Sheng-Yih Wang

Learn More
We present a fast MPEG video encryption algorithm called RVEA which encrypts selected sign bits of the DCT coeecients and motion vectors using secret key cryptography algorithms such as DES or IDEA. RVEA features bounded computation time for any size of video frame and is robust to both plaintext and ciphertext attack. Since it adds a very small overhead to(More)
Multimedia data security is important for multimedia commerce. Previous cryptography studies have focused on text data. The encryption algorithms developed to secure text data may not be suitable to multimedia applications because of the large data size and real time constraint. For multimedia applications, light weight encryption algorithms are attractive.(More)
Multimedia data security is important for multimedia commerce. Previous cryptography studies have focused on text data. The encryption algorithms developed to secure text data may not be suitable to multimedia applications because of large data sizes and real time constraint. For multimedia applications, light weight encryption algorithms are attractive. In(More)
Multimedia objects such as audio, video and images are usually very large in si>lc and used in time-critical applications. The traditional method of transmitting these large objects over a WAN is to use TCP because of the high loss rate of IP datagrams over a WAN. In this paper, we propose a new method called Multi-pass Transmission Policy (MpTP). The basic(More)
Security in today's wireless camera sensor networks is very crucial for authentication of video feeds from appropriate sources. This will ensure the safety and security of the digital video feeds as well as provide means of authenticating the video. These authentication approaches should be able to identify tamper detection. In this paper, we propose an(More)
In active networks environments, the data packets can c q active programs to enable specialized processing on them. We quantify the effectiveness of general capsule programs V.S. specialized processing functions for multimedia data through four experiments. These experiments deal with the comparison of Java V.S. C implementation of a MPEG video decoder, the(More)
Internet plays an important role in circulating a huge amount of multimedia. An example of this multimedia is the image. To send an image over the network secretly, the sender tries to find encryption algorithm to hide image information. This paper aims at designing an efficient encryption algorithm for color image using random image key generated with(More)
Active network is an excellent paradigm to provide customized network services to the applications by allowing them to inject specific program to the intermediate routers. Active networks provide the flexibility for the application programs to modify the services that a router can provide to suit its specific needs. Therefore, it has the potential to(More)