Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
Computationally private information retrieval (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Designing an Academic Firewall: Policy, Practice, and Experience with SURF
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
An Empirical Study of Secure MPEG Video Transmissions
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
C-HTTP -- The Development of a Secure, Closed HTTP-based Network on the Internet
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Hi-index | 0.00 |
A number of approaches currently used for video security have certain implementation specific problems in addition to being security deficient. The problems include computational power, memory requirement and/or dependence on existing compression algorithms. In this paper, we propose a combination of two approaches: a multiresolution transform with an additional feature of signal hopping; and use of synchronised chaos for information signals. The second method utilises chaos theory for encryption of the signals in networked environment. What is more, the approaches can be combined to provide a relatively higher degree of security with an ease of implementation for embedding in existing video compression algorithms. Both of these approaches are independent of any video compression algorithm. Detailed discussions are given to highlight implementation issues with respect to either of the approaches. We compare both approaches for the same purpose and propose some suggestions for implementation for various video applications.