Results 1 -
5 of
5
A survey of H.264 AVC/SVC encryption
- IEEE Trans. on Circuits and Systems for Video Technology
, 2012
"... Abstract—Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give ..."
Abstract
-
Cited by 11 (2 self)
- Add to MetaCart
Abstract—Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give researchers and practitioners an analytic and critical overview of the state-of-the-art of video encryption narrowed down to its joint application with the H.264 standard suite and associated protocols (packag-ing / streaming) and processes (transcoding / watermarking). I.
A Survey on Multimedia-Based Cross-Layer Optimization in Visual Sensor Networks
- SENSORS
, 2011
"... ..."
Efficient format-compliant encryption of regular languages: block-based cycle-walking
- Communications and Multimedia Security
, 2010
"... Abstract. In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of re ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
(Show Context)
Abstract. In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the regular language of JPEG2000 bitstreams is compared to the extensive previous work from the multimedia security community and to the previous work from the cryptographic community, which is analyzed and evaluated.
Analysis of JPEG 2000 Encryption with Key-dependent Wavelet Packet Subband Structures
, 2010
"... We analyze and discuss encryption schemes for JPEG 2000 based on the wavelet packet transform with a key-dependent subband structure. These schemes have been assumed to reduce the runtime complexity of encryption and compression. In addition to this “lightweight ” nature, other advantages like encr ..."
Abstract
- Add to MetaCart
(Show Context)
We analyze and discuss encryption schemes for JPEG 2000 based on the wavelet packet transform with a key-dependent subband structure. These schemes have been assumed to reduce the runtime complexity of encryption and compression. In addition to this “lightweight ” nature, other advantages like encrypted domain signal processing have been reported. We systematically analyse encryption approaches based on key-dependent subband structures in terms of their impact on compression performance and the level of security they provide as compared to more classical techniques based on JPSEC. Furthermore, we analyse the prerequisites and settings in which the previously reported advantages actually hold and in which settings little to no advantages can be observed. As a final outcome it has to be stated that this compression integrated encryption approach based on the idea of secret transform domains can be recommended for highly specialised application scenarios only. Previously reported advantages have turned out to apply only partially or only under specific circumstances, and do usually not justify to accept the obvious disadvantages associated with these approaches.
Regular Languages: Block-Based Cycle-Walking
"... c ○ IFIP. This is the author’s version of the work. It is posted here by permission of IFIP for ..."
Abstract
- Add to MetaCart
(Show Context)
c ○ IFIP. This is the author’s version of the work. It is posted here by permission of IFIP for