A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCR
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#1
26-02-2011, 02:48 PM


presented by:
ANITHA TENALI


.ppt   ppt on dwt.ppt (Size: 1.61 MB / Downloads: 156)
A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCRETE WAVELET TRANSFORM
Multimedia encryption Background

• Multimedia data (images, videos, audios, etc.) is being used more and more widely, in applications such as video-on demand, video conferencing, broadcasting, etc.
• In order to maintain privacy or security, sensitive data needs to be protected before transmission.
• Encryption Technique
 Transforms the data from the original form into an unintelligible form
• such as AES, RSA, or IDEA
Security Goals
• The goals for protecting any system are to assure that the following criteria are met:
• 1. Data Integrity– data is created/modified by authorized parties only.
• 2. Secrecy/Confidentiality – access is restricted to authorized parties.
• 3. Authentication – verifying identity
• 4. Non-repudiation – verification of action or data
Objective
• To enable lightweight multimedia encryption and authentication.
• To provide a high compression ratio and image reconstruction quality so as to serve the end user requirements.
• To optimize the hardware architecture for high performance like High throughput and low power requirements of the System.
ExistingMethodology & Drawbacks
• Cryptography : The process of encrypting a plain-text message into an unreadable cipher so that it can be sent through a network to be decrypted/deciphered by the intended recipient.
• The existing popular encryption algorithms such as AES and DES have large computational requirements.
• Encryption algorithms such as AES, DES or IDEA are typically applied over the full or partial output bit stream obtained from the compression engine, which is shown in figure(a)
Proposed Concept
• The existing approach restricts hardware design for DWT that requires low power consumption and hardware usage, such a design limits efficient delivery of scalable video streams.
• These restrictions can be alleviated by developing a scheme that integrates both encryption and compression operations into one without any significant computational overheads called light-weight encryption which is shown in fig(b).
Major Requirements and Desirable Features
• Complexity is an important consideration
 Real-time applications, low-power device
• Content leakage
 Content degradation vs. secrecy
• Compression efficiency overhead
 Due to change of compression parameters/procedure, change of data statistics, additional header etc.
• Error resilience.
 Error confinement in lossy network, synchronization
Proposed Block Diagram
Cryptography

 Cryptography is the process of converting ordinary information (i.e. plain text) into unintelligible gibberish (i.e. cipher text).
 A cipher is a pair of algorithms which creates the encryption and the reversing decryption. The operation of a cipher is controlled both by the algorithm and, in each instance, by a key.
 Keys are important, as ciphers without variable keys are trivially breakable and therefore less than useful for most purposes
Reply
ursbaji
Active In SP
**

Posts: 1
Joined: Mar 2011
#2
19-03-2011, 12:42 PM

hi ....

please provide more information about this project and implimentation....


mail id ursbaji@gmail.com
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#3
19-03-2011, 03:26 PM


. an efficient hardware architecture for multimedia encryption and authentication using the discrete wavelet transform   30. An Efficient Hardware Architecture for Multimedia Encryption and Authentication using the Discrete Wavelet Transform (Size: 26 KB / Downloads: 44)
An Efficient Hardware Architecture for Multimedia Encryption and Authentication using the Discrete Wavelet Transform
Abstract:

A discrete wavelet transform (DWT) is any wavelet transform for which the wavelets are discretely sampled. As with other wavelet transforms, a key advantage it has over Fourier transforms is temporal resolution as it captures both frequency and location information. The discrete wavelet transform has a huge number of applications in science, engineering, mathematics and computer science. Most notably, it is used for signal coding, to represent a discrete signal in a more redundant form, often as a preconditioning for data compression.
The Discrete Wavelet Transform (DWT) has enabled research in image and video coding and has become a part of multiple next generation multimedia compression and transmission standards. The increasing importance of the DWT in image and multimedia compression applications has inspired the development of efficient hardware for implementations. Figure 1 shows some constraints in the design of a DWT filter. It must provide a high compression ratio and image reconstruction quality so as to serve the end
user requirements. Some other desired features include low hardware cost, low power requirements and high throughput of the system.
This paper introduces a zero-overhead encryption and authentication scheme for real-time embedded multimedia systems. The parameterized construction of the Discrete Wavelet Transform (DWT) compression block is used to introduce a free parameter in the design. It allows building a keyspace for lightweight multimedia encryption. The parametrization yields rational coefficients leading to an efficient fixed point hardware implementation. A clock speed of over 240 MHz was achieved on a Xilinx Virtex 5 FPGA. Comparison with existing approaches was performed to indicate the high throughput and low hardware overhead in adding the security feature to the DWT architecture.
Software’s/Tools:
• The project and implimentation will be implemented using HDL.
• Simulation will be done to verify the functionality and synthesis will be done to get the NETLIST.
• Simulation and synthesis will be done using Xilinx Tools.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  PROGRAMS USING RAW SOCKETS (LIKE PACKET CAPTURING AND FILTERING project girl 2 2,158 30-10-2015, 10:03 AM
Last Post: Guest
  Security using colors and Armstrong numbers Moiz ansari 2 170 21-10-2015, 12:10 PM
Last Post: mkaasees
  edi layered architecture in e-commerce jaseelati 0 210 19-02-2015, 03:02 PM
Last Post: jaseelati
  pc hardware and networking lab manual for diploma jaseelati 0 238 23-12-2014, 03:04 PM
Last Post: jaseelati
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,697 13-05-2014, 10:16 AM
Last Post: seminar project topic
  XML encryption full report computer science technology 7 6,672 24-03-2014, 02:31 PM
Last Post: seminar project topic
  Network Reconfiguration Using a Genetic Approach for Loss and Reliability Optimizati project report helper 1 1,601 16-10-2013, 05:35 AM
Last Post: dreambanned
  Design of an Error Detection and Data Recovery Architecture for Motion Estimation seminar projects maker 0 768 30-09-2013, 04:40 PM
Last Post: seminar projects maker
  Introduction to Multimedia Systems seminar projects maker 0 501 28-09-2013, 01:15 PM
Last Post: seminar projects maker
  Controlled Data Hiding Technique for Color Image Authentication in Frequency pdf seminar projects maker 0 482 26-09-2013, 03:02 PM
Last Post: seminar projects maker