Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain
MULTIMEDIA '06 Proceedings of the 14th annual ACM international conference on Multimedia
Compressed-Domain Encryption of Adapted H.264 Video
ISM '06 Proceedings of the Eighth IEEE International Symposium on Multimedia
On efficient transparent jpeg2000 encryption
Proceedings of the 9th workshop on Multimedia & security
EURASIP Journal on Information Security
Design options and comparison of in-network H.264/SVC adaptation
Journal of Visual Communication and Image Representation
Overview on selective encryption of image and video: challenges and perspectives
EURASIP Journal on Information Security
Scalable, Wavelet-Based Video: From Server to Hardware-Accelerated Client
IEEE Transactions on Multimedia
Selective encryption for consumer applications
IEEE Communications Magazine
Streaming video over the Internet: approaches and directions
IEEE Transactions on Circuits and Systems for Video Technology
Bidirectional MC-EZBC with lifting implementation
IEEE Transactions on Circuits and Systems for Video Technology
State-of-the-Art and Trends in Scalable Video Compression With Wavelet-Based Approaches
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Universal Multimedia Access (UMA) calls for solutions where content is created once and subsequently adapted to given requirements. With regard to UMA and scalability, which is required often due to a wide variety of end clients, the best suited codecs are wavelet based (like the MC-EZBC) due to their inherent high number of scaling options. However, we do not only want to adapt the content to given requirements but we want to do so in a secure way. Through DRM we can ensure that the actual content is safe and copyright is observed. However, traditional encryption removes the option of scalability in the encrypted domain which is opposed to what we want to achieve for UMA. The solution is selective encryption where only a part of the content is encrypted, enough to ensure safety but at the same time little enough to keep scalability intact. Towards this goal we discuss various methods of applying encryption to the bitstream produced by the MC-EZBC in order to keep scalability intact in the encrypted domain while also keeping security intact with regard to various DRM scenarios.