Atjaunināt sīkdatņu piekrišanu

E-grāmata: Embedded Multimedia Security Systems: Algorithms and Architectures

  • Formāts: PDF+DRM
  • Izdošanas datums: 14-Sep-2012
  • Izdevniecība: Springer London Ltd
  • Valoda: eng
  • ISBN-13: 9781447144595
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 14-Sep-2012
  • Izdevniecība: Springer London Ltd
  • Valoda: eng
  • ISBN-13: 9781447144595
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Opening with a detailed review of techniques for selective encryption, this book examines algorithms that combine encryption and compression. Presents a selection of specific examples of the design and implementation of secure embedded multimedia systems.
Part I Multimedia Systems
1 Introduction
3(8)
1.1 Video Coding
3(3)
1.2 Embedded Systems and Reconfigurable Architectures
6(2)
1.3 Encryption Basics
8(3)
2 Advances in Multimedia Encryption
11(12)
2.1 Introduction
11(1)
2.2 Multimedia Encryption Problem
12(1)
2.3 Common Approaches to Video Encryption
13(10)
2.3.1 Scrambling
13(4)
2.3.2 Post-compression Encryption Algorithm
17(2)
2.3.3 Pre-compression Encryption Algorithm
19(1)
2.3.4 Selective Encryption
19(2)
2.3.5 Joint Video Compression and Encryption (JVCE) Approaches
21(1)
2.3.6 Future of JVCE Schemes
21(1)
References
22(1)
3 Securing Multimedia Content Using Joint Compression and Encryption
23(10)
3.1 Introduction
23(1)
3.2 Basics
24(2)
3.3 Our Approach
26(7)
References
28(5)
Part II Examples
4 Polymorphic Wavelet Transform
33(34)
4.1 Introduction
33(4)
4.2 Motivation and Insight
37(3)
4.2.1 Daubechies 9/7-Tap Bi-orthogonal Filter
38(1)
4.2.2 Le Gall's 5/3 Filter
39(1)
4.3 Background and Related Work
40(3)
4.3.1 Wavelet Transform Background
41(1)
4.3.2 Hardware Implementation of DWT
42(1)
4.4 Poly-DWT Filter
43(8)
4.4.1 Parameterized Filter Design
43(1)
4.4.2 Numerical Study
44(1)
4.4.3 Candidate Filters
45(2)
4.4.4 Hardware Architectures
47(4)
4.5 Fixed Point Implementation
51(1)
4.6 Hardware (Re)-allocation
52(3)
4.6.1 `On-the-Fly' Switching
52(2)
4.6.2 `Bit-Width' Switching
54(1)
4.7 Experiments
55(7)
4.7.1 Image Reconstruction Quality
55(1)
4.7.2 Hardware vs. Software Performance
56(1)
4.7.3 Hardware Comparison
57(3)
4.7.4 Dynamic Bit Allocation
60(1)
4.7.5 Real-World Application
60(2)
4.8 Conclusions and Future Work
62(5)
References
62(5)
5 The Secure Wavelet Transform
67(24)
5.1 Introduction
67(2)
5.2 Preliminaries
69(7)
5.2.1 Parameterized Construction of DWT
70(4)
5.2.2 Subband Re-orientation
74(2)
5.3 Security
76(3)
5.4 Hardware Implementation
79(5)
5.4.1 Reconfigurable Constant Multiplier (RCM)
80(4)
5.4.2 Implementation Results
84(1)
5.5 Parameterized Lifting
84(3)
5.6 Conclusion and Future Work
87(4)
References
87(4)
6 Chaotic Filter Banks
91(22)
6.1 Introduction
91(3)
6.1.1 Chaos and Cryptography
91(1)
6.1.2 Wavelets and Chaotic Filter Banks
92(1)
6.1.3 Scope and Organization
93(1)
6.1.4 Reconfigurable Hardware Implementation of DWT
93(1)
6.2 Chaotic Filter Bank Scheme
94(2)
6.2.1 Chaotic Maps
95(1)
6.2.2 Key Space
95(1)
6.3 The MCFB Scheme
96(2)
6.4 Improved Chaotic Oscillator
98(2)
6.4.1 The Modified Logistic Map (MLM)
98(2)
6.5 Wavelet Parameterization
100(1)
6.6 Resistance of Chaotic Generator Against Cryptanalysis
100(5)
6.6.1 Randomness Tests
101(2)
6.6.2 Bifurcation Map
103(1)
6.6.3 Lyapunov Exponent
103(2)
6.7 Security Enhancement
105(1)
6.8 Hardware Implementation
106(3)
6.8.1 Hardware Optimizations for ICO
108(1)
6.9 Conclusions
109(4)
References
109(4)
7 Chaotic Arithmetic Coding
113(30)
7.1 Introduction
113(2)
7.1.1 Weakness of SAC Coder
114(1)
7.2 Arithmetic Coding with Piece-wise Linear Chaotic Maps
115(6)
7.2.1 Compression Efficiency
117(1)
7.2.2 Binary Chaotic Arithmetic Coding (BCAC)
118(3)
7.2.3 Implementation Efficiency
121(1)
7.3 Security
121(8)
7.3.1 Application to Multimedia/Data Encryption
121(1)
7.3.2 Threat Model
122(1)
7.3.3 Security Enhancements (SE)
122(3)
7.3.4 Resistance to Known Attacks
125(2)
7.3.5 Comparison with BAC+AES
127(1)
7.3.6 Key and Plaintext Sensitivity
127(2)
7.3.7 Selective Encryption Using BCAC
129(1)
7.4 Compression
129(1)
7.5 Hardware Implementation
130(7)
7.5.1 Literature Review
131(1)
7.5.2 Implementation Details
132(1)
7.5.3 Binary Arithmetic Coder (BAC) Architecture
133(1)
7.5.4 Binary Chaotic Arithmetic Coder and Encryption (BCAC) Architecture
133(1)
7.5.5 Cost of Encryption
134(1)
7.5.6 N-ary Chaotic Arithmetic Coder and Encryption (NCAC) Coding
134(2)
7.5.7 Multiple Symbol per Cycle Arithmetic Coding
136(1)
7.6 Related Work
137(3)
7.6.1 Multiple Huffman Tables
137(1)
7.6.2 Randomized Arithmetic Coding
138(1)
7.6.3 Secure Arithmetic Coding
139(1)
7.7 Conclusion
140(3)
References
140(3)
8 Conclusion
143(2)
Index 145
Dr. Amit Pande is an NSF Computing Innovation Fellow at the Department of Computer Science of the University of California, Davis, USA. Dr. Joseph Zambreno is an Associate Professor and Co-Director of the Reconfigurable Computing Lab at Iowa State University, Ames, USA.