Paper
3 April 2008 P-recursive sequence and key-dependent multimedia scrambling
Author Affiliations +
Abstract
Multimedia scrambling technologies ensure that multimedia content is only used by authorized users by transforming multimedia data into an unintelligible format. This paper introduces a new P-recursive sequence and two multimedia scrambling algorithms based on the P-recursive sequence. The P-recursive sequence is a more generalized sequence which can derive many well-known sequences such as the P-Fibonacci sequence, the P-Lucas sequence and P-Gray code. The algorithms can be used to scramble two or three dimensional multimedia data in one step. Electronic signatures, grayscale images and three-color-component images are all examples of 2-D and 3-D multimedia data which can utilize these algorithms. Furthermore, a security key parameter p may be chosen as different or the same values for each dimensional component of the multimedia data. Experiments show that the presented algorithms can scramble multimedia data at different levels of security by partially or fully encrypting multimedia data. They also have been demonstrated in the experiments to show good performance in known-plain text attack and common image attacks such as data loss, Gaussian noise, and Salt Pepper noise. The scrambled multimedia data can be completely reconstructed only by using the correct security keys.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yicong Zhou, Karen Panetta, and Sos Agaian "P-recursive sequence and key-dependent multimedia scrambling", Proc. SPIE 6982, Mobile Multimedia/Image Processing, Security, and Applications 2008, 69820H (3 April 2008); https://doi.org/10.1117/12.777744
Lens.org Logo
CITATIONS
Cited by 6 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Multimedia

Transform theory

Computer security

Binary data

Multimedia encryption

3D image processing

Matrices

RELATED CONTENT

On mobile media rights management
Proceedings of SPIE (October 25 2004)
Fast encryption for set-top technologies
Proceedings of SPIE (December 14 1998)
Security analysis of selectively encrypted MPEG-2 streams
Proceedings of SPIE (November 19 2003)
Enhanced MHT encryption scheme for chosen plaintext attack
Proceedings of SPIE (November 26 2003)

Back to Top