Embedded Multimedia Security Systems

by ;
Format: Hardcover
Pub. Date: 2012-09-14
Publisher(s): Springer-Verlag New York Inc
  • Free Shipping Icon

    Free Shipping On Orders Over $35

    Your order must be $35 or more to qualify for free economy shipping. Marketplace items, eBooks and apparel do not qualify towards the $35 purchase minimum.

  • eCampus.com Device Compatibility Matrix

    Click the device icon to install or view instructions

    Apple iOS | iPad, iPhone, iPod
    Apple iOS | iPad, iPhone, iPod
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Windows 10 / 8 / 7 / Vista / XP
    Windows 10 / 8 / 7 / Vista / XP
    Mac OS X | **iMac / Macbook
    Mac OS X | **iMac / Macbook
    Enjoy offline reading with these devices
    Apple Devices
    Android Devices
    Windows Devices
    Mac Devices
    iPad, iPhone, iPod
    Our reader is compatible
     
     
     
    Android 2.2 +
     
    Our reader is compatible
     
     
    Kindle Fire
     
    Our reader is compatible
     
     
    Windows
    10 / 8 / 7 / Vista / XP
     
     
    Our reader is compatible
     
    Mac
     
     
     
    Our reader is compatible
List Price: $149.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$35.64
Online:60 Days access
Downloadable:60 Days
$47.52
Online:90 Days access
Downloadable:90 Days
$59.40
Online:120 Days access
Downloadable:120 Days
$71.28
Online:180 Days access
Downloadable:180 Days
$77.22
Online:1825 Days access
Downloadable:Lifetime Access
$118.80
$77.22

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Author Biography

Dr. Amit Pande is an NSF Computing Innovation Fellow at the Department of Computer Science of the University of California, Davis, USA. Dr. Joseph Zambreno is an Associate Professor and Co-Director of the Reconfigurable Computing Lab at Iowa State University, Ames, USA.

Table of Contents

Multimedia Systems
Introductionp. 3
Video Codingp. 3
Embedded Systems and Reconfigurable Architecturesp. 6
Encryption Basicsp. 8
Advances in Multimedia Encryptionp. 11
Introductionp. 11
Multimedia Encryption Problemp. 12
Common Approaches to Video Encryptionp. 13
Scramblingp. 13
Post-compression Encryption Algorithmp. 17
Pre-compression Encryption Algorithmp. 19
Selective Encryptionp. 19
Joint Video Compression and Encryption (JVCE) Approachesp. 21
Future of JVCE Schemesp. 21
Referencesp. 22
Securing Multimedia Content Using Joint Compression and Encryptionp. 23
Introductionp. 23
Basicsp. 24
Our Approachp. 26
Referencesp. 28
Examples
Polymorphic Wavelet Transformp. 33
Introductionp. 33
Motivation and Insightp. 37
Daubechies 9/7-Tap Bi-orthogonal Filterp. 38
Le Gall's 5/3 Filterp. 39
Background and Related Workp. 40
Wavelet Transform Backgroundp. 41
Hardware Implementation of DWTp. 42
Poly-DWT Filterp. 43
Parameterized Filter Designp. 43
Numerical Studyp. 44
Candidate Filtersp. 45
Hardware Architecturesp. 47
Fixed Point Implementationp. 51
Hardware (Re)-allocationp. 52
'On-the-Fly' Switchingp. 52
'Bit-Width' Switchingp. 54
Experimentsp. 55
Image Reconstruction Qualityp. 55
Hardware vs. Software Performancep. 56
Hardware Comparisonp. 57
Dynamic Bit Allocationp. 60
Real-World Applicationp. 60
Conclusions and Future Workp. 62
Referencesp. 62
The Secure Wavelet Transformp. 67
Introductionp. 67
Preliminariesp. 69
Parameterized Construction of DWTp. 70
Subband Re-orientationp. 74
Securityp. 76
Hardware Implementationp. 79
Reconfigurable Constant Multiplier (RCM)p. 80
Implementation Resultsp. 84
Parameterized Liftingp. 84
Conclusion and Future Workp. 87
Referencesp. 87
Chaotic Filter Banksp. 91
Introductionp. 91
Chaos and Cryptographyp. 91
Wavelets and Chaotic Filter Banksp. 92
Scope and Organizationp. 93
Reconfigurable Hardware Implementation of DWTp. 93
Chaotic Filter Bank Schemep. 94
Chaotic Mapsp. 95
Key Spacep. 95
The MCFB Schemep. 96
Improved Chaotic Oscillatorp. 98
The Modified Logistic Map (MLM)p. 98
Wavelet Parameterizationp. 100
Resistance of Chaotic Generator Against Cryptanalysisp. 100
Randomness Testsp. 101
Bifurcation Mapp. 103
Lyapunov Exponentp. 103
Security Enhancementp. 105
Hardware Implementationp. 106
Hardware Optimizations for ICOp. 108
Conclusionsp. 109
Referencesp. 109
Chaotic Arithmetic Codingp. 113
Introductionp. 113
Weakness of SAC Coderp. 114
Arithmetic Coding with Piece-wise Linear Chaotic Mapsp. 115
Compression Efficiencyp. 117
Binary Chaotic Arithmetic Coding (BCAC)p. 118
Implementation Efficiencyp. 121
Securityp. 121
Application to Multimedia/Data Encryptionp. 121
Threat Modelp. 122
Security Enhancements (SE)p. 122
Resistance to Known Attacksp. 125
Comparison with BAC+AESp. 127
Key and Plaintext Sensitivityp. 127
Selective Encryption Using BCACp. 129
Compressionp. 129
Hardware Implementationp. 130
Literature Reviewp. 131
Implementation Detailsp. 132
Binary Arithmetic Coder (BAC) Architecturep. 133
Binary Chaotic Arithmetic Coder and Encryption (BCAC) Architecturep. 133
Cost of Encryptionp. 134
N-ary Chaotic Arithmetic Coder and Encryption (NCAC) Codingp. 134
Multiple Symbol per Cycle Arithmetic Codingp. 136
Related Workp. 137
Multiple Huffman Tablesp. 137
Randomized Arithmetic Codingp. 138
Secure Arithmetic Codingp. 139
Conclusionp. 140
Referencesp. 140
Conclusionp. 143
Indexp. 145
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.