Results 1 - 10
of
1,089
Selective encryption for consumer applications
- IEEE Communications Magazine
, 2004
"... Abstract- Selective encryption is a technique to save computational complexity or enable interesting new system functionality by only encrypting a portion of a compressed bitstream while still achieving adequate security. Although suggested in a number of specific cases, selective encryption could b ..."
Abstract
-
Cited by 24 (0 self)
- Add to MetaCart
Abstract- Selective encryption is a technique to save computational complexity or enable interesting new system functionality by only encrypting a portion of a compressed bitstream while still achieving adequate security. Although suggested in a number of specific cases, selective encryption could
Selective encryption for hierarchical MPEG
- Communications and Multimedia Security, Proceedings of the 10th IFIP International CMS 2006 Conference, volume 4237 of Lecture Notes on Computer Science
, 2006
"... Abstract. Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional functionality, which is of great benefit for streaming and networking applications. The MPEG-2 and MPEG-4 standards p ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Abstract. Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional functionality, which is of great benefit for streaming and networking applications. The MPEG-2 and MPEG-4 standards
Attribute-based encryption for fine-grained access control of encrypted data
- In Proc. of ACMCCS’06
, 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract
-
Cited by 522 (23 self)
- Add to MetaCart
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We
Protection of Color Images by Selective Encryption!!
"... Abstract This chapter presents methods for the protection of privacy associated with specific regions from images or image sequences. In the proposed approaches, regions of interest (ROI) are detected during the JPEG compression of the images and encrypted. We address the problem of simultaneous par ..."
Abstract
- Add to MetaCart
partial encryption (PE), selective encryption (SE) and image compression. The PE is performed in the ROI selected from the image by specifying a color range. The SE is performed by using the Advanced Encryption Standard (AES) algorithm with the Cipher Feedback (CFB) mode on a subset of the Huffman
Secure and low cost selective encryption for JPEG2000
"... Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach is particularly desirable in constrained communication (real time networking with delay constraints, mobile communication ..."
Abstract
- Add to MetaCart
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach is particularly desirable in constrained communication (real time networking with delay constraints, mobile communication
Security analysis of selectively encrypted MPEG-2 streams
- in Multimedia Systems and Applications VI, Proceedings of SPIE, September 7-11, 2003
, 2003
"... Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little application ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little
The coin ipping selector for selective encryption
"... Abstract. Some applications require high-speed encryption even at the expense of reduced security. With a xed secure, but slow cryptographic algorithm, there still is an appealing possibility for encryption speedup by encrypting only some portion of data. In this paper we analyze the ciphertext secu ..."
Abstract
- Add to MetaCart
Abstract. Some applications require high-speed encryption even at the expense of reduced security. With a xed secure, but slow cryptographic algorithm, there still is an appealing possibility for encryption speedup by encrypting only some portion of data. In this paper we analyze the ciphertext
Techniques For A Selective Encryption Of Uncompressed And Compressed images
- in Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002
, 2002
"... This paper describes several techniques to encrypt uncompressed and compressed images. We first present the aims of image encryption. In the usual ways to encryption, all the information is encrypted. But this is not mandatory. In this paper we follow the principles of a technique initially proposed ..."
Abstract
-
Cited by 31 (1 self)
- Add to MetaCart
applications like, for example, searching through a shared image database. The principle of selective encryption is first applied to uncompressed images. Then we propose a simple technique applicable to the particular case of JPEG images. This technique is proven not to interfere with the decoding process
Measuring Confidentiality of Selectively Encrypted Messages Using Guesswork
"... In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker performs in an optimal brute force attack to reveal an encrypted message. The characteristics of the pr ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker performs in an optimal brute force attack to reveal an encrypted message. The characteristics
Selective Encryption of Wavelet-Packet encoded Image Data -- Efficiency and Security
"... Selective Encryption provides the ability to strike a balance between security and processing demands, e.g. in mobile clients. Image encoding using wavelets and especially wavelet packets can be used for efficient selective encryption. We will show how two such methods work, and discuss their advant ..."
Abstract
-
Cited by 36 (7 self)
- Add to MetaCart
Selective Encryption provides the ability to strike a balance between security and processing demands, e.g. in mobile clients. Image encoding using wavelets and especially wavelet packets can be used for efficient selective encryption. We will show how two such methods work, and discuss
Results 1 - 10
of
1,089