• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,089
Next 10 →

Selective encryption for consumer applications

by Tom Lookabaugh - IEEE Communications Magazine , 2004
"... Abstract- Selective encryption is a technique to save computational complexity or enable interesting new system functionality by only encrypting a portion of a compressed bitstream while still achieving adequate security. Although suggested in a number of specific cases, selective encryption could b ..."
Abstract - Cited by 24 (0 self) - Add to MetaCart
Abstract- Selective encryption is a technique to save computational complexity or enable interesting new system functionality by only encrypting a portion of a compressed bitstream while still achieving adequate security. Although suggested in a number of specific cases, selective encryption could

Selective encryption for hierarchical MPEG

by Heinz Hofbauer , Thomas Stütz , Andreas Uhl - Communications and Multimedia Security, Proceedings of the 10th IFIP International CMS 2006 Conference, volume 4237 of Lecture Notes on Computer Science , 2006
"... Abstract. Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional functionality, which is of great benefit for streaming and networking applications. The MPEG-2 and MPEG-4 standards p ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract. Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional functionality, which is of great benefit for streaming and networking applications. The MPEG-2 and MPEG-4 standards

Attribute-based encryption for fine-grained access control of encrypted data

by Vipul Goyal, Amit Sahai, Omkant Pandey, Brent Waters - In Proc. of ACMCCS’06 , 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract - Cited by 522 (23 self) - Add to MetaCart
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We

Protection of Color Images by Selective Encryption!!

by W. Puech, A. Bors, J. M. Rodrigues, W. Puech, A. Bors, J. M. Rodrigues, W. Puech, A. Bors, J. M. Rodrigues
"... Abstract This chapter presents methods for the protection of privacy associated with specific regions from images or image sequences. In the proposed approaches, regions of interest (ROI) are detected during the JPEG compression of the images and encrypted. We address the problem of simultaneous par ..."
Abstract - Add to MetaCart
partial encryption (PE), selective encryption (SE) and image compression. The PE is performed in the ROI selected from the image by specifying a color range. The SE is performed by using the Advanced Encryption Standard (AES) algorithm with the Cipher Feedback (CFB) mode on a subset of the Huffman

Secure and low cost selective encryption for JPEG2000

by Ayoub Massoudi, Frédéric Lefèbvre, Christophe De Vleeschouwer, François-olivier Devaux
"... Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach is particularly desirable in constrained communication (real time networking with delay constraints, mobile communication ..."
Abstract - Add to MetaCart
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach is particularly desirable in constrained communication (real time networking with delay constraints, mobile communication

Security analysis of selectively encrypted MPEG-2 streams

by Tom Lookabaugh, Douglas C. Sicker, David M. Keaton, Wang Ye Guo, Indrani Vedula - in Multimedia Systems and Applications VI, Proceedings of SPIE, September 7-11, 2003 , 2003
"... Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little application ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little

The coin ipping selector for selective encryption

by Richard Ostertág
"... Abstract. Some applications require high-speed encryption even at the expense of reduced security. With a xed secure, but slow cryptographic algorithm, there still is an appealing possibility for encryption speedup by encrypting only some portion of data. In this paper we analyze the ciphertext secu ..."
Abstract - Add to MetaCart
Abstract. Some applications require high-speed encryption even at the expense of reduced security. With a xed secure, but slow cryptographic algorithm, there still is an appealing possibility for encryption speedup by encrypting only some portion of data. In this paper we analyze the ciphertext

Techniques For A Selective Encryption Of Uncompressed And Compressed images

by Marc Van Droogenbroeck, Raphael Benedett - in Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002 , 2002
"... This paper describes several techniques to encrypt uncompressed and compressed images. We first present the aims of image encryption. In the usual ways to encryption, all the information is encrypted. But this is not mandatory. In this paper we follow the principles of a technique initially proposed ..."
Abstract - Cited by 31 (1 self) - Add to MetaCart
applications like, for example, searching through a shared image database. The principle of selective encryption is first applied to uncompressed images. Then we propose a simple technique applicable to the particular case of JPEG images. This technique is proven not to interfere with the decoding process

Measuring Confidentiality of Selectively Encrypted Messages Using Guesswork

by Reine Lundin, Stefan Lindskog, Anna Brunstrom, Simone Fischer-Hübner
"... In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker performs in an optimal brute force attack to reveal an encrypted message. The characteristics of the pr ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker performs in an optimal brute force attack to reveal an encrypted message. The characteristics

Selective Encryption of Wavelet-Packet encoded Image Data -- Efficiency and Security

by Andreas Pommer, Andreas Uhl
"... Selective Encryption provides the ability to strike a balance between security and processing demands, e.g. in mobile clients. Image encoding using wavelets and especially wavelet packets can be used for efficient selective encryption. We will show how two such methods work, and discuss their advant ..."
Abstract - Cited by 36 (7 self) - Add to MetaCart
Selective Encryption provides the ability to strike a balance between security and processing demands, e.g. in mobile clients. Image encoding using wavelets and especially wavelet packets can be used for efficient selective encryption. We will show how two such methods work, and discuss
Next 10 →
Results 1 - 10 of 1,089
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University