Security for Multimedia Adaptation: Architectures and Solutions
IEEE MultiMedia
Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain
MULTIMEDIA '06 Proceedings of the 14th annual ACM international conference on Multimedia
Efficient selective encryption for JPEG 2000 images using private initial table
Pattern Recognition
MPEG-4 IPMP extension for interoperable protection of multimedia content
EURASIP Journal on Applied Signal Processing
Transmission error and compression robustness of 2D chaotic map image encryption schemes
EURASIP Journal on Information Security
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Multimedia Tools and Applications
Overview on selective encryption of image and video: challenges and perspectives
EURASIP Journal on Information Security
Transparent and perceptually enhanced JPEG image encryption
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
SecVLC: secure transmission over multimedia wireless ad hoc networks with energy-awareness
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Region-based selective encryption for medical imaging
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
A speed-adaptive media encryption scheme for real-time recording and playback system
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Scalable video encryption of H.264 SVC Codec
Journal of Visual Communication and Image Representation
Digital image encryption method using interleaving and random shuffling
MUSP'06 Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing
Transparent image encryption using progressive JPEG
ISC'06 Proceedings of the 9th international conference on Information Security
Compression of encrypted visual data
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Length-preserving bit-stream-based JPEG encryption
Proceedings of the on Multimedia and security
Chaos-based selective encryption for H.264/AVC
Journal of Systems and Software
Hi-index | 0.00 |
We introduce new methods of performing selective encryption and spatial/frequency shuffling of compressed digital content that maintain syntax compliance after content has been secured. The tools described have been proposed to the MPEG-4 Intellectual Property Management and Protection (IPMP) standardization group and have been adopted into the MPEG-4 IPMP Final Proposed Draft Amendment (FPDAM). We describe the application of the new methods to the protection of MPEG-4 video content in the wireless environment, and illustrate how they are used to leverage established encryption algorithms for the protection of only the information fields in the bitstream that are critical to the reconstructed video quality, while maintaining compliance to the syntax of MPEG-4 video, and thereby reduces the amount of data to be encrypted and guarantees the inheritance of many of the good properties of the unprotected bitstreams that have been carefully studied and built, such as error resiliency and network friendliness. The encrypted content bitstream works with many existing random access, network bandwidth adaptation, and error control techniques that have been developed for standard-compliant compressed video, thus making it especially suitable for wireless multimedia applications. Standard compliance also allows subsequent signal processing techniques to be applied to the encrypted bitstream