dc.contributor.author |
Paraskevi, T |
en |
dc.contributor.author |
Klimis, N |
en |
dc.contributor.author |
Stefanos, K |
en |
dc.date.accessioned |
2014-03-01T02:49:54Z |
|
dc.date.available |
2014-03-01T02:49:54Z |
|
dc.date.issued |
2004 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/34777 |
|
dc.relation.uri |
http://www.scopus.com/inward/record.url?eid=2-s2.0-13444292941&partnerID=40&md5=f10d263b8fb7de0f226c4dfb1d92e6ce |
en |
dc.subject |
Chaos |
en |
dc.subject |
Cryptographic systems |
en |
dc.subject |
Face and body detection |
en |
dc.subject |
Human video objects |
en |
dc.subject |
Logistic map |
en |
dc.subject.other |
Algorithms |
en |
dc.subject.other |
Chaos theory |
en |
dc.subject.other |
Feedback |
en |
dc.subject.other |
Medical imaging |
en |
dc.subject.other |
Multimedia systems |
en |
dc.subject.other |
Security of data |
en |
dc.subject.other |
Semantics |
en |
dc.subject.other |
Cryptographic systems |
en |
dc.subject.other |
Face and body detection |
en |
dc.subject.other |
Human video objects |
en |
dc.subject.other |
Logistic maps |
en |
dc.subject.other |
Cryptography |
en |
dc.title |
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme |
en |
heal.type |
conferenceItem |
en |
heal.publicationDate |
2004 |
en |
heal.abstract |
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia files as binary large objects, without taking into consideration regions of semantic information. These regions may need better protection or can be the only regions that need protection, depending on the specific application. Towards this direction, in this paper we propose a human video object encryption system based on the chaotic logistic map. Initially face regions are efficiently detected and afterwards body regions are extracted, using geometric information of the location of face regions. Next the pixels of extracted human video objects are encrypted using an iterative cipher module, which is based on a feedback mechanism responsible for mixing the current encryption parameters with encrypted information of the previous step. The system presents robustness against known cryptanalytic attacks, and can save us a great amount of computational resources and time devoted for encrypting the whole contents of a multimedia file. |
en |
heal.journalName |
ACM Multimedia 2004 - proceedings of the 12th ACM International Conference on Multimedia |
en |
dc.identifier.spage |
352 |
en |
dc.identifier.epage |
355 |
en |