Apress

Embedded Multimedia Security Systems

Algorithms and Architectures

By Amit Pande , Joseph Zambreno

Embedded Multimedia Security Systems Cover Image

Opening with a detailed review of techniques for selective encryption, this book examines algorithms that combine encryption and compression. Presents a selection of specific examples of the design and implementation of secure embedded multimedia systems.

Full Description

  • ISBN13: 978-1-4471-4458-8
  • 163 Pages
  • User Level: Science
  • Publication Date: September 14, 2012
  • Available eBook Formats: PDF
  • eBook Price: $109.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.
Table of Contents

Table of Contents

  1. Part I: Multimedia Systems.
  2. Introduction.
  3. Advances in Multimedia Encryption.
  4. Securing Multimedia Content using Joint Compression and Encryption.
  5. Part II: Examples.
  6. Polymorphic Wavelet Transform.
  7. The Secure Wavelet Transform.
  8. Chaotic Filter Banks.
  9. Chaotic Arithmetic Coding.
  10. Conclusion.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published