Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
The Design of Rijndael
JPEG Still Image Data Compression Standard
JPEG Still Image Data Compression Standard
MPEG Video Encryption Algorithms
Multimedia Tools and Applications
A Novel Image Encryption Scheme Based-on JPEG Encoding
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Analysis and Cryptanalysis of a Selective Encryption Method for JPEG Images
WIAMIS '07 Proceedings of the Eight International Workshop on Image Analysis for Multimedia Interactive Services
JPEG Encryption with File Size Preservation
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Comparison of MPEG video encryption algorithms
Proceedings of the International Conference on Advances in Computing, Communication and Control
Transparent and perceptually enhanced JPEG image encryption
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Study of subjective and objective quality assessment of video
IEEE Transactions on Image Processing
Biclique cryptanalysis of the full AES
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
A format-compliant configurable encryption framework for access control of video
IEEE Transactions on Circuits and Systems for Video Technology
Region of interest signalling for encrypted JPEG images
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
We propose a new method to encrypt baseline JPEG bit streams by selective Huffman code word swapping and coefficient value scrambling based on AES encryption. Furthermore, we show that our approach preserves the length of the bit stream while being completely format-compliant. In contrast to most existing approaches, no recompression is necessary as the encryption is applied directly to the bit stream. In addition, we assess the effort required for brute-force and known-plaintext attacks on pictures encrypted with our approach, showing that both are practically infeasible.