intrusion detection and correlation challenges and solutions (advances in information security)

180 410 0
intrusion detection and correlation challenges and solutions (advances in information security)

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... allowed to gamble in that specific casino In both cases, the information recorded may contain critical private informations of the persons recorded and need to be protected from unauthorised viewers in order to maintain basic citizens’ Introduction 3 rights This has to be accomplished during two stages of the surveillance application: first, during transmission from the cameras to the recording site (e.g... simplicity and effectiveness block-matching algorithms are widely used to remove temporal correlation [53] In block-matching motion compensation, the scene (i.e video frame) is classically divided into nonoverlapping “block” regions For estimating the motion, each block in the current frame is compared against the blocks in the search area in the reference frame (i.e previously encoded and decoded frame) and. .. compression and encryption is analysed in depth Chapter 5 is the main part of this work where we describe, analyse, and assess various techniques for encrypting images and videos In this context, a large amount of experimental data resulting from custom implementations is provided Finally, chapter 6 summaries the results and provides outlooks to open questions and future issues in the area of image and video... topics in multimedia security (e.g ACM/Springer Multimedia Systems, IEEE Transactions on Signal Processing supplement on Secure Media, Signal Processing, EURASIP Applied Signal Processing, ) The first comprehensive textbook covering this field, the “Multimedia Security Handbook” [54] is published in autumn 2004 Besides watermarking, steganography, and techniques for assessing data integrity and authenticity,... prominent algorithms in this area are zerotree encoding [135, 81] and hybrid fractal wavelet codecs [142, 30] In most of these schemes, compression is accomplished by applying a fast wavelet transform to decorrelate the image data, quantising the resulting transform coefficients (this is where the actual lossy compression takes place) and coding the quantised values taking into account the high inter-subband... FWF‚ in the context of projects no 13732 and 15170 Parts of the text are copyrighted material Please refer to the corresponding appendix to obtain detailed information This page intentionally left blank Chapter 1 INTRODUCTION Huge amounts of digital visual data are stored on different media and exchanged over various sorts of networks nowadays Often, these visual data contain private or confidential informations... of header information While this seems to be desirable from the security viewpoint at first, it becomes clear quickly that causing a common player to be unable to decode has nothing to do with security and provides protection from an unskilled consumer only since a sincere attacker will do much more than just trying to decode encrypted material with a standard decoder This kind of security Introduction... again a web-based key-sharing technique has been established soon threatening the success of the scheme (e.g against Premiere in Austria and Germany [165]) DVD: The concept of trusted hardware did not work out properly when software DVD players entered the scene and finally the secret CSS cipher was broken and decryption software was published on the internet and on the back of T-shirts MPEG IPMP: In. .. inter-subband correlations The fast wavelet transform (which is used in signal and image processing) can be efficiently implemented by a pair of appropriately designed Quadrature Mirror Filters (QMF) Therefore, wavelet-based image compression can be viewed as a form of subband coding A 1-D wavelet transform of a signal is performed by convolving with both QMF’s and downsampling by 2; since is finite,... operate on independent, nonoverlapping blocks which are coded in several bit layers to create an embedded, scalable bitstream Instead of zerotrees, the JPEG 2000 scheme depends on a per-block quad-tree structure since the strictly independent block coding strategy precludes structures across subbands or even code-blocks These independent code-blocks are passed down the “coding pipeline” shown in Fig . series. Additional titles in the series: INTRUSION DETECTION AND CORRELATION: Challenges and Solutions by Christopher Kruegel‚ Fredrik Valeur and Giovanni Vigna; ISBN: 0-387-23398-9 THE AUSTIN PROTOCOL COMPILER. http://ebooks.kluweronline.com and the Springer Global Website Online at: http://www.springeronline.com I dedicate this book to my wife Jutta – thank you for your understanding and help in my ambition. assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security‚ as well as works that are larger in scope or that contain more detailed

Ngày đăng: 03/06/2014, 01:41

Từ khóa liên quan

Mục lục

  • Image and Video Encryption : From Digital Rights Management to Secured Personal Communication

    • Cover

    • Dedication

    • Contents

    • List of Figures

    • List of Tables

    • Preface

    • Acknowledgments

    • 1. INTRODUCTION

    • 2. VISUAL DATA FORMATS

      • 1 Image and Video Data

      • 2 DCT-based Systems

      • 3 Wavelet-based Systems

      • 4 Further Techniques

      • 3. CRYPTOGRAPHY PRIMER

        • 1 Introduction? Terminology

        • 2 Secret key vs. Public key Cryptography

        • 3 Block Ciphers

        • 4 Stream Ciphers

        • 5 Hybrid Algorithms? some Applications

        • 6 Cryptanalysis Overview

        • 7 Further Information

        • 4. APPLICATION SCENARIOS FOR THE ENCRYPTION OF VISUAL DATA

          • 1 Security provided by Infrastructure or Application

Tài liệu cùng người dùng

Tài liệu liên quan