Current Search: Multimedia systems--Security measures (x)
View All Items
- Title
- Video identification using video tomography.
- Creator
- Furht, Borko, Kalva, Hari, Leon, Gustavo, Yellamraju, Sivakiran
- Date Issued
- 2009
- PURL
- http://purl.flvc.org/fcla/dt/347362
- Subject Headings
- Multimedia systems --Security measures., Digital watermarks., Digital video.
- Format
- Document (PDF)
- Title
- Permutation-based transformations for digital multimedia encryption and steganography.
- Creator
- Socek, Daniel, Florida Atlantic University, Furht, Borko, Magliveras, Spyros S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The aim of this work is to explore the utilization of permutation-based transformations to achieve compression, encryption and steganography in the domain of digital videos. The main contribution of this dissertation is a novel type of digital video encryption that has several advantages over other currently available digital video encryption methods. An extended classification of digital video encryption algorithms is presented in order to clarify these advantages. The classification itself...
Show moreThe aim of this work is to explore the utilization of permutation-based transformations to achieve compression, encryption and steganography in the domain of digital videos. The main contribution of this dissertation is a novel type of digital video encryption that has several advantages over other currently available digital video encryption methods. An extended classification of digital video encryption algorithms is presented in order to clarify these advantages. The classification itself represents an original work, since to date, no such comprehensive classification is provided in known scientific literature. Both security and performance aspects of the proposed method are thoroughly analyzed to provide evidence for high security and performance efficiency. Since the basic model is feasible only for a certain class of video sequences and video codecs, several extensions providing broader applicability are described along with the basic algorithm. An additional significant contribution is the proposition of a novel type of digital video steganography based on disguising a given video by another video. Experimental results are generated for a number of video sequences to demonstrate the performance of proposed methods.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12225
- Subject Headings
- Image processing--Security measures, Data encryption (Computer science), Computer security, Multimedia systems--Security measures
- Format
- Document (PDF)
- Title
- An innovative pixel scoring method for watermarking of binary document images.
- Creator
- Furht, Borko, Muharemagic, Edin
- Date Issued
- 2008-07-09 - 2006-07-12
- PURL
- http://purl.flvc.org/fcla/dt/363492
- Subject Headings
- Digital watermarking., Multimedia systems --Security measures., Data encryption (Computer science) --Technological innovations.
- Format
- Document (PDF)
- Title
- New approaches to encryption and steganography for digital videos.
- Creator
- Furht, Borko, Socek, Daniel, Kalva, Hari, Magliveras, Spyros S., Marques, Oge, Culibrk, Dubravko
- Date Issued
- 2007
- PURL
- http://purl.flvc.org/fcla/dt/337435
- Subject Headings
- Multimedia systems --Security measures., Digital video., Digital watermarking., Data encryption (Computer science) --Technological innovations., Cryptography.
- Format
- Document (PDF)
- Title
- A method for adding multimedia knowledge for improving intrusion detection systems.
- Creator
- Baillargeon, Pierre Elliott., Florida Atlantic University, Marques, Oge
- Abstract/Description
-
Intrusion Detection Systems (IDS) are security tools which monitor systems and networks for malicious activity. In saturated network links the amount of data present for analysis can overwhelm them, resulting in potentially undetected attacks. Many of these network links contain significant amounts of multimedia traffic which may seem to contribute to the problem, however our work suggests otherwise. This thesis proposes a novel method to classify and analyze multimedia traffic in an effort...
Show moreIntrusion Detection Systems (IDS) are security tools which monitor systems and networks for malicious activity. In saturated network links the amount of data present for analysis can overwhelm them, resulting in potentially undetected attacks. Many of these network links contain significant amounts of multimedia traffic which may seem to contribute to the problem, however our work suggests otherwise. This thesis proposes a novel method to classify and analyze multimedia traffic in an effort to maximize the efficiency of IDS. By embedding multimedia-specific knowledge into IDS, trusted multimedia contents can be identified and allowed to bypass the detection engine, thereby allowing IDS to focus its limited resources on other traffic. The proposed framework also enables IDS to detect multimedia-specific exploits which would otherwise pass under the radar. Results of our experiments confirm our claims and show substantial CPU savings in both streaming and non-streaming scenarios.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13242
- Subject Headings
- Computer networks--Security measures, Computers--Access control, Electronic countermeasures, Digital watermarking, Multimedia systems--Security measures
- Format
- Document (PDF)