PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Protection of visual data transmission for vessel traffic systems using Joint Fingerprinting and Decryption method based on modified hill cipher

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented. The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.
Słowa kluczowe
Rocznik
Strony
5--17
Opis fizyczny
Bibliogr. 8 poz., rys.
Twórcy
  • Gdansk University of Technology
  • Polish Naval Academy
Bibliografia
  • [1] Anderson R., Manifavas C., Chameleon - A new kind of stream cipher, Lecture Notes in Computer Science, Fast Software Encryption, E. Biham, ed. Heidelberg, Springer-Verlag, 1997, pp. 107-113.
  • [2] Barcz M., Review and analysis of fingerprinting methods for multicast distribution of video signals, Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, master thesis, 2009.
  • [3] He S., Wu M., Joint Coding and Embedding Techniques for Multimedia Fingerprinting, IEEE Transactions on Information Forensics and Security, 2006.
  • [4] Kundur D., Karthik K., Video fingerprinting and encryption principles for digital rights management, Proc. IEEE, 2004, Vol. 92, No. 6, pp. 918-932.
  • [5] Liu K. J. R., Trappe W., Wang Z. J., Wu M., Zhao H., Multimedia fingerprinting forensics for traitor tracing, EURASIP Book Series on Signal Processing and Communications, 2005, Vol. 4, Hindawi Publishing Corporation.
  • [6] Rykaczewski R., Hillcast - A method of joint decryption and fingerprinting for multicast distribution of multimedia data, Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics Annals, 2010, No. 8, series: Information Technology.
  • [7] Wu M., Trappe W., Wang Z. J., Liu K. J. R., Collusion-resistant fingerprinting for multimedia, IEEE Signal Processing Mag., 2004, Vol. 21, pp.15-27.
  • [8] Zhao H., Wu M., Wang Z. J., Liu K. J. R., Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting, IEEE Trans. Image Processing, 2005, Vol. 14, No. 5, pp. 646-661.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-41b57e89-11fc-40f1-a797-1630aa9f7cb4
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.