are present. Experimental results show foreground detection and updating of background adaptively over time to improve compression. Future work includes further enhancing selective motion estimation techniques to improve processing efficiency without degrading video quality.
This document summarizes a research paper that proposes a new data hiding technique for hiding data in compressed video files. The technique embeds data by modifying the least significant bits of motion vectors used during video compression. Motion vectors associated with higher prediction errors are selected as candidate motion vectors to embed data. An adaptive threshold is used for each frame to minimize prediction error while maximizing data payload. The data can be extracted directly from the encoded video stream without the original video. The technique was tested on standard video sequences and was found to introduce minimal distortion and overhead.
This document summarizes a research paper that proposes a new technique for data embedding and extraction in high resolution AVI videos. The technique encrypts a secret message before embedding it by alternately changing the LSB and LSB+3 bits of alternate bytes in the cover video file. An index is also created for the secret information and placed in a video frame to aid extraction. This technique aims to provide higher security, capacity and robustness compared to typical data embedding methods. The paper discusses related work on digital steganography techniques and the proposed video steganography algorithm in more detail.
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS ijma
The work in this paper examines the effects of group of pictures on H.264 multiview video coding bitstream
over an erroneous network with different error rates. The study considers analyzing the bitrate
performance for different GOP and error rates to see the effects on the quality of the reconstructed
multiview video. However, by analyzing the multiview video content it is possible to identify an optimum
GOP size depending on the type of application used. In a comparison test, the H.264 data partitioning and
the multi-layer data partitioning technique with different error rates and GOP are evaluated in terms of
quality perception. The results of the simulation confirm that Multi-layer data partitioning technique shows
a better performance at higher error rates with different GOP. Further experiments in this work have
shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences
The security of multimedia transmission is very important in today’s life. It is a challenge to transfer the
huge multimedia data mostly because of big file sizes and limited bit rates, which are still at a premium.
Hence, the data to be sent has to be compressed. H.264/AVC is the best and practical solution available
today to achieve this. If the data is made secure by good encryption after compression without changing
the size of the compressed file, it is even better. This paper makes an attempt to achieve exactly this. If the
data is encrypted after the compression, the software used for compression need not be changed. In this
technique, use of selective encryption is applied without altering the compression software. Here, the data
is first identified for I-frame which is selected for encryption. This selected data is then sliced and each
slice data without slice header is encrypted using AES algorithm. After decoding the file, the frame can be
seen to be distorted compared to the original one. When the video is decrypted with proper key, the video
obtained which is the same as decoded without encryption.
Error resilient for multiview video transmissions with gop analysisijma
The work in this paper examines the effects of group of pictures on H.264 multiview video coding bitstream
over an erroneous network with different error rates. The study considers analyzing the bitrate
performance for different GOP and error rates to see the effects on the quality of the reconstructed
multiview video. However, by analyzing the multiview video content it is possible to identify an optimum
GOP size depending on the type of application used. In a comparison test, the H.264 data partitioning and
the multi-layer data partitioning technique with different error rates and GOP are evaluated in terms of
quality perception. The results of the simulation confirm that Multi-layer data partitioning technique shows
a better performance at higher error rates with different GOP. Further experiments in this work have
shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences.
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
This document proposes an optimized security method for transmitting images over networks that combines watermarking, steganography, and embedding another image within the host image. The method works by first watermarking the host image in both its image and text form to obscure it. Then another image is embedded within the watermarked host image as a carrier, providing another layer of security. This combined output image is then transmitted to the receiver, who can extract both the original host image and watermark text using extraction techniques. The goal of this optimized approach is to provide stronger security and resistance to unauthorized access during transmission compared to prior individual techniques.
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
I-frames, P-frames, and B-frames are the three major picture types or frame types used in video compression algorithms. I-frames are fully specified frames that do not require other frames to decode but are the least compressible. P-frames store only the changes from previous frames and are more compressible than I-frames but require previous frames to decode. B-frames can use both previous and forward frames for reference and achieve the highest compression but require both previous and forward frames to decode. I-frames are used as random access points and references for decoding other frames.
This document summarizes a research paper that investigates the effects of different group of pictures (GOP) sizes on the quality of reconstructed multiview video content transmitted over error prone channels. It finds that while larger GOP sizes allow for greater compression, they can also propagate errors spatially and temporally. It proposes a multi-layer data partitioning technique to make the multiview video bitstream more robust to errors, and implements frame copy error concealment in the decoder to replace lost information. Simulation results show the multi-layer approach performs better than standard H.264 data partitioning at higher error rates.
Performance evaluation of mpeg 4 video transmission over ip-networksAlexander Decker
This document summarizes research evaluating the performance of transmitting MPEG-4 video over IP networks with and without quality of service (QoS). The researchers transmitted MPEG-4 video over a best-effort network and a QoS network in a simulation using NS-2. They measured peak signal noise ratio, throughput, and frame/packet statistics to compare the performance between the two networks. The results showed that transmitting video over the QoS network performed better than over the best-effort network.
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...Alexander Decker
This document evaluates the performance of transmitting MPEG-4 video over IP networks using two different network types: best-effort and Quality of Service (QoS). The researchers used the NS-2 network simulator along with additional tools to encode video, transmit it over simulated networks, then evaluate the received video quality. Key performance metrics like peak signal-to-noise ratio (PSNR), throughput, and frame/packet statistics were calculated and compared between the best-effort and QoS networks. The results showed that transmitting MPEG-4 video over a QoS network achieved better performance than a best-effort network according to the measured metrics.
This document discusses techniques for effective compression of digital video. It introduces several key algorithms used in video compression, including discrete cosine transform (DCT) for spatial redundancy reduction, motion estimation (ME) for temporal redundancy reduction, and embedded zerotree wavelet (EZW) transforms. DCT is used to compress individual video frames by removing spatial correlations within frames. Motion estimation compares blocks of pixels between frames to find and encode motion vectors rather than full pixel values, reducing file size. Combined, these techniques can achieve high compression ratios while maintaining high video quality for storage and transmission.
Video Compression Using Block By Block Basis Salience DetectionIRJET Journal
This document presents a method for video compression using block-by-block salience detection. It aims to reduce noticeable coding artifacts in non-region of interest (ROI) parts of video frames by optimizing the saliency-related Lagrange parameter possibly on a block-by-block basis. The proposed method detects ROI using a visual saliency model and encodes ROI blocks with higher quality than non-ROI blocks. It then separates each frame into blocks and uses a conjugate gradient algorithm to iteratively update weight coefficients and minimize a cost function, compressing each block losslessly based on its saliency. An experiment found the proposed method improved visual quality over other perceptual video coding methods according to metrics like eye-tracking weighted PSNR and
This document describes a project to design an H.264 video decoder using Verilog. It implements the key decoding blocks like Context-Based Adaptive Binary Arithmetic Coding (CABAC), inverse quantization, and inverse discrete cosine transform. CABAC is the entropy decoding method used in H.264 that is computationally intensive. The project develops hardware modules for these blocks to accelerate decoding and enable real-time performance. It presents the designs of the individual modules and simulation results showing their functionality. The goal is to improve on software implementations by using dedicated hardware for the critical decoding stages.
Similar to Partial encryption of compresed video (20)
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 04 | Apr-2013, Available @ http://www.ijret.org 714
PARTIAL ENCRYPTION OF COMPRESED VIDEO
Reena R. Ambekar1
, Harsh R. Bhagtani2
, Lavalesh M. Gupta3
,
Priya N. Nichani4
, Tushar P. Borad5
1
A.P, EXTC, 2, 3, 4, 5
B.E. Student
reena.ambekar@yahoo.com, harshbhagtani92@gmail.com, loveleshg100@gmail.com,
piyanshi1991@gmail.com, tusharborad123@gmail.com
Abstract
The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications like
military image database, confidential video conferencing. Real-time secure image and video communication is challenging due to the
processing time and computational requirement for encryption and decryption. Also the speed of most internet connections is very
limited so the amount of data to be transmitted must be reduced. In this research, we shall introduce partial encryption technique on
compressed images and videos. Another algorithm decomposes images into several different parts. We apply encryption algorithm to
encrypt only the crucial parts, which are considerably smaller than original image, which result in significant reduction in processing
time and computational requirement for encryption and decryption as well as reduce the bit rate and bandwidth requirement.
Keywords-Compression, MPEG-4, Partial Encryption
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
Advances in compression, delivery and presentation
technologies of digital video in recent years have broadened the
share of digital video in (audio) visual communication and
entertainment, changing the ways that the end users create,
access, store and copy video. In contrast to analog technologies,
the digital technology offers
• Computer-aided content creation and manipulation,
• Transmission over computer networks,
• Storage and in computer environment,
• Production of identical copies without any specialized
hardware.
However, the listed benefits bring a problem on access control.
Video is transmitted over insecure networks, where a malicious
party can acquire any packet, including those carrying private
communication or commercially valued entertainment data.
[1].This work proposes a method where the video stream is
partially encrypted and the distribution of encrypted bits over
different syntactical entities of the video stream is optimized
constrained to the number of encrypted bits, based on a simple
model to assess the time to break the protection so that the
average time to break the encryption over a temporal sample is
maximized. Therefore, the developed method partial encryption
method can be configured in a straightforward way, regarding
the value of the data, providing solutions for [2] and [3].A
method to estimate the parameters of the model is also
proposed. The estimation method produces parameters
depending on the video stream to be encrypted and it can be
used simultaneously with encoding.
2. BACKGROUND ON VIDEO COMPRESSION
2.1 Video Compression
Video data requires large amount of space for storage in its raw
form. For example, a one minute sequence of 352x288 RGB
frames at 25fps is approximately 430MB. Fortunately, a large
amount of spatial and temporal redundancy resides in such raw
sequences, which can be reduced by compression. The human
visual system is less sensitive to the chrominance information
than the luminance information. Hence, one can down-sample
the chrominance information in every individual frame to
reduce the amount of data to represent perceptually equivalent
frame [5]. A well-known approach for compression is to
eliminate the spatial redundancy by transform coding, which
involves transforming the image. The image in the transform
domain can be approximated with all zero, but a few nonzero
pixels.
Fig 2.1: Block Diagram
2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 04 | Apr-2013, Available @ http://www.ijret.org 715
Discrete cosine transform (DCT) and Wavelet transform are the
most commonly used transformations [6]. Although inferior in
compression, DCT is more commonly used than Wavelet
transform since block wise DCT of the image is more suitable
for block based motion estimation and it is also more popular
than alternative motion estimation methods.
Consecutive frames of a video sequence are usually similar
(except for the locations where the scene changes), with slight
differences due to motion. The redundancies due to this
similarity can be eliminated by modeling the motion. Any
source of symbols can be compressed by entropy coding. The
symbols are coded in a way that a symbol is mapped to a
codeword with the length depending on the frequency of the
symbol. Most of the video coding schemes prefer using prefix
codes with predefined symbol to codeword mappings to
eliminate the overhead due to transmission of the tables. An
alternate method is arithmetic coding [7], which maps the string
to be encoded to a number in the subinterval using the
frequencies of symbols to be encoded. The optimal codeword
assignment is achieved with arithmetic coding, but it requires
more computational power. The entire process of video
encoding can be summarized in Figure 2.1.
2.2 MPEG-4 Natural Video Coding Standard
MPEG-4 is a standard for coding audiovisual objects, enables
re-use of audiovisual content, mixtures of natural and synthetic
content and spatiotemporal arrangements of objects to form
scenes. Thus, natural video coding tools were designed to be
used with such compositions as well as ordinary rectangular
image sequences. Most of these tools are specialized and
practically applicable for a number of configurations. For
example, robust and fast segmentation algorithms are required
to encode nonrectangular video objects from a nature scene, on
the other hand it’s much easier with chroma keying in a studio
environment. [8] and [9]
2.3 Natural Video Coding Tools Provided by MPEG-4
The audiovisual object is the basic entity in an MPEG-4 scene,
which is described in the way specified in ISO/IEC 14496-1, as
well as the transmission of the video object to the decoder.
Each video object is characterized by spatial and temporal
information in the form of texture, motion and shape. Texture
has the spatial and motion has the temporal relation between
the video samples and the spatiotemporal boundary of the
samples is put by the shape information. An MPEG-4 scene
may consist of one or more video objects [8]. The visual bit-
stream provides a hierarchical description of a visual scene
from video objects down to temporal samples of the video
objects and the decoder can access any entity in the hierarchy
by seeking certain code words called start codes, which are not
generated elsewhere in the bit-stream. The hierarchy levels with
their commonly used abbreviations are:
• Visual Object Sequence (VS)
• Video Object (VO)
• Video Object Layer (VOL)
• Video Object Plane (VOP)
• Group of Video Object Planes (GOV)
A profile is a subset of MPEG-4 coding tools and a level is the
restrictions on the parameters of the encoding tools. Profile and
level information is signaled in the bit stream so that a decoder
can deduce whether it has the capability of processing the
stream. Still textures are supported by scalable still texture
profile and mapping of these textures on 2D dynamic meshes is
supported by animated 2D mesh profile [9, 10].
2.4 Error Resilience and Concealment Tools
Every unencrypted piece of bit-stream is treated as a bit-stream
error by a standard player. Therefore it is desired that the
encryption scheme must be robust to any concealment tool
which is available due to the nature of the video stream. Bit
errors in VLC encoded data results loss of synchronization and
the bit-stream till the next synchronization marker or start code
cannot be decoded. In this way, error is localized and precise
localization results more correct decoding [13]. MPEG-4
markers are placed into the bit-stream so that the macro-blocks
between two resynchronization markers are just above a
predetermined threshold. In this way, data is packetized so that
each packet is equally important since they contain nearly the
same amount of compressed bit-stream. The resynchronization
marker is followed by the number of the first macro-block in
the packet, its absolute quantization scale, optionally redundant
header information and the macro-blocks in the packet. The
predictive coding used to code the macro-blocks in a packet
does not use prediction information from other macro-blocks.
In addition to the packet approach, MPEG-4 also adopts a
second method called fixed interval resynchronization. This
method requires that VOP start codes and resynchronization
markers appear at only fixed locations in the bit-stream, which
avoids most of the problems due to start code emulation.
3. VIDEO ENCRYPTION
3.1 Cryptography
Cryptography is the subset of science concerned in encoding
data, also called encryption, so that it can only be decoded, also
called as decryption, by specific individuals. A system for
encrypting and decrypting data is a cryptosystem. Encryption
usually involves an algorithm for combining the original data
(―plaintext‖) with one or more ―keys‖ — numbers or strings of
characters known only to the sender and/or recipient. The
resulting output of encryption is known as ―cipher text‖. There
are two main classes of cryptosystems, with different practical
application areas in today’s technology. Public key methods use
two different keys for encryption and decryption. On the other
hand, secret key encryption methods use the same key for
encryption and decryption.
3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 04 | Apr-2013, Available @ http://www.ijret.org 716
3.2 Cryptosystems
Secret key methods can be classified in two groups, namely
block and stream ciphers. Block ciphers encrypt and decrypt in
multiples of blocks and stream ciphers encrypt and decrypt at
arbitrary data sizes. Block ciphers are mostly based on the idea
by Shannon that sequential application of confusion and
diffusion will obscure redundancies in the plaintext, where
confusion involves substitutions to conceal redundancies and
statistical patterns in the plaintext and diffusion involves
transformations (or permutations) to dissipate the redundancy
of the plaintext by spreading it out over the cipher text. DES
and Rijndael are examples of algorithms based on this idea,
which allows simple hardware implementations or fast
computer implementations by use of simple arithmetic,
however they are not fast enough to encrypt large volumes of
data in real time. Most of the stream ciphers rely on the fact
that XORing the plaintext with a string only known to the
sender and receiver provides strong encryption. In order to
generate the string one can use a block cipher to encrypt a
sequence known to both, as suggested in Rijndael specification.
A stream can also be encrypted by block ciphers after being
aligned to block boundaries, in cipher block chaining mode,
where the encryption process of a block depends on the
previous block due to XORing of previous cipher text with the
plaintext of the block. The most popular public key method is
RSA, which uses large prime numbers and modular arithmetic
to encrypt a given text. RSA is slower and more complicated to
be implemented in hardware since the primes are usually
greater than 512-bits in size and the algorithm requires
computation of powers and remainders with those large primes,
the benchmark in Slagell’s thesis [13] concludes that RSA is at
least three times slower than secret-key methods and processing
time increases cubically with key size on x86 architecture
whereas secret-key methods cause slight increases. However,
private key is not predictable given the public key and vice
versa, therefore a sender-receiver pair can establish a one-way
secure channel with the transfer of the encryption key from
receiver to the sender. A common application of public key
methods is to transfer a secret key to encrypt a larger amount of
data.
3.3 Cryptanalysis
Cryptanalysis is the science concerned in breaking
cryptosystems. Cryptanalysis generally involves the following
main methods:
• A cryptanalyst can inspect a number of particular cipher texts
for certain patterns and correlations. This method of attempting
to break a cryptosystem is called a cipher text-only attack. An
MMX implementation for inverse DCT requires not less than a
thousand processor cycles per 8×8 block and iDCT counts one
third of decoding effort
• The cryptanalyst may have the plaintexts besides the cipher
texts. In this case, it may be possible to investigate the relation
between the plaintexts and the corresponding Cipher texts. This
type of attack is called a known-plaintext attack.
• As a last method, one can exhaustively try a set of keys until a
decryption decided to be valid is achieved, which is impractical
for large amounts of data or large key spaces.
3.4 Encryption Algorithm
In this algorithm we take MPEG-4 compressed video as data
for starting the algorithm process. It will first read the number
of frames and then each frame it will divide into type of frames
i.e. I, P or B frames. Depending on the type then it will start
actual encryption process. I-frame is an independent frame
which requires full encoding process. P-frame is a Predicted
frame which will be predicted from previous frame and requires
partly encoding process.
Fig 3.4: Encryption Algorithm
B-frame is a Bi-directional predicted frame which will depend
on previous and future frames and requires partly encoding
process as algorithm explained in figure 3.4.
4. TEST ENVIRONMENT
We have implemented encryption process on images. The
following figures show the encrypted as well as the decrypted
image.
Fig 4(a): Original Image
4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 04 | Apr-2013, Available @ http://www.ijret.org 717
Fig 4(b): Encrypted Image
Fig 4(c): Decrypted Image
5. PROBLEM DEFINATION
However, the listed benefits bring a problem on access control.
Video is transmitted over insecure networks, where a malicious
party can acquire any packet, including those carrying private
communication or commercially valued entertainment data.
The network, in particular the Internet, also allows peers to
share their files, resulting exponentially increasing number of
copies; a phenomenon called super-distribution. The path
between the content creator and the viewer must be secured, so
that the only viewers that are authorized by the content creator
(or presenter) can access the video, which corresponds to
preservation of privacy and prevention of piracy in one-to-one
communication and broadcasting cases, respectively. It is also
desirable that the viewer must be able to produce copies as long
as a policy established by the content creator permits.
Encryption of video, combined with access control logic
implemented in the player is essential to prevent unwanted
content acquisition. There are a number of issues to be
considered while designing an access control mechanism, as
pointed out by previous works:
1. Encryption (and decryption) of a video stream entirely takes
considerable amount of time, which can be comparable to the
decoding time. Therefore, only a carefully selected portion of
video can be encrypted, to limit the cost of the operation.
2. The protection level for the content must be identified.
Considering the business of copyrighted items trade, in
particular entertainment, the increase in piracy boosts the
demand for legitimate items. Therefore, paranoid protection
may offend the end user and reduce the demand; on the other
hand a loose protection mechanism may harm the business
setup, reducing the revenues.
3. The protected video may have a limited lifetime, in the sense
that it is of no value after some time on. For example, piracy
makes sense if a protected live soccer broadcast can be broken
until excerpts from the match are broadcast publicly in the
succeeding sports programs. Therefore a protection scheme that
needs just more time than the lifetime of the content is robust.
6. PROPOSED ENCRYPTION TECHNIQUE
As pointed by [13], data can be encrypted in any stage of the
encoding process. However, every point is not equally
advantageous in terms of format compliance, encryption
overhead, compression efficiency, process ability, syntax
awareness and transmission friendliness, which form a set of
important criteria for many applications. Having attempted to
encrypt every syntactical entity in the encoded video, the recent
concerns of the study of video encryption were syntax
compliance and process ability of the unencrypted bit stream by
third parties to manipulate transmission rates and to allow
searches. However, the limitation of the bit rate of the
encrypted portion of the video stream while keeping security
maximized remains as an open problem, which requires
distribution of the budget of encrypted bits over the syntactical
entities of video. Another unattacked problem is encoding of
the encryption side information compactly and error resilient.
We propose a novel solution called partial encryption, in which
a secure encryption algorithm is used to encrypt only part of the
compressed data for compressed images and videos. We shall
implement various methods of compression and decide the best
that suites us. Another algorithm decomposes images into
several different parts. We will encryption algorithm to encrypt
only the crucial parts, which are considerably smaller than the
original image, which result in significant reduction in
processing time and computational requirement for encryption
and decryption as well as reduce the bit rate and bandwidth
requirement.
7. RESULT
Access control on the media is essential in both commercial
broadcasting and peer-to-peer communication. An access
control mechanism must be supported by encryption in order to
ensure that only authorized accesses are possible. Partial
encryption takes relatively small amount of time, compared to
the decoding process; the time is not negligible, however. A
configurable yet maximally secure encryption method is
required, as not all video streams are of equal value. In order to
accomplish this task, a solution to encrypt video is proposed,
which consists of a simple model of the average time required
to break a portion of the encrypted video.
CONCLUSIONS
Unlike previously developed video encryption methods, the
proposed method is capable of controlling the rate of the
encrypted stream at a level that can be specified by the content
5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 04 | Apr-2013, Available @ http://www.ijret.org 718
creator/provider while keeping the stream as robust as possible.
The advantage of this control can be used in two ways:
• The content provider can assess the level of encryption to
protect a video stream with known value
•The player designer/implementer can estimate the
computational power required to play a video with certain
security requirements, which will lead to a more efficient
design. The model is generalizable to other video coding
schemes, including codecs with temporal scalability; the
procedure involves identification of levels with dependency
relations between one another.
FUTURE SCOPE
Future research will focus on adding support for encryption
framework, thereby further increasing the flexibility of the
encryption process. The method can be extended to video
access control implementations that en-crypt the indexes of
codeword instead of code words themselves, instead of the
direct encryption method implemented here. One can set up a
series of experiments to establish a number of encryption
profiles. Selection between preset profiles might be helpful
with a lightweight encoder. Experiments show that the
encryption in slow motion video is more uniform, thus this
method can be implemented for video communication
applications.
BIOGRAPHIES
[1] M. Eskicioglu, J. Town, and E. J. Delp, ―Security of
digital entertainment content from creation to
consumption,‖ Signal Processing: Image Communication,
vol. 18, pp. 237–262, and 2003.
[2] J. Wen, M. Severa, W. Zeng, M. Luttrell, and W. Jin, ―A
format compliant configurable Encryption framework for
access control of multimedia,‖ in Proc. IEEE Workshop
on Multimedia Signal Processing, pp. 435–440, 2001.
[3] A. M. Eskicioglu and E. J. Delp, ―An overview of
multimedia content protection in consumer electronics
devices,‖ Signal Processing: Image Communication, vol.
16, pp. 681–699, 2001.
[4] A. Gayer and O. Shy, ―Copyright protection and hardware
taxation,‖ Information Economics and Policy, vol. 0 (in
print), pp. 0–0, 2003
[5] A. M. Tekalp, Digital Video Processing, pp. 432–500.
Prentice Hall, 1995.
[6] S. Mallat, A Wavelet Tour of Signal Processing.
Academic Press, 1998.
[7] W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P.
Flannery, Numerical Recipes in C: The Art of Scientific
Computing, pp. 903–926. Cambridge University Press, 2
ed., 1992.
[8] T. Ebrahimi and C. Horne, ―MPEG-4 natural video
coding – an overview,‖ Signal Processing: Image
Communication, vol. 15, pp. 365–385, 2000.
[9] ISO/IEC JTC1/SC29 WG11, ISO/IEC 14496-2 FCD
N2202, March 1998.
[10] R. Koenen, ―Profiles and levels in MPEG-4: approach and
overview,‖ Signal Processing: Image Communication,
vol. 15, pp. 463–478, 2000.
[11] H. Cheng, ―Partial encryption for image and video
communication,‖ Master’s thesis, University of Alberta,
1998.
[12] T. Zhang, U. Jennehag, and Y. Xu, ―Numerical modeling
of transmission errors and video quality of MPEG-2,‖
Signal Processing: Image Communication, vol. 16, pp.
817–825, 2001.
[13] A. J. Slagell, ―A simple, portable and expandable
cryptographic application pro-gram interface,‖ Master’s
thesis, University of Illinois at Urbana-Champaign, 2003.
[14] M. Wu and Y. Mao, ―Communication-friendly encryption
of multimedia,‖ in Proc. of IEEE Multimedia System
Processing Workshop, 2002.