Explore chapters and articles related to this topic
Document Security and Digital Rights Management
Published in David Austerberry, Digital Asset Management, 2012
Pre-encryption systems usually package the asset file as a whole, rather than packet by packet. For live audiovisual content, there is less choice of DRM, as only a limited number of products support live encryption. To meet this need, a different form of encryption has been developed, where the processing takes place at the point of delivery. This on-the-fly encryption has a second advantage, which is that a new key is generated for each stream. Pre-encryption generates a single key for the file at the time of wrapping; if the key is compromised, then all copies of the file can be opened.
Rights management
Published in David Austerberry, The Technology of Video and Audio Streaming, 2013
Pre-encryption systems usually package the clip file as a whole, rather than packet by packet. For live use this is not an option; for webcasts the encryption has to be on-the-fly. To meet this need, a different form of encryption has been developed, where the processing takes place at the point of delivery. This on-the-fly encryption has a second advantage that a new key is generated for each stream. Pre-encryption generates a single key for the file at the time of wrapping. So if the key is compromised, all copies of the file can be opened.
Network Security
Published in Mário Marques da Silva, Cable and Wireless Networks, 2018
Symmetric cryptography presents the advantage that the required processing for ciphering and deciphering messages is much lower than that of asymmetric cryptography. However, since the key used for ciphering and deciphering is the same, there is the need to distribute the keys along the potential users (senders and receivers of messages). This makes symmetric systems vulnerable.
An SVD Values Ordering Scheme for Medical Image Watermarking
Published in Cybernetics and Systems, 2022
Narima Zermi, Amine Khaldi, Mohamed Redouane Kafi, Fares Kahlessenane, Salah Euschi
Currently, the transmission of medical information through public networks is developing considerably, whether in telemedicine, telediagnosis, telesurgery, distance learning, or various applications related to the consultation of databases. The transmission conditions are then identical to those encountered by electronic commerce. Indeed, the images will be subject to various attacks such as transmission errors and lossy compression. In the case of a medical image, the most important thing is to retain the medical information in the image, as the reading of these images will be used to produce the patient's diagnosis. It is therefore important to have good imperceptibility of the integration process. In addition, the watermarked image must be resistant to various attacks in order to preserve the integrity of the watermark. In this work a watermarking approach combining DWT and SVD has been proposed. The advantages of schemes that use the frequency domain as the insertion domain are robust to compression operations since they use the same domain. On the other hand, the calculation of the transform of an image has become less expensive due to the fast transform algorithms. SVD is a very important matrix factorization tool in the field of image processing, due to its algebraic properties it is more used in digital watermarking. The SVD transform allows to put all the maximum energy of the image into the minimum singular values. The SVD transform is a mathematical tool very necessary in image processing and more used in digital image watermarking which gives good results in terms of invisibility and robustness. Experimental results have shown that this technique gives a good visual quality of the image and a perfect robustness against some attacks like cropping, JPEG compression and also rotation. Based on the results we can conclude that the proposed approach is more suitable for X-Ray images. This approach offers better results in terms of imperceptibility and robustness compared to recent related work. In order to enhance the security of the watermark, a symmetrical encryption could be done using a distributed key between interlocutors. For this purpose, a key management system will be added to the watermarking system. An asymmetric key exchange could be used (e.g. Diffie Hellman key exchange), this will generate a similar key for both parties. As this key is similar for both parties, symmetrical encryption could be used to take advantage of its speed (about eight times faster than asymmetrical encryption).