Cryptanalysis of the RCES/RSES image encryption scheme
Journal of Systems and Software
A blind source separation based cryptography scheme for mobile military communication applications
WSEAS TRANSACTIONS on COMMUNICATIONS
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Quasi-commutative watermarking and encryption for secure media content distribution
Multimedia Tools and Applications
Blind source separation for digital data protection
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Adaptive chosen-ciphertext attack on secure arithmetic coding
IEEE Transactions on Signal Processing
Partial Encryption on SPIHT Compressed Images
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Transparent and perceptually enhanced JPEG image encryption
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Subjective and objective quality assessment of transparently encrypted JPEG2000 images
Proceedings of the 12th ACM workshop on Multimedia and security
On the security of multiple Huffman table based encryption
Journal of Visual Communication and Image Representation
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
Journal of Real-Time Image Processing
Contribution of non-scrambled chroma information in privacy-protected face images to privacy leakage
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Joint watermarking and encryption for still visual data
Multimedia Tools and Applications
Hi-index | 0.02 |
In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search, and retrieval. These delegate services have brought new challenges to the protection of multimedia content confidentiality. This paper discusses the importance and feasibility of applying a joint signal processing and cryptographic approach to multimedia encryption, in order to address the access control issues unique to multimedia applications. We propose two atomic encryption operations that can preserve standard compliance and are friendly to delegate processing. Quantitative analysis for these operations is presented to demonstrate that a good tradeoff can be made between security and bitrate overhead. In assisting the design and evaluation of media security systems, we also propose a set of multimedia-oriented security scores to quantify the security against approximation attacks and to complement the existing notion of generic data security. Using video as an example, we present a systematic study on how to strategically integrate different atomic operations to build a video encryption system. The resulting system can provide superior performance over both generic encryption and its simple adaptation to video in terms of a joint consideration of security, bitrate overhead, and friendliness to delegate processing.