Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Efficient MPEG Video Encryption Algorithm
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
An overview of the basic principles of the Q-Coder adaptive binary arithmetic coder
IBM Journal of Research and Development - Q-Coder adaptive binary arithmetic coder
A Novel Image Encryption Scheme Based-on JPEG Encoding
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
A joint signal processing and cryptographic approach to multimedia encryption
IEEE Transactions on Image Processing
A format-compliant configurable encryption framework for access control of video
IEEE Transactions on Circuits and Systems for Video Technology
On the Design of Perceptual MPEG-Video Encryption Algorithms
IEEE Transactions on Circuits and Systems for Video Technology
Length-preserving bit-stream-based JPEG encryption
Proceedings of the on Multimedia and security
Hi-index | 0.00 |
In many applications encryption/decryption of compressed images or videos is desired to be transparent to the compression decoder to maintain the file format, file size and content-relevant functionalities. We propose in this paper a transparent encryption mechanism for JPEG-encoded image files to meet the requirements of format-compliance and file-size preservation. The algorithm is based on a special cross-block Varied-Length Codes (VLC) shuffling method perceptually enhanced by a reversible histogram spreading processing, which tends to smoothly re-distribute VLCs among spatial blocks in a reversible way. The algorithm performs visually better than existing shuffling based schemes against content leakage attacks such as DC value removal.