Asynchronous transfer mode (2nd ed.): solution for broadband ISDN
Asynchronous transfer mode (2nd ed.): solution for broadband ISDN
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Simulation Modeling and Analysis
Simulation Modeling and Analysis
Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Robust FPGA intellectual property protection through multiple small watermarks
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Efficient frequency domain video scrambling for content access control
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
On error preserving encryption algorithms for wireless video transmission
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Managing security in high-performance distributed computations
Cluster Computing
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Zero overhead watermarking technique for FPGA designs
Proceedings of the 13th ACM Great Lakes symposium on VLSI
MPEG Video Encryption Algorithms
Multimedia Tools and Applications
Enhancing security of frequency domain video encryption
Proceedings of the 12th annual ACM international conference on Multimedia
A novel encryption algorithm for high resolution video
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream
EURASIP Journal on Information Security
Digital video encryption algorithms based on correlation-preserving permutations
EURASIP Journal on Information Security
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Privacy-Enabled Object Tracking in Video Sequences Using Compressive Sensing
AVSS '09 Proceedings of the 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance
Overview on selective encryption of image and video: challenges and perspectives
EURASIP Journal on Information Security
On the implementation of security policies with adaptative encryption
Computer Communications
SecVLC: secure transmission over multimedia wireless ad hoc networks with energy-awareness
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Using SCTP to implement multihomed web servers
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
A new video encryption scheme for H.264/AVC
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Hash key-based video encryption scheme for H.264/AVC
Image Communication
Security implications of selective encryption
Proceedings of the 6th International Workshop on Security Measurements and Metrics
On the security of multiple Huffman table based encryption
Journal of Visual Communication and Image Representation
A speed-adaptive media encryption scheme for real-time recording and playback system
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Scalable video encryption of H.264 SVC Codec
Journal of Visual Communication and Image Representation
An FPGA intellectual property authentication scheme through watermarking techniques
IMCAS'06 Proceedings of the 5th WSEAS international conference on Instrumentation, measurement, circuits and systems
Entropy of selectively encrypted strings
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Puzzle: a novel video encryption algorithm
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Multimedia digital right management using selective scrambling for mobile handset
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Secure transmission of video on an end system multicast using public key cryptography
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Intellectual property rights management using combination encryption in MPEG-4
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
A novel scrambling scheme for digital video encryption
PSIVT'06 Proceedings of the First Pacific Rim conference on Advances in Image and Video Technology
Data protection based on physical separation: concepts and application scenarios
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
An enhanced encryption algorithm for video based on multiple Huffman tables
Multimedia Tools and Applications
QoS aware adaptive security scheme for video streaming in MANETs
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.00 |
Due to their large size, video images present a great challenge to currently available cryptographic algorithms; the computationally intensive processes of encryption and decryption of video images, introduce delays that are beyond acceptable real-time video application limits. In this paper, the Aegis mechanism is proposed.Aegis limits the amount of data to be encrypted or decrypted by using video compression to reduce the size of transmitted video images. The performance of Aegis (utilizing MPEG video compression across an ATM network) is explored through an extensive simulation study. Three types of video traffic: CATV, Studio TV, and video conference are considered. Our simulation results demonstrate the delay performance, as well as, the queue requirements for the Aegis encryption scheme versus the full encryption and no encryption schemes.