• Medientyp: Sonstige Veröffentlichung; Dissertation; Elektronische Hochschulschrift; E-Book
  • Titel: Secure Computing with the MPEG RVC Framework
  • Beteiligte: Ahmad, Junaid Jameel [Verfasser:in]
  • Erschienen: KOPS - The Institutional Repository of the University of Konstanz, 2012
  • Sprache: Englisch
  • Schlagwörter: Secure Computing ; Crypto Tools Library (CTL) ; Multimedia Security ; Video Tool library (VTL) ; Cryptography ; Reconfigurable Video Coding (RVC)
  • Entstehung:
  • Anmerkungen: Diese Datenquelle enthält auch Bestandsnachweise, die nicht zu einem Volltext führen.
  • Beschreibung: Recently, the ISO/IEC standardized a dataflow-programming framework called Reconfigurable Video Coding (RVC) for the specification of video codecs. The RVC framework aims at providing the specification of a data-driven system at a high abstraction level so that the functionality (or behaviour) of the system become independent of the implementation details. The idea is to specify a system so that only the functionality (or behaviour) of the algorithms are explicitly expressed via their input and output interfaces, and the implementation choice (conversion of implementation-independent abstract solution to implementation-dependent solution) can then be made only once specific target platform has been chosen. With this approach, one abstract design can be used to automatically create implementations towards multiple target platforms. Although RVC was developed with the perspective of video codecs, it can serve as a general-purpose framework for domains beyond multimedia codecs. This motivated us to research: 1) if and how RVC can benefit other domains like secure computing? 2) can applications in other domain help evolve RVC to make it an even more general and useful solution? In this thesis, we report our investigations on applying the methodology, standardized by the MPEG RVC framework, to develop secure computing systems from the domains of cryptography and multimedia security, leading to the conclusion that the attractive features of the RVC approach can successfully be applied to another field than multimedia coding. In order to study if the RVC is a good choice for the development of secure computing systems, we started our work with the development of a Crypto Tools Library (CTL) based on RVC, which covers a number of widely used ciphers and cryptographic hash functions such as AES, Triple DES, ARC4 and SHA-2. By combining CTL with video tool library (a standard library defined by the RVC standard), a non-standard RVC-based H.264/AVC encoder and a non-standard RVC-based JPEG codec, we further demonstrated ...
  • Zugangsstatus: Freier Zugang
  • Rechte-/Nutzungshinweise: Urheberrechtsschutz