الفهرس | Only 14 pages are availabe for public view |
Abstract Secure Multi-Media Transmission over Mobile Communication Channels PhD. Thesis by Eng. Shaimaa Ahmed El-said Ahmed Electronics and Communications Engineering Department, Faculty of Engineering -Zagazig University. ABSTRACT Multimedia is one of the most popular data transmitted over mobile and wireless communication channels. Image encryption is often achieved by using one of three approaches; traditional, selective, or in-compression encryption techniques. The most suitable one for multimedia encryption approach is the in-compression encryption approach since it has the advantages of both traditional and selective techniques. As an important way of designing a secure video encryption schemes, secret Multiple Huffman Tables (MHT) technique has been suggested as an in-compression encryption technique. However, the MHT technique suffers from high visual degradation at low bit rate and the multiple Huffman tables may be vulnerable to be known. In this thesis, a new in-compression encryption technique For efficient and secure multimedia transmission is proposed. It is a general-purpose technique meaning that it can be used with any bit-string. It depends on a statistical model of the images to be encrypted and compressed to generate Optimized Multiple Huftinan Tables (OMHT). In this method, a set of images or videos, randomly selected from the entire set of images or videos to be transmitted, are used as a training data set to generate such optimized multiple Huffman tables. As these tables are generated from a set of images or videos of the same nature as those to be transmitted they will be the optimal tables to encrypt and compress the transmitted data, and hence, the name ”Optimized” is used. These tables are used to encode-encrypt the compressed image according to a secret order (secret key) whose length is equal to the number of the generated Huffman tables. Only receivers that have the secret key can decode/decrypt the received bit stream. The effectiveness of this scheme is verified through a series of experiments, and the robustness of developed approach is demonstrated by comparing its performance with those of the traditional, selective. |