scispace - formally typeset
Search or ask a question
Author

Sheng-Yih Wang

Bio: Sheng-Yih Wang is an academic researcher from Purdue University. The author has contributed to research in topics: Network architecture & Quality of service. The author has an hindex of 4, co-authored 8 publications receiving 282 citations.

Papers
More filters
Proceedings Article
01 Jan 1999
TL;DR: A fast MPEG video encryption algorithm called RVEA which encrypts selected sign bits of the DCT coeecients and motion vectors using secret key cryptography algorithms such as DES or IDEA is presented.
Abstract: We present a fast MPEG video encryption algorithm called RVEA which encrypts selected sign bits of the DCT coeecients and motion vectors using secret key cryptography algorithms such as DES or IDEA. RVEA features bounded computation time for any size of video frame and is robust to both plaintext and ciphertext attack. Since it adds a very small overhead to the MPEG video compression process, a software implementation is fast enough to meet the real-time requirement of MPEG video applications.

142 citations

Journal ArticleDOI
TL;DR: This work presents four fast MPEG video encryption algorithms that can be used to secure video-on-demand, video conferencing, and video email applications and shows that these algorithms achieve satisfactory results.
Abstract: Multimedia data security is important for multimedia commerce. Previous cryptography studies have focused on text data. The encryption algorithms developed to secure text data may not be suitable to multimedia applications because of the large data size and real time constraint. For multimedia applications, light weight encryption algorithms are attractive. We present four fast MPEG video encryption algorithms. These algorithms use a secret key to randomly change the sign bits of Discrete Cosine Transform (DCT) coefficients and/or the sign bits of motion vectors. The encryption is accomplished by the inverse DCT (IDCT) during the MPEG video decompression processing. These algorithms add a small overhead to MPEG codec. Software implementations are fast enough to meet the real time requirement of MPEG video applications. The experimental results show that these algorithms achieve satisfactory results. They can be used to secure video-on-demand, video conferencing, and video email applications.

131 citations

Proceedings ArticleDOI
30 Jul 2000
TL;DR: An adaptable network architecture, called ADNET, is designed, which provides mechanisms to allow an application to adapt to resource constraints to achieve improved QoS, and finds QoS is improved in the ACTP scheme with active programs.
Abstract: We have designed an adaptable network architecture, called ADNET, which provides mechanisms to allow an application to adapt to resource constraints to achieve improved QoS. In our experiments we compare three schemes (IP fragmentation, ACTP fragmentation with or without active program) of video transmissions. We find QoS is improved in the ACTP scheme with active programs. Our design aims to unify different QoS control mechanisms together to provide a wide range of network services to all users and meet their specific needs.

6 citations

Journal ArticleDOI
TL;DR: This paper presents an adaptable network architecture, called ADNET, which provides mechanisms to allow the application adapt to the resource constraints to achieve improved QoS, and proposes a new fragmentation scheme with low overhead to transfer large-size multimedia data.

5 citations


Cited by
More filters
01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Book
01 Dec 1981

609 citations

Journal ArticleDOI
TL;DR: This research examines the limitations of selective encryption using cryptanalysis, and proposes another approach that turns entropy coders into encryption ciphers using multiple statistical models that can be applied to most modern compressed audio/video such as MPEG audio, MPEG video, and JPEG/JPEG2000 images.
Abstract: Two approaches for integrating encryption with multimedia compression systems are studied in this research, i.e., selective encryption and modified entropy coders with multiple statistical models. First, we examine the limitations of selective encryption using cryptanalysis, and provide examples that use selective encryption successfully. Two rules to determine whether selective encryption is suitable for a compression system are concluded. Next, we propose another approach that turns entropy coders into encryption ciphers using multiple statistical models. Two specific encryption schemes are obtained by applying this approach to the Huffman coder and the QM coder. It is shown that security is achieved without sacrificing the compression performance and the computational speed. This modified entropy coding methodology can be applied to most modern compressed audio/video such as MPEG audio, MPEG video, and JPEG/JPEG2000 images.

361 citations

Journal ArticleDOI
TL;DR: Results of the various types of analysis suggest that the proposed image encryption technique is able to manage the trade offs between the security and speed and hence suitable for the real-time secure image and video communication applications.

324 citations

Journal ArticleDOI
TL;DR: This paper study a variety of data pricing models, categorize them into different groups, and conduct a comprehensive comparison of the pros and cons of these models, and focuses on the design of data trading platforms and schemes, supporting efficient, secure, and privacy-preserving data trading.
Abstract: Big data is considered to be the key to unlocking the next great waves of growth in productivity. The amount of collected data in our world has been exploding due to a number of new applications and technologies that permeate our daily lives, including mobile and social networking applications, and Internet of Thing-based smart-world systems (smart grid, smart transportation, smart cities, and so on). With the exponential growth of data, how to efficiently utilize the data becomes a critical issue. This calls for the development of a big data market that enables efficient data trading. Via pushing data as a kind of commodity into a digital market, the data owners and consumers are able to connect with each other, sharing and further increasing the utility of data. Nonetheless, to enable such an effective market for data trading, several challenges need to be addressed, such as determining proper pricing for the data to be sold or purchased, designing a trading platform and schemes to enable the maximization of social welfare of trading participants with efficiency and privacy preservation, and protecting the traded data from being resold to maintain the value of the data. In this paper, we conduct a comprehensive survey on the lifecycle of data and data trading. To be specific, we first study a variety of data pricing models, categorize them into different groups, and conduct a comprehensive comparison of the pros and cons of these models. Then, we focus on the design of data trading platforms and schemes, supporting efficient, secure, and privacy-preserving data trading. Finally, we review digital copyright protection mechanisms, including digital copyright identifier, digital rights management, digital encryption, watermarking, and others, and outline challenges in data protection in the data trading lifecycle.

242 citations