Cryptanalysis of video encryption based on space-filling curves
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
An Empirical Study of Secure MPEG Video Transmissions
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
An Efficient MPEG Video Encryption Algorithm
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Ciphers and their products: group theory in private key cryptography
Ciphers and their products: group theory in private key cryptography
Perceptual Cryptography on JPEG2000 Compressed Images or Videos
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
On Format-Compliant Iterative Encryption of JPEG2000
ISM '06 Proceedings of the Eighth IEEE International Symposium on Multimedia
Format-compliant jpeg2000 encryption with combined packet header and packet body protection
Proceedings of the 9th workshop on Multimedia & security
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Efficient frequency domain selective scrambling of digital video
IEEE Transactions on Multimedia
Multimedia Selective Encryption by Means of Randomized Arithmetic Coding
IEEE Transactions on Multimedia
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
A proposal for supporting selective encryption in JPSEC
IEEE Transactions on Consumer Electronics
A common conditional access interface for digital video broadcasting decoders
IEEE Transactions on Consumer Electronics
Selective encryption for consumer applications
IEEE Communications Magazine
A format-compliant configurable encryption framework for access control of video
IEEE Transactions on Circuits and Systems for Video Technology
Image scrambling without bandwidth expansion
IEEE Transactions on Circuits and Systems for Video Technology
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion
IEEE Transactions on Circuits and Systems for Video Technology
Selective encryption of the MC EZBC bitstream for DRM scenarios
Proceedings of the 11th ACM workshop on Multimedia and security
ISVC '09 Proceedings of the 5th International Symposium on Advances in Visual Computing: Part II
Selective image encryption based on pixels of interest and singular value decomposition
Digital Signal Processing
Network Assisted Content Protection Architectures for a Connected World
Bell Labs Technical Journal
An enhanced encryption algorithm for video based on multiple Huffman tables
Multimedia Tools and Applications
P3: toward privacy-preserving photo sharing
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Confidentiality of a selectively encrypted H.264 coded video bit-stream
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, IDEA, etc.). The specific characteristics of this kind of data (high-transmission rate with limited bandwidth) make standard encryption algorithms inadequate. Another limitation of fully layered systems consists of altering the whole bitstream syntax which may disable some codec functionalities. Selective encryption is a new trend in image and video content protection. It consists of encrypting only a subset of the data. The aim of selective encryption is to reduce the amount of data to encrypt while preserving a sufficient level of security. This computation saving is very desirable especially in constrained communications (real-time networking, high-definition delivery, and mobile communications with limited computational power devices). In addition, selective encryption allows preserving some codec functionalities such as scalability. This tutorial is intended to give an overview on selective encryption algorithms. The theoretical background of selective encryption, potential applications, challenges, and perspectives is presented.