A cross layer resource allocation scheme for secure image delivery in wireless sensor networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
On efficient transparent jpeg2000 encryption
Proceedings of the 9th workshop on Multimedia & security
Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream
EURASIP Journal on Information Security
Joint source, channel coding, and secrecy
EURASIP Journal on Information Security
EURASIP Journal on Information Security
Joint encryption and compression of correlated sources with side information
EURASIP Journal on Information Security
A blind source separation based cryptography scheme for mobile military communication applications
WSEAS TRANSACTIONS on COMMUNICATIONS
NAL Level Encryption for Scalable Video Coding
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams
MMM '09 Proceedings of the 15th International Multimedia Modeling Conference on Advances in Multimedia Modeling
Blind source separation for digital data protection
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Overview on selective encryption of image and video: challenges and perspectives
EURASIP Journal on Information Security
Adaptive chosen-ciphertext attack on secure arithmetic coding
IEEE Transactions on Signal Processing
Fast protection of H.264/AVC by selective encryption of CABAC
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
On the security of the secure arithmetic code
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Simultaneous arithmetic coding and encryption using chaotic maps
IEEE Transactions on Circuits and Systems II: Express Briefs
A novel DRM framework for peer-to-peer music content delivery
Journal of Systems and Software
On the security of multiple Huffman table based encryption
Journal of Visual Communication and Image Representation
Scalable video encryption of H.264 SVC Codec
Journal of Visual Communication and Image Representation
Secure arithmetic coding with error detection capability
EURASIP Journal on Information Security
Improvement of security and feasibility for chaos-based multimedia cryptosystem
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
A chaos-based joint image compression and encryption scheme using DCT and SHA-1
Applied Soft Computing
Journal of Real-Time Image Processing
Cryptanalysis of randomized arithmetic codes based on markov model
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps
Journal of Systems and Software
Fast encryption of JPEG 2000 images in wireless multimedia sensor networks
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Hi-index | 0.00 |
We propose a novel multimedia security framework based on a modification of the arithmetic coder, which is used by most international image and video coding standards as entropy coding stage. In particular, we introduce a randomized arithmetic coding paradigm, which achieves encryption by inserting some randomization in the arithmetic coding procedure; notably, and unlike previous works on encryption by arithmetic coding, this is done at no expense in terms of coding efficiency. The proposed technique can be applied to any multimedia coder employing arithmetic coding; in this paper we describe an implementation tailored to the JPEG 2000 standard. The proposed approach turns out to be robust towards attempts to estimating the image or discovering the key, and allows very flexible protection procedures at the code-block level, allowing to perform total and selective encryption, as well as conditional access