On the privacy afforded by adaptive text compression
Computers and Security
A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
Computers and Security
Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
An Empirical Study of Secure MPEG Video Transmissions
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing
Design of integrated multimedia compression and encryption systems
IEEE Transactions on Multimedia
Multimedia Selective Encryption by Means of Randomized Arithmetic Coding
IEEE Transactions on Multimedia
Entropy codec based on evolutionary MHT and its application in video encryption
Proceedings of the 11th ACM workshop on Multimedia and security
Secure arithmetic coding with error detection capability
EURASIP Journal on Information Security
An enhanced encryption algorithm for video based on multiple Huffman tables
Multimedia Tools and Applications
Hi-index | 0.00 |
This work investigates the problem of efficient multimedia data encryption. A novel methodology is proposed to achieve encryption by controlling certain operations in the data compression process using a secret key. The new encryption approach consists of two cascaded modules. The first one is called randomized entropy coding (REC) while the second one is called rotation in partitioned bitstream (RPB). By leveraging the structure of the entropy coder, the joint REC/RPB encryption scheme incurs extremely low computational and implementation costs. Security analysis shows that the proposed scheme can withstand the ciphertext-only attack as well as the known/chosen plaintext attack. The efficiency and security of the proposed encryption scheme makes it an ideal choice in secure media applications where a large amount of multimedia data has to be encrypted/decrypted in real time.