A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCR
#1

presented by:
ANITHA TENALI

[attachment=9182]
A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCRETE WAVELET TRANSFORM
Multimedia encryption Background

• Multimedia data (images, videos, audios, etc.) is being used more and more widely, in applications such as video-on demand, video conferencing, broadcasting, etc.
• In order to maintain privacy or security, sensitive data needs to be protected before transmission.
• Encryption Technique
 Transforms the data from the original form into an unintelligible form
• such as AES, RSA, or IDEA
Security Goals
• The goals for protecting any system are to assure that the following criteria are met:
• 1. Data Integrity– data is created/modified by authorized parties only.
• 2. Secrecy/Confidentiality – access is restricted to authorized parties.
• 3. Authentication – verifying identity
• 4. Non-repudiation – verification of action or data
Objective
• To enable lightweight multimedia encryption and authentication.
• To provide a high compression ratio and image reconstruction quality so as to serve the end user requirements.
• To optimize the hardware architecture for high performance like High throughput and low power requirements of the System.
ExistingMethodology & Drawbacks
• Cryptography : The process of encrypting a plain-text message into an unreadable cipher so that it can be sent through a network to be decrypted/deciphered by the intended recipient.
• The existing popular encryption algorithms such as AES and DES have large computational requirements.
• Encryption algorithms such as AES, DES or IDEA are typically applied over the full or partial output bit stream obtained from the compression engine, which is shown in figure(a)
Proposed Concept
• The existing approach restricts hardware design for DWT that requires low power consumption and hardware usage, such a design limits efficient delivery of scalable video streams.
• These restrictions can be alleviated by developing a scheme that integrates both encryption and compression operations into one without any significant computational overheads called light-weight encryption which is shown in fig(b).
Major Requirements and Desirable Features
• Complexity is an important consideration
 Real-time applications, low-power device
• Content leakage
 Content degradation vs. secrecy
• Compression efficiency overhead
 Due to change of compression parameters/procedure, change of data statistics, additional header etc.
• Error resilience.
 Error confinement in lossy network, synchronization
Proposed Block Diagram
Cryptography

 Cryptography is the process of converting ordinary information (i.e. plain text) into unintelligible gibberish (i.e. cipher text).
 A cipher is a pair of algorithms which creates the encryption and the reversing decryption. The operation of a cipher is controlled both by the algorithm and, in each instance, by a key.
 Keys are important, as ciphers without variable keys are trivially breakable and therefore less than useful for most purposes
Reply
#2
hi ....

please provide more information about this project....


mail id ursbaji[at]gmail.com
Reply
#3

[attachment=10584]
An Efficient Hardware Architecture for Multimedia Encryption and Authentication using the Discrete Wavelet Transform
Abstract:

A discrete wavelet transform (DWT) is any wavelet transform for which the wavelets are discretely sampled. As with other wavelet transforms, a key advantage it has over Fourier transforms is temporal resolution as it captures both frequency and location information. The discrete wavelet transform has a huge number of applications in science, engineering, mathematics and computer science. Most notably, it is used for signal coding, to represent a discrete signal in a more redundant form, often as a preconditioning for data compression.
The Discrete Wavelet Transform (DWT) has enabled research in image and video coding and has become a part of multiple next generation multimedia compression and transmission standards. The increasing importance of the DWT in image and multimedia compression applications has inspired the development of efficient hardware for implementations. Figure 1 shows some constraints in the design of a DWT filter. It must provide a high compression ratio and image reconstruction quality so as to serve the end
user requirements. Some other desired features include low hardware cost, low power requirements and high throughput of the system.
This paper introduces a zero-overhead encryption and authentication scheme for real-time embedded multimedia systems. The parameterized construction of the Discrete Wavelet Transform (DWT) compression block is used to introduce a free parameter in the design. It allows building a keyspace for lightweight multimedia encryption. The parametrization yields rational coefficients leading to an efficient fixed point hardware implementation. A clock speed of over 240 MHz was achieved on a Xilinx Virtex 5 FPGA. Comparison with existing approaches was performed to indicate the high throughput and low hardware overhead in adding the security feature to the DWT architecture.
Software’s/Tools:
• The project will be implemented using HDL.
• Simulation will be done to verify the functionality and synthesis will be done to get the NETLIST.
• Simulation and synthesis will be done using Xilinx Tools.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: an efficient hardware architecture for multimedia encryption documentation, san architecture and hardware devices pdf, paper presentations on nanorobot hardware architecture for medical defense, multimedia and 3d animation techniques ppt, multimedia systems and design, hardware implementation of a digital watermarking system for video authentication, architecture for multimedia support,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Multimedia History seminar class 1 16,684 07-03-2019, 06:22 AM
Last Post:
  Data Encryption Standard (DES) seminar class 2 9,331 20-02-2016, 01:59 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 14,726 27-04-2015, 01:48 PM
Last Post: seminar report asees
  Computer Architecture Requirements? shakir_ali 1 26,967 07-04-2015, 12:04 PM
Last Post: Kishore1
  Computer Architecture ACS Project? shakir_ali 0 7,505 30-10-2014, 12:01 AM
Last Post: shakir_ali
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,027 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Hardware for image processing - Basics Eye – Human vision sensor ppt computer topic 0 7,756 25-03-2014, 11:12 PM
Last Post: computer topic
  Web Services Architecture computer topic 0 7,568 25-03-2014, 10:20 PM
Last Post: computer topic
  XML encryption full report computer science technology 6 12,775 21-03-2014, 05:22 PM
Last Post: MichaelPn
  Java Cryptography Architecture (JCA) seminar projects crazy 1 2,562 17-12-2012, 01:51 PM
Last Post: seminar details

Forum Jump: