DC FieldValueLanguage
dc.contributor.authorNtalianis, Klimis-
dc.contributor.authorTzouveli, Paraskevi-
dc.contributor.authorKollias, Stefanos-
dc.date.accessioned2024-11-13T14:52:28Z-
dc.date.available2024-11-13T14:52:28Z-
dc.date.issued2004-10-10-
dc.identifiergoogle_scholar-vd7COBsAAAAJ:2KloaMYe4IUC-
dc.identifier.isbn978-1-58113-893-1-
dc.identifier.othervd7COBsAAAAJ:2KloaMYe4IUC-
dc.identifier.urihttps://uniwacris.uniwa.gr/handle/3000/2890-
dc.description.abstractSecurity of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia files as binary large objects, without taking into consideration regions of semantic information. These regions may need better protection or can be the only regions that need protection, depending on the specific application. Towards this direction, in this paper we propose a human video object encryption system based on the chaotic logistic map. Initially face regions are efficiently detected and afterwards body regions are extracted, using geometric information of the location of face regions. Next the pixels of extracted human video objects are encrypted using an iterative cipher module, which is based on a feedback mechanism responsible for mixing the current encryption parameters with encrypted information of the previous step. The system presents robustness against known cryptanalytic attacks, and can save us a great amount of computational resources and time devoted for encrypting the whole contents of a multimedia file.en_US
dc.language.isoenen_US
dc.relation.ispartofMultimedia 2004: Proceedings of the 12th annual ACM international conference on Multimediaen_US
dc.sourceProceedings of the 12th annual ACM international conference on Multimedia …, 2004-
dc.subjectCryptographic systemsen_US
dc.subjectChaosen_US
dc.subjectLogistic mapen_US
dc.subjectFace and body detectionen_US
dc.subjectHuman video objectsen_US
dc.titleSecurity of human video objects by incorporating a chaos-based feedback cryptographic schemeen_US
dc.typeConference Paperen_US
dc.relation.conference12th annual ACM international conference on Multimedia, 10-16 October 2004, New York, USAen_US
dc.relation.deptDepartment of Business Administrationen_US
dc.relation.facultySchool of Administrative, Economics and Social Sciencesen_US
dc.identifier.spage352en_US
dc.identifier.epage355en_US
dc.linkhttps://dl.acm.org/doi/abs/10.1145/1027527.1027609en_US
dc.collaborationUniversity of West Attica (UNIWA)en_US
dc.journalsOpen Accessen_US
dc.publicationPeer Revieweden_US
dc.countryGreeceen_US
local.metadatastatusnot verifieden_US
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairetypeConference Paper-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.deptDepartment of Business Administration-
crisitem.author.facultySchool of Administrative, Economics and Social Sciences-
crisitem.author.parentorgSchool of Administrative, Economics and Social Sciences-
Appears in Collections:Book Chapter / Κεφάλαιο Βιβλίου
CORE Recommender
Show simple item record

Page view(s)

14
checked on Dec 3, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.