CFP last date
20 January 2025
Reseach Article

Communication in Network using Wavelet Transform

by C. Parthasarathy, C.S. Ramanathan, Dr.S.K.Srivatsa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 16 - Number 8
Year of Publication: 2011
Authors: C. Parthasarathy, C.S. Ramanathan, Dr.S.K.Srivatsa
10.5120/2035-2733

C. Parthasarathy, C.S. Ramanathan, Dr.S.K.Srivatsa . Communication in Network using Wavelet Transform. International Journal of Computer Applications. 16, 8 ( February 2011), 9-13. DOI=10.5120/2035-2733

@article{ 10.5120/2035-2733,
author = { C. Parthasarathy, C.S. Ramanathan, Dr.S.K.Srivatsa },
title = { Communication in Network using Wavelet Transform },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 16 },
number = { 8 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume16/number8/2035-2733/ },
doi = { 10.5120/2035-2733 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:20.411722+05:30
%A C. Parthasarathy
%A C.S. Ramanathan
%A Dr.S.K.Srivatsa
%T Communication in Network using Wavelet Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 16
%N 8
%P 9-13
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Huge amounts of digital visual data are stored on different media and exchanged over various sorts of networks nowadays. We propose new measures and techniques for encryption of image. We show that both statistical and pattern classification techniques using our proposed measures provide reasonable discrimination schemes for detecting embedding of different levels. We propose the use of wavelet transforms for steganalysis. As a consequence, techniques are required to provide security functionalities like privacy, integrity, or authentication especially suited for these data types. A relatively new field, denoted “Multimedia Security”, is aimed towards these emerging technologies and applications. Several dedicated international meetings have emerged as a forum to present and discuss recent developments in this field, among them “Security, Steganography, and Watermarking of Multimedia Contents” as the most important one. Further meetings are “Communications and Multimedia Security (CMS)” and the “ACM Multimedia Security Workshop”. Besides watermarking, steganography, and techniques for assessing data integrity and authenticity, providing confidentiality and privacy for visual data is among the most important topics in the area of multimedia security, applications range from digital copy rights management to secured personal communications.

References
  1. H. Abut, editor. Vector Quantization. New York: IEEE Press, 1990.
  2. A. Alattar G. AI-Regib. Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams. In proceedings of the IEEE international Symposium on Circuits and System.
  3. A. M. Alattar, G. I. AI-Regib, and S. A. AI-Semari. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In Proceedings of the IEEE International Conference on image Processing(ICIP’99) volume 4, pages 256-260, Kobe, Japan, October 1999. IEEE Signal Processing Society.
  4. M. Antonini, M. Goel, N.R. Shanbhag, D. L. Jones, and I. Daubechies. Image coding using wavelet transform. IEEE Transactions on image processing.
  5. H. Cheng and X. Li. Partial encryption of compressed image and videos. IEEE Transactions on signal processing.
  6. Ahmet M. Eskicioglu and Edward J. Delp. An overview of multimedia content protection in consumer electronics devices.
  7. Thomas Kunkelmann. Applying encryption to video communication. In Proceedings of the Multimedia and Security Workshop at ACM Multimedia.
  8. J. Meyer and F. Gadegast. Security mechanisms for multimedia-data. Unpublished, available at http://www.gadegast.de/frank/doc/secmeng.pdf.
  9. Proceeding of National Conference on Network Security, Nagercoil , September 2008.
  10. Alessandro Piva and Franco Bartolini University of Florence Mauro Barni University of Siena “Copyright protection in Open networks” IEEE Internet Computing June,2002.
  11. http://www.amara.com/IEEEwave/IEEEwavelet.html.
  12. WHITFIELD DIFFIE and MARTINE E.HELLMAN “New directions in Cryptography” submitted to IEEE Transactions on information theory, Vol IT-22, no 6, November 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Video Encryption Permutation steganalysis Wavelet filters