26-02-2011, 02:48 PM
presented by:
ANITHA TENALI
[attachment=9182]
A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCRETE WAVELET TRANSFORM
Multimedia encryption Background
• Multimedia data (images, videos, audios, etc.) is being used more and more widely, in applications such as video-on demand, video conferencing, broadcasting, etc.
• In order to maintain privacy or security, sensitive data needs to be protected before transmission.
• Encryption Technique
Transforms the data from the original form into an unintelligible form
• such as AES, RSA, or IDEA
Security Goals
• The goals for protecting any system are to assure that the following criteria are met:
• 1. Data Integrity– data is created/modified by authorized parties only.
• 2. Secrecy/Confidentiality – access is restricted to authorized parties.
• 3. Authentication – verifying identity
• 4. Non-repudiation – verification of action or data
Objective
• To enable lightweight multimedia encryption and authentication.
• To provide a high compression ratio and image reconstruction quality so as to serve the end user requirements.
• To optimize the hardware architecture for high performance like High throughput and low power requirements of the System.
ExistingMethodology & Drawbacks
• Cryptography : The process of encrypting a plain-text message into an unreadable cipher so that it can be sent through a network to be decrypted/deciphered by the intended recipient.
• The existing popular encryption algorithms such as AES and DES have large computational requirements.
• Encryption algorithms such as AES, DES or IDEA are typically applied over the full or partial output bit stream obtained from the compression engine, which is shown in figure(a)
Proposed Concept
• The existing approach restricts hardware design for DWT that requires low power consumption and hardware usage, such a design limits efficient delivery of scalable video streams.
• These restrictions can be alleviated by developing a scheme that integrates both encryption and compression operations into one without any significant computational overheads called light-weight encryption which is shown in fig(b).
Major Requirements and Desirable Features
• Complexity is an important consideration
Real-time applications, low-power device
• Content leakage
Content degradation vs. secrecy
• Compression efficiency overhead
Due to change of compression parameters/procedure, change of data statistics, additional header etc.
• Error resilience.
Error confinement in lossy network, synchronization
Proposed Block Diagram
Cryptography
Cryptography is the process of converting ordinary information (i.e. plain text) into unintelligible gibberish (i.e. cipher text).
A cipher is a pair of algorithms which creates the encryption and the reversing decryption. The operation of a cipher is controlled both by the algorithm and, in each instance, by a key.
Keys are important, as ciphers without variable keys are trivially breakable and therefore less than useful for most purposes