Chapter 13Data Cryptography 1

 

 

13.1. Introduction

With the development of new communication technologies, the Internet transfer of visual data (images, videos, or 3D objects) for different types of multimedia applications has grown exponentially. However, digital communication is increasingly vulnerable to malicious interventions or monitoring like hacking or eavesdropping. The security of this sensitive visual data in applications, such as safe storage, authentication, copyright protection, remote military image communication, or confidential video conferencing, requires new strategies for secure transmission over insecure channel.

The main purpose of this chapter is to understand the basics of modern cryptography, which is also required in the next chapter (Chapter 14), when dealing with visual data protection. Obviously, the user can use these tools within a context of securing biometric data.

13.2. Cryptography

The word “cryptography” has been derived from the Greek words kryptos, meaning hidden or secret, and graphien, meaning to write [KON 07]. Cryptography can be defined as the transformation of message or data into another message or data that is neither comprehensible nor understandable. Cryptography is the way to communicate between two or more parties in the presence of an adversary.

Beside security, the related goals of cryptography are confidentiality, integrity, authentication, and non-repudiation.

With the development of computer technologies, the field of data ...

Get Signal and Image Processing for Biometrics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.