Alberti, C.,
Romeo, A.,
Mattavelli, M.,
Intellectual property management and protection for MPEG multimedia
content: A structured language for interoperable IPMP systems,
IJIST(13), No. 5, 2003, pp. 275-288.
DOI Link
0312
BibRef
Li, S.J.[Shu-Jun],
Li, C.Q.[Cheng-Qing],
Chen, G.R.[Guan-Rong],
Bourbakis, N.G.[Nikolaos G.],
Lo, K.T.[Kwok-Tung],
A general quantitative cryptanalysis of permutation-only multimedia
ciphers against plaintext attacks,
SP:IC(23), No. 3, March 2008, pp. 212-223.
Elsevier DOI
0804
Permutation-only multimedia encryption; Image; Video; Speech;
Cryptanalysis; Known-plaintext attack; Chosen-plaintext attack
BibRef
Wang, X.F.[Xiao-Feng],
Zheng, N.N.[Nan-Ning],
Tian, L.[Lihua],
Hash key-based video encryption scheme for H.264/AVC,
SP:IC(25), No. 6, July 2010, pp. 427-437.
Elsevier DOI
1007
Video encryption; H.264/AVC; Intra-prediction mode; Motion vector
difference; Quantization coefficient; Hash function
BibRef
Yeung, S.K.A.[Siu-Kei Au],
Zhu, S.,
Zeng, B.[Bing],
Design of New Unitary Transforms for Perceptual Video Encryption,
CirSysVideo(21), No. 9, September 2011, pp. 1341-1345.
IEEE DOI
1109
BibRef
Yeung, S.K.A.[Siu-Kei Au],
Zeng, B.[Bing],
A new design of multiple transforms for perceptual video encryption,
ICIP12(2637-2640).
IEEE DOI
1302
BibRef
Pande, A.,
Mohapatra, P.,
Zambreno, J.,
Securing Multimedia Content Using Joint Compression and Encryption,
MultMedMag(20), No. 4, October 2013, pp. 50-61.
IEEE DOI
1403
Internet
BibRef
Thorpe, C.[Christopher],
Li, F.[Feng],
Li, Z.J.[Zi-Jia],
Yu, Z.[Zhan],
Saunders, D.[David],
Yu, J.Y.[Jing-Yi],
A Coprime Blur Scheme for Data Security in Video Surveillance,
PAMI(35), No. 12, 2013, pp. 3066-3072.
IEEE DOI
1311
Cameras. Special encryption, strategic blurring.
BibRef
Asghar, M.N.[Mamoona N.],
Ghanbari, M.[Mohammed],
Fleury, M.[Martin],
Reed, M.J.[Martin J.],
Confidentiality of a selectively encrypted H.264 coded video
bit-stream,
JVCIR(25), No. 2, 2014, pp. 487-498.
Elsevier DOI
1402
Confidentiality
BibRef
Asghar, M.N.[Mamoona N.],
Kousar, R.[Rukhsana],
Majid, H.[Hooriya],
Fleury, M.[Martin],
Transparent encryption with scalable video communication:
Lower-latency, CABAC-based schemes,
JVCIR(45), No. 1, 2017, pp. 122-136.
Elsevier DOI
1704
B-frames
BibRef
Bhatnagar, G.,
Wu, Q.M.J.,
Biometric Inspired Multimedia Encryption Based on Dual Parameter
Fractional Fourier Transform,
SMCS(44), No. 9, September 2014, pp. 1234-1247.
IEEE DOI
1410
Fourier transforms
BibRef
Benrhouma, O.[Oussama],
Hermassi, H.[Houcemeddine],
El-Latif, A.A.A.[Ahmed A. Abd],
Belghith, S.[Safya],
Cryptanalysis of a video encryption method based on mixing and
permutation operations in the DCT domain,
SIViP(9), No. 6, September 2015, pp. 1281-1286.
Springer DOI
1509
BibRef
Xu, H.[Hui],
Tong, X.J.[Xiao-Jun],
Zhang, M.[Miao],
Wang, Z.[Zhu],
Li, L.H.[Ling-Hao],
Dynamic video encryption algorithm for H.264/AVC based on a
spatiotemporal chaos system,
JOSA-A(33), No. 6, June 2016, pp. 1166-1174.
DOI Link
1606
Video
BibRef
Boyadjis, B.,
Bergeron, C.,
Pesquet-Popescu, B.,
DuFaux, F.[Frédéric],
Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded
Video Streams,
CirSysVideo(27), No. 4, April 2017, pp. 892-906.
IEEE DOI
1704
Channel coding
BibRef
Minemura, K.,
Wong, K.,
Phan, R.C.W.,
Tanaka, K.,
A Novel Sketch Attack for H.264/AVC Format-Compliant Encrypted Video,
CirSysVideo(27), No. 11, November 2017, pp. 2309-2321.
IEEE DOI
1712
Discrete cosine transforms, Encoding, Encryption, Image coding,
Standards, Transform coding, Format-compliant encryption,
sketch attack
BibRef
Khlif, N.[Naziha],
Masmoudi, A.[Atef],
Kammoun, F.[Fahmi],
Masmoudi, N.[Nouri],
Secure chaotic dual encryption scheme for H.264/AVC video conferencing
protection,
IET-IPR(12), No. 1, January 2018, pp. 42-52.
DOI Link
1712
BibRef
Thiyagarajan, K.,
Lu, R.,
El-Sankary, K.,
Zhu, H.,
Energy-Aware Encryption for Securing Video Transmission in Internet
of Multimedia Things,
CirSysVideo(29), No. 3, March 2019, pp. 610-624.
IEEE DOI
1903
Encryption, Streaming media, Transforms, Multimedia communication,
Syntactics, HEVC, Internet of Multimedia Things (IoMT),
low encryption overhead
BibRef
Elkamchouchi, H.[Hassan],
Salama, W.M.[Wessam M.],
Abouelseoud, Y.[Yasmine],
New video encryption schemes based on chaotic maps,
IET-IPR(14), No. 2, February 2020, pp. 397-406.
DOI Link
2001
BibRef
Ghimire, S.,
Choi, J.Y.,
Lee, B.,
Using Blockchain for Improved Video Integrity Verification,
MultMed(22), No. 1, January 2020, pp. 108-121.
IEEE DOI
2001
Blockchain, video integrity, elliptic curve cryptography (ECC), HMAC
BibRef
Panwar, K.[Kirtee],
Purwar, R.K.[Ravindra Kumar],
Srivastava, G.[Garima],
A Fast Encryption Scheme Suitable for Video Surveillance Applications
Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map,
IJIG(21), No. 2 2021, pp. 2150022.
DOI Link
2105
BibRef
Beugnon, S.[Sébastien],
van Rensburg, B.J.[Bianca Jansen],
Amalou, N.[Naima],
Puech, W.[William],
Pedeboy, J.P.[Jean-Pierre],
A 3D Visual Security (3DVS) score to measure the visual security
level of selectively encrypted 3D objects,
SP:IC(108), 2022, pp. 116832.
Elsevier DOI
2209
3D object, 3D selective encryption, Subjective evaluation,
Content protection, Visual security level
BibRef
Sheng, Q.X.[Qing-Xin],
Fu, C.[Chong],
Tie, M.[Ming],
Wang, X.W.[Xing-Wei],
Chen, J.X.[Jun-Xin],
Sham, C.W.[Chiu-Wing],
A Chaos-Based Tunable Selective Encryption Algorithm for H.265/HEVC
with Semantic Understanding,
CirSysVideo(34), No. 11, November 2024, pp. 11040-11055.
IEEE DOI
2412
Encryption, Cryptography, Syntactics, Bit rate, Security, Semantics,
Visualization, H.265/HEVC, selective encryption,
chaos
BibRef
Gadde, S.[Swetha],
Amutharaj, J.,
Usha, S.,
Cloud Multimedia Data Security by Optimization-Assisted Cryptographic
Technique,
IJIG(24), No. 1, January 2024, pp. 2450010.
DOI Link
2402
BibRef
Kim, J.,
Lee, S.,
Yoon, J.,
Ko, H.,
Kim, S.,
Oh, H.,
PASS: Privacy aware secure signature scheme for surveillance systems,
AVSS17(1-6)
IEEE DOI
1806
data privacy, digital signatures, private key cryptography,
video signal processing, video surveillance, PASS, chameleon hash,
Watermarking
BibRef
Hu, Y.,
Zhou, W.,
Zhao, S.,
Chen, Z.,
Li, W.,
SDM: Semantic Distortion Measurement for Video Encryption,
FG18(764-768)
IEEE DOI
1806
Distortion, Distortion measurement, Encryption,
Object segmentation, Semantics, Visualization, image caption,
video encryption
BibRef
Chang, Y.T.[Yao-Tang],
Lin, Y.C.[Yih-Chuan],
Chen, Y.C.[Yu-Chang],
Liou, Y.T.[Yan-Tai],
Scrambling Cryptography Using Programmable SLM-Based Filter for Video
Streaming Over a WDM Network,
CompIMAGE16(241-250).
Springer DOI
1704
BibRef
Almarashda, K.[Khalfan],
Dawood, A.[Ali],
Martin, T.[Thomas],
Al-Mualla, M.[Mohammed],
Bhaskar, H.[Harish],
An Optimized Selective Encryption for Video Confidentiality,
ICIAR15(109-118).
Springer DOI
1507
BibRef
Puech, W.,
Erkin, Z.,
Barni, M.,
Rane, S.,
Lagendijk, R.L.,
Emerging cryptographic challenges in image and video processing,
ICIP12(2629-2632).
IEEE DOI
1302
enforce content access control, identity verification and
authentication, and privacy protection
BibRef
Li, C.H.[Chun-Hua],
Yuan, C.[Chun],
Zhong, Y.Z.[Yu-Zhuo],
Layered Encryption for Scalable Video Coding,
CISP09(1-4).
IEEE DOI
0910
BibRef
Raju, C.N.[C. Narsimha],
Umadevi, G.[Ganugula],
Srinathan, K.[Kannan],
Jawahar, C.V.,
Fast and Secure Real-Time Video Encryption,
ICCVGIP08(257-264).
IEEE DOI
0812
BibRef
And:
A novel video encryption technique based on secret sharing,
ICIP08(3136-3139).
IEEE DOI
0810
BibRef
Chen, Z.Y.[Zhen-Yong],
Xiong, Z.[Zhang],
Tang, L.[Long],
A Novel Scrambling Scheme for Digital Video Encryption,
PSIVT06(997-1006).
Springer DOI
0612
BibRef
Socek, D.[Daniel],
Kalva, H.[Hari],
Magliveras, S.S.[Spyros S.],
Marques, O.[Oge],
Culibrk, D.[Dubravko],
Furht, B.[Borko],
A Permutation-Based Correlation-Preserving Encryption Method for
Digital Videos,
ICIAR06(I: 547-558).
Springer DOI
0610
BibRef
Han, K.,
Tewfik, A.,
Scalable Cryptographic Scheme for Networked Multimedia Applications,
ICIP01(III: 987-990).
IEEE DOI
0108
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Watermarks: Extraction, Detection or Recovery .