A Large-Capacity Data Hiding Scheme in Encrypted VVC Video
Video encryption and hiding technology play a crucial role in preserving both information security and privacy. Data hiding in encrypted video allows for marking and tampering detection of the encrypted stream while ensuring the security of the video content. In this case, the extraction process of embedded bits can be performed without decryption, which is more efficient. Owing to the limited research conducted on versatile video coding (VVC), this paper presents a large-capacity data hiding scheme in encrypted video based on H.266/VVC codec. In the proposed scheme, AES-CTR is employed to generate a pseudorandom binary sequence (PRBS). Then the PRBS is used to encrypt the syntax elements before context-based adaptive binary arithmetic coding (CABAC), including luma intra prediction mode (IPM), quantized transform coefficient (QTC) sign, and motion vector difference (MVD) sign. Simultaneously, QTC amplitude is utilized for data embedding. Here, a piecewise embedding method (PEM) is designed to improve the embedding capacity. Since the syntax elements used for encryption and data hiding are independent, the decryption and extraction processes are fully commutable. Experimental results demonstrated outstanding performance of the proposed scheme in embedding capacity while preserving the integrity and authenticity of the original video content.
- Conference Article
4
- 10.1109/iciinfs.2016.8262920
- Dec 1, 2016
The intention of this paper is to present a new configuration of dual-band microstrip patch antenna for S-band (2GHz-4GHz) and C-band (4GHz-8GHz) applications. The dual-band antenna has become a fascinating technology due to its large capacity of data and high-speed data rate. In this work, a rectangular microstrip antenna with inverted E-slot and U-slots is proposed which offers an improved gain with dual-band operation. The antenna performance parameters at 3 GHz are the reflection coefficient (dB), VSWR, gain and radiation efficiency are found to be 17.74 dB, 1.29, 2.49 dBi and 49.45% respectively. At 4.6 GHz the reflection coefficient (dB), VSWR, gain and radiation efficiency are found to be 15.68 dB, 1.39, 3.68 dBi and 56.52% respectively. The designed antenna performance is compared with the existing dual-band designs available in the literature. An improvement with respect gain in both operating frequencies is demonstrated.
- Book Chapter
2
- 10.1007/978-3-030-02613-4_31
- Oct 19, 2018
This research is about a healthcare system that combine RFID (Radio Frequency Identification) positioning and mobile platform to achieve the goal of healthcare improvement. With the characteristics of high-speed dynamic reading, simultaneous reading of multiple RFID Tag, large capacity of data can be imported into the Reader. User can access to the Internet with smart phones without being restricted to time and places. Meanwhile, the system could record the amount of exercise and rapidly inquire the past exercise records for the reference of self-inspection. In the real-time location monitoring module, the system will locate where the elderly is, and if unexpected situation happens, the system will alert the caregivers. Through the multi data evaluation module, users could understand whether their diet and exercise conform to the healthy demands from daily health records and further learn to select suitable food and improve their exercise habits.
- Conference Article
3
- 10.1063/1.5054227
- Jan 1, 2018
- AIP conference proceedings
The remarkable growth of electronic data in the Mathematics department provides the opportunities to extract some meaningful information from this large capacity of data. The development of the data in the mining field ensures the educational data to improve the quality of the educational processes and to classify the components that affected the performance of the students in engineering statistics course. Thus, in this study, Kanri Distance Calculator (KDC) was utilized to analyze the performance of undergraduate students in Universiti Malaysia Perlis (UniMAP) during the academic session 2015/2016 in semester 2. The performance of the students was evaluated based on two aspects. First, the academic achievement of the students from the engineering statistics course during semester 2 2015/2016 was analyzed. Second, the possible variables that affect the performance of students in this course were classified. Thus, in this study, two significant groups of students were recognized i.e. (i) the students who achieved below 60% average, and (ii) the students who achieved above 60% average that can be referred as off-target and target group respectively. Based on the analysis of this study, the two variables (i.e. variables X3 and X7) affect the performance of the students and cause the students to obtain average marks lower than 60%. The results indicate that, by focusing on the possible variables that affect the academic performance of the students, it is possible to provide an appropriate warning and support to the students below average achievement, and at the same time to provide advice and opportunities to high-performance students based on the past experience about the obtained components.
- Research Article
- 10.3745/kipstc.2010.17c.5.399
- Oct 31, 2010
- The KIPS Transactions:PartC
Many problems are arisen due to the weakness in the security and invasion to privacy by malicious attacker or internal users while various data services are available in ubiquitous network environment. The matter of controlling security for various contents and large capacity of data has appeared as an important issue to solve this problem. The allocation methods of Ito, Saito and Nishizeki based on traditional polynomial require all shares to restore the secret information shared. On the contrary, the secret information can be restored if the shares beyond the threshold value is collected. In addition, it has the effect of distributed DBMS operation which distributes and restores the data, especially the flexibility in realization by using parameters in combinatorial design which has regularity in DB server and share selection. This paper discuss the construction of new share allocation method and data distribution/storage management with the application of matrix structure of design for allocating share when using secret sharing in management scheme to solve the matter of allocating share.
- Conference Article
1
- 10.4271/910876
- Feb 1, 1991
- SAE technical papers on CD-ROM/SAE technical paper series
Optical Star Coupler for Plastic Fiber
- Conference Article
1
- 10.1145/3410352.3410801
- Sep 14, 2020
The 5G communication networks is used to achieve high rate and large capacity of data. These networks need reliable antenna with low profile, and small size. Thus the microstrip antenna is acceptable to meet the requirements of 5G networks. The main objective of this paper is design a rectangular microstrip antenna to operate over 5G band (47 - 50.2 GHz) at 48.6 GHz. The suggested antenna is design on FR-4 with dielectric constant 4.4, thickness of 0.8mm, and loss tangent of 0.02. The performance of the proposed antenna is evaluated in terms of its parameters such as return loss, gain, and radiation pattern. Moreover, the parametric study is done, based on insertion of slots, and changing dimensions of the patch. The proposed antenna has a compact size with a simple configuration the antenna is operated with good performance at 48.6 GHz, and it can be used properly for 5G mobile communication system.
- Conference Article
1
- 10.1117/12.2638354
- Oct 26, 2022
Semantic segmentation of urban areas can provide useful information for analyzing and detecting changes in urban development. Recently, numerous remote sensing image datasets from various platforms have been acquired, and various semantic segmentation studies using them have been conducted. However, they do not contain many images because of their large data capacity and difficulty in constructing label data. Furthermore, it is difficult to use them simultaneously because each dataset has a different spatial resolution, shooting angle, and meaningful objects. In this study, two different UAV image datasets, such as UAVid semantic segmentation and semantic drone datasets, were used to train a combined U-net model to use heterogeneous remote sensing datasets for semantic segmentation tasks simultaneously. The UAVid dataset has a flight height of 50 m and 300 images with eight classes. However, the semantic drone dataset was acquired at an altitude of 5–30 m above the ground and contains 598 images with 20 classes. The combined U-net model is based on the U-net architecture, but it receives input from two different data sources. The experimental results showed that learning two datasets with a combined U-net improved semantic segmentation accuracy more than learning each data with a U-net. This study confirms the ability to train two different datasets acquired from different places and platforms simultaneously; thus, evaluating the applicability of semantic segmentation studies using heterogeneous remote sensing datasets.
- Conference Article
- 10.1109/icces54183.2022.9836004
- Jun 22, 2022
The image data are large in size with highly correlated adjacent pixels. Therefore, the conventional data encryption technology is inadequate to effectively deal with such kind of data for ensuring their security. Deoxyribonucleic Acid (DNA) encryption is a frontal encryption technology as DNA molecule has a large data capacity, vast parallelism and has low ultra power requirement. Over the years, different image cryptosystems have been proposed with the use of DNA based encoding/ decoding and its sequential operations. The present paper provides an indepth analysis of the research carried out by different authors in the last decade uptill now as reported in the literature. It also provides a pathway for further research in the area.
- Conference Article
2
- 10.1109/icosec54921.2022.9951964
- Oct 20, 2022
Orthogonal Frequency-Division Multiplexing (OFDM) divides a single information stream into several closely spaced narrowband sub channel frequencies, reduces interference in the system, and allows for more bandwidth of data. The wireless technology called Multiple Input-Multiple Output (MIMO), applies more than one sending and receiving antennas. MIMO boosts capacity of data in wireless communication systems. The same data is delivered across several antennas with same path and in the same bandwidth in a MIMO system. For 4G and 5G broadband wireless communications, MIMO with FDM is the most best air interface. It has the best spectral efficiency, large data capacity and high data throughput. If space-time coding methods are used along with many sending and receiving antennas, that increases data rate over wireless channels. Hence it is possible to obtain the capacity limit of Shannon Theorem. Vertical - Bell Laboratories Layered Space-Time (V-BLAS T) algorithm is applied to reduce the interference caused by multiple paths of data. Before assigning a symbol to each sub stream’s bit, the signal is demultiplexed. The Space-Time-Block Coding (STBC) is another technique, used for wireless communications for the betterment of MIMO with OFDM. STBC is suitable for the system with more than one antenna for sending and receiving. STBC exploits different versions of data and increase data transfer reliability. The performance of MIMO-OFDM system with respect to Bit Error Rate (BER) is examined in this work. Two antennas are used for sending and two for receiving data. Two algorithms STBC and VBLAST are applied to the above communication system. Three detection techniques namely Zero-Forcing (ZF), Minimum-Mean Square Error (MMSE), and Maximum Likelihood (ML) are applied to V-BLAST-MIMO-OFDM, and their BER performance is compared. Finally, the BER comparison of VBLAST and STBC is done. Simulation results are obtained using Matlab2020A. The results obtained for MIMO-OFDM system through simulation give better BER performance with ZF, ML, MMSE. The simulation findings show that the MIMO-OFDM system using VBLAST performs better than STBC. The application of V-BLAST technique to the MIMO-OFDM with detection techniques has further improved the BER performance. The simulation findings also show that V-BLAST with ZF and MMSE has improved the BER performance with BER drop of 76.13 and 87.11 percent respectively. V-BLAST with ML produces best overall BER performance with a BER drop of 94.85 percent.
- Conference Article
13
- 10.1117/12.946437
- Apr 12, 1985
- Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE
A flexible automatic disk handling system has been developed for a small size optical disk jukebox storage. Although an optical disk can store a large number of data, single disk capacity is becoming insufficient. Easy data accessible compact size mass storage system is being intensely required for office use. A solution to such requirement is small size optical disk jukebox storage, which provides large data capacity in small storage area and allows various applications, especially in office automation. The disk handling accessor was developed for use in a compact optical disk jukebox engineering model. It can access 200 optical disks, which are aligned in two disk containers, arranged on both sides of the accessor. The disks are carried and stored without a cartridges. The accessor is able to carry a disk from its stored position to two or more disk read/write stations selectively in less than 7 seconds. It can also rotate the disk to allow both sides read/write operation. All moving elements, such as disk pickup arm, disk rotation mechanism and disk clamping mechanism, are gathered on one carriage, allowing flexible disk handling and making the accessor smaller and simpler. Using this accessor, all optical jukebox mechanism, including two disk containers and several disk read/write stations, are packed into rather small area of 0.4m2. Some new techniques for the optical disk storage and system architecture concepts of the jukebox storage system are also described in this paper.
- Conference Article
241
- 10.1109/ultsym.2002.1193354
- Oct 8, 2002
The Global SAW Tag uses a recently-invented digital modulation based on simultaneous time position and phase shifting. A unique feature of this tag is that it satisfies global RFID requirements using the international 2.44 GHz ISM band. Precision amplitude and phase weighting of reflectors and accurate control of parasitic effects is critical to implementing this device. This tag has significantly more data bits, lower insertion loss, and smaller die area (i.e. lower cost) than previous SAW tags. These improvements eliminate the shortcomings that have previously limited the market for SAW RFID (radio frequency identification). A 2.44 GHz fundamental mode tag on 128/spl deg/ LiNbO/sub 3/ with 64-bit data capacity plus 16-bit error detection coding is described.
- Book Chapter
5
- 10.1007/978-981-10-7898-9_30
- Jan 1, 2018
Image encryption is different from that of traditional texts or binary data because of some inherent properties of images such as large data capacity, i.e., enormous size and high redundancy (statistical and psycho-visual), making them difficult to handle by traditional methods. In recent years, chaos theory has been explored to find efficient ways to develop secure image cryptosystems. Due to the desirable properties of mixing and sensitivity to initial conditions and parameters (butterfly effect), chaotic systems have found great deal in the domain of image encryption. In this paper, the 2-D chaotic cat map is generalized to its 3-D map counterpart for designing a real-time secure and reliable symmetric encryption design. This new scheme deploys the 3-D Arnold’s cat map to shuffle the positions of image pixels and uses the other chaotic logistic map to perplex the relationship between the plain-image and the cipher-image, thereby significantly enhancing the robustness to differential and statistical attacks. Experimental tests are carried out with comprehensive analysis, demonstrating the high security of the scheme.
- Research Article
11
- 10.1371/journal.pone.0165937
- Nov 8, 2016
- PloS one
Algorithms using 4-pixel Feistel structure and chaotic systems have been shown to resolve security problems caused by large data capacity and high correlation among pixels for color image encryption. In this paper, a fast color image encryption algorithm based on the modified 4-pixel Feistel structure and multiple chaotic maps is proposed to improve the efficiency of this type of algorithm. Two methods are used. First, a simple round function based on a piecewise linear function and tent map are used to reduce computational cost during each iteration. Second, the 4-pixel Feistel structure reduces round number by changing twist direction securely to help the algorithm proceed efficiently. While a large number of simulation experiments prove its security performance, additional special analysis and a corresponding speed simulation show that these two methods increase the speed of the proposed algorithm (0.15s for a 256*256 color image) to twice that of an algorithm with a similar structure (0.37s for the same size image). Additionally, the method is also faster than other recently proposed algorithms.
- Book Chapter
2
- 10.1007/978-3-319-44790-2_9
- Oct 19, 2016
Security in the wireless network is a critical issue, so by most wireless and wired communication standards, orthogonal frequency division multiplexing (OFDM) is the most reliable modulation technique which has been adopted. To reduce the redundancy, storage requirements, and communication costs and to protect our data from eavesdropping, data compression algorithms are used. With the increasing demand of secure multimedia, there is a need to develop a new secured compression and encryption technique whose data contain graphic, video, images, and text files. Data compression offers an approach for reducing communication costs using effective bandwidth and at the same time considers the security aspect of the data being transmitted which is vulnerable to attacks. In this chapter, we have introduced new compression algorithm known as KSA, which is based on bit quantization and is the best technique which requires less encoding and decoding delay. The proposed algorithm is found most effective in terms of energy ,delay and throughput when data travels wirelessly through OFDM. Here, the objective was to carry out an efficient implementation of the OFDM system using different combinations of encryption and compression algorithm for the energy optimization on data transmission. Lots of text encryption algorithms based on rounds and keys have been proposed earlier. Some of them are time consuming and complex, some have little key space. While working, the best combination for the encryption and compression of the data transmission and energy optimization is found out and implemented in NS2 for finding different parameters such as delay, energy, and throughput. The latest trend in text encryption is chaos based for some unique characteristics and parameters. In this chapter, we further proposed a unique chaos-based encryption technique which when combines with LZW compression gives best results. This encryption differs from earlier encryption technique such as RSA, ECC, Interleaving, Hill-climber, AES, and DES and is suitable for practical applications having large data capacity. The combination of compression, cryptography, and chaotic theory forms an important field of information security in text. Tabulation of compression time, encryption time, decompression time, decryption time, compressed data size, total time taken for compression, entropy, and total time required for decompression and compression ratio is found.
- Research Article
85
- 10.1109/tii.2015.2514097
- Feb 1, 2016
- IEEE Transactions on Industrial Informatics
QR barcodes are used extensively due to their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However, the private data of the QR barcode lacks adequate security protection. In this article, we design a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system. The proposed approach differs from related QR code schemes in which it uses the QR characteristics to achieve secret sharing and can resist the print-and-scan operation. The secret can be split and conveyed with QR tags in the distribution application, and the system can retrieve the lossless secret when authorized participants cooperate. General browsers can read the original data from the marked QR tag via a barcode reader, and this helps reduce the security risk of the secret. Based on our experiments, the new approach is feasible and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode.