A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCR
#1

presented by:
ANITHA TENALI

[attachment=9182]
A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCRETE WAVELET TRANSFORM
Multimedia encryption Background

• Multimedia data (images, videos, audios, etc.) is being used more and more widely, in applications such as video-on demand, video conferencing, broadcasting, etc.
• In order to maintain privacy or security, sensitive data needs to be protected before transmission.
• Encryption Technique
 Transforms the data from the original form into an unintelligible form
• such as AES, RSA, or IDEA
Security Goals
• The goals for protecting any system are to assure that the following criteria are met:
• 1. Data Integrity– data is created/modified by authorized parties only.
• 2. Secrecy/Confidentiality – access is restricted to authorized parties.
• 3. Authentication – verifying identity
• 4. Non-repudiation – verification of action or data
Objective
• To enable lightweight multimedia encryption and authentication.
• To provide a high compression ratio and image reconstruction quality so as to serve the end user requirements.
• To optimize the hardware architecture for high performance like High throughput and low power requirements of the System.
ExistingMethodology & Drawbacks
• Cryptography : The process of encrypting a plain-text message into an unreadable cipher so that it can be sent through a network to be decrypted/deciphered by the intended recipient.
• The existing popular encryption algorithms such as AES and DES have large computational requirements.
• Encryption algorithms such as AES, DES or IDEA are typically applied over the full or partial output bit stream obtained from the compression engine, which is shown in figure(a)
Proposed Concept
• The existing approach restricts hardware design for DWT that requires low power consumption and hardware usage, such a design limits efficient delivery of scalable video streams.
• These restrictions can be alleviated by developing a scheme that integrates both encryption and compression operations into one without any significant computational overheads called light-weight encryption which is shown in fig(b).
Major Requirements and Desirable Features
• Complexity is an important consideration
 Real-time applications, low-power device
• Content leakage
 Content degradation vs. secrecy
• Compression efficiency overhead
 Due to change of compression parameters/procedure, change of data statistics, additional header etc.
• Error resilience.
 Error confinement in lossy network, synchronization
Proposed Block Diagram
Cryptography

 Cryptography is the process of converting ordinary information (i.e. plain text) into unintelligible gibberish (i.e. cipher text).
 A cipher is a pair of algorithms which creates the encryption and the reversing decryption. The operation of a cipher is controlled both by the algorithm and, in each instance, by a key.
 Keys are important, as ciphers without variable keys are trivially breakable and therefore less than useful for most purposes
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hardware architecture of embedded systems, paper presentations on nanorobot hardware architecture for medical defense, architecture for multimedia support, hardware architecture technical report, synopsis an hardware management using vb, multimedia data and format, san architecture and hardware devices ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCR - by seminar class - 26-02-2011, 02:48 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Multimedia History seminar class 1 17,402 07-03-2019, 06:22 AM
Last Post:
  Data Encryption Standard (DES) seminar class 2 9,419 20-02-2016, 01:59 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 14,817 27-04-2015, 01:48 PM
Last Post: seminar report asees
  Computer Architecture Requirements? shakir_ali 1 27,689 07-04-2015, 12:04 PM
Last Post: Kishore1
  Computer Architecture ACS Project? shakir_ali 0 7,546 30-10-2014, 12:01 AM
Last Post: shakir_ali
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,502 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Hardware for image processing - Basics Eye – Human vision sensor ppt computer topic 0 7,778 25-03-2014, 11:12 PM
Last Post: computer topic
  Web Services Architecture computer topic 0 7,606 25-03-2014, 10:20 PM
Last Post: computer topic
  XML encryption full report computer science technology 6 12,817 21-03-2014, 05:22 PM
Last Post: MichaelPn
  Java Cryptography Architecture (JCA) seminar projects crazy 1 2,601 17-12-2012, 01:51 PM
Last Post: seminar details

Forum Jump: