New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
CONFIDENTIAL University of Toronto Multimedia Lab Karl Martin | Prof. Kostas.
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.
Sri Lanka Institute of Information Technology
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Efficient aggregation of encrypted data in Wireless Sensor Network Author: Einar Mykletun, Gene Tsudik Presented by Yi Cheng Lin Date: March 13, 2007.
On the use of hierarchical prediction structures for efficient summary generation of H.264/AVC bitstreams Luis Herranz, Jose´ M. Martı´nez Image Communication.
Application of Generalized Representations for Image Compression Application of Generalized Representations for Image Compression using Vector Quantization.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
SWE 423: Multimedia Systems Chapter 7: Data Compression (1)
Efficient Scalable Video Compression by Scalable Motion Coding Review and Implementation of DWT Based Approach Syed Jawwad Bukhari
VHDL AES 128 Encryption/Decryption
Video Streaming: An FEC-Based Novel Approach Jianfei Cai, Chang Wen Chen Electrical and Computer Engineering, Canadian Conference on.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Electronic mail security -- Pretty Good Privacy.
Group Key Distribution Chih-Hao Huang
Unequal Loss Protection: Graceful Degradation of Image Quality over Packet Erasure Channels Through Forward Error Correction Alexander E. Mohr, Eva A.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Electronic Mail Security
Image Watermarking For Tampering Protection and Self-Recovery
1 Telematics/Networkengineering Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.
Quality of Protection (QoP) An approach that separates the development of security services from the application development partitions security services.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. J.Almeida, J.Barros Instituto de Telecomunicações Universidade do Porto Joint.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Chapter Ten The Application and Presentation Layers.
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,
Adaptive Multi-path Prediction for Error Resilient H.264 Coding Xiaosong Zhou, C.-C. Jay Kuo University of Southern California Multimedia Signal Processing.
RTP Encryption for 3G Networks Rolf Blom, Elisabetta Carrara, Karl Norrman, Mats Näslund Communications Security Lab Ericsson.
WEP Protocol Weaknesses and Vulnerabilities
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Collusion-Resistant Anonymous Data Collection Method Mafruz Zaman Ashrafi See-Kiong Ng Institute for Infocomm Research Singapore.
Lecture 2: Introduction to Cryptography
MPEG-1Standard By Alejandro Mendoza. Introduction The major goal of video compression is to represent a video source with as few bits as possible while.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Group Key Distribution Xiuzhen Cheng The George Washington University.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Computer Security coursework 3 Dr Alexei Vernitski.
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
Secure Scalable Multimedia Streaming Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
RATE SCALABLE VIDEO COMPRESSION Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai,
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
A Partial Survey of the Perfect Digital Watermark Problem.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
 Plain Text : The original message (text, image,video,… etc.  Cipher Key : Encryption works by running the data (represented as numbers) through a special.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
Basic Encryption: methods and tools
隱 像 術 張真誠 國立中正大學資訊工程研究所.
ATTACKS ON WINZIP ENCRYPTION
Cryptography This week we are going to use OpenSSL
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Number Systems Instructions, Compression & Truth Tables.
DISSERTATION ON CRYPTOGRAPHY.
Kyoungwoo Lee, Nikil Dutt, and Nalini Venkatasubramanian
Exercise 1: Let’s Communicate - Decrypt The message
Presentation transcript:

New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto

2 I. Introduction Communications becoming more multimedia in nature – images and video Confidentiality must be provided for next generation applications – e.g., online collaboration Strong encryption, e.g. AES, is not suitable to be applied to entire image/video bitstream – too computationally complex

3 I. Introduction cont’d Partial encryption Encrypt only part of a compressed bit-stream to reduce computational complexity Compression aids encryption by removing redundancy Encrypt “most important” information Make location of unencrypted portion difficult to find

4 III. Proposed Secure Coder

5 III. Proposed Secure Coder cont’d Employs Color Set Partitioning in Hierarchical Trees (C-SPIHT), wavelet-based coding Coder directs stream cipher to encrypt certain bits after color image coding Coding efficiency is unaffected since coded bits are simply replaced (encrypted) Most important bits are encrypted while progressive/embedded coding makes unencrypted bits difficult to determine

6 IV. Simulation Results Images decoded without decrypting LenaMapDocumentTulip