25.3.10.8.2 Video Encryption, Video Cryptography, Authentication

Chapter Contents (Back)
Encryption. Video Encryption.

Li, S.J.[Shu-Jun], Li, C.Q.[Cheng-Qing], Chen, G.R.[Guan-Rong], Bourbakis, N.G.[Nikolaos G.], Lo, K.T.[Kwok-Tung],
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,
SP:IC(23), No. 3, March 2008, pp. 212-223.
Elsevier DOI 0804
Permutation-only multimedia encryption; Image; Video; Speech; Cryptanalysis; Known-plaintext attack; Chosen-plaintext attack BibRef

Wang, X.F.[Xiao-Feng], Zheng, N.N.[Nan-Ning], Tian, L.[Lihua],
Hash key-based video encryption scheme for H.264/AVC,
SP:IC(25), No. 6, July 2010, pp. 427-437.
Elsevier DOI 1007
Video encryption; H.264/AVC; Intra-prediction mode; Motion vector difference; Quantization coefficient; Hash function BibRef

Yeung, S.K.A.[Siu-Kei Au], Zhu, S., Zeng, B.[Bing],
Design of New Unitary Transforms for Perceptual Video Encryption,
CirSysVideo(21), No. 9, September 2011, pp. 1341-1345.
IEEE DOI 1109
BibRef

Yeung, S.K.A.[Siu-Kei Au], Zeng, B.[Bing],
A new design of multiple transforms for perceptual video encryption,
ICIP12(2637-2640).
IEEE DOI 1302
BibRef

Thorpe, C.[Christopher], Li, F.[Feng], Li, Z.J.[Zi-Jia], Yu, Z.[Zhan], Saunders, D.[David], Yu, J.Y.[Jing-Yi],
A Coprime Blur Scheme for Data Security in Video Surveillance,
PAMI(35), No. 12, 2013, pp. 3066-3072.
IEEE DOI 1311
Cameras. Special encryption, strategic blurring. BibRef

Asghar, M.N.[Mamoona N.], Ghanbari, M.[Mohammed], Fleury, M.[Martin], Reed, M.J.[Martin J.],
Confidentiality of a selectively encrypted H.264 coded video bit-stream,
JVCIR(25), No. 2, 2014, pp. 487-498.
Elsevier DOI 1402
Confidentiality BibRef

Asghar, M.N.[Mamoona N.], Kousar, R.[Rukhsana], Majid, H.[Hooriya], Fleury, M.[Martin],
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes,
JVCIR(45), No. 1, 2017, pp. 122-136.
Elsevier DOI 1704
B-frames BibRef

Benrhouma, O.[Oussama], Hermassi, H.[Houcemeddine], El-Latif, A.A.A.[Ahmed A. Abd], Belghith, S.[Safya],
Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain,
SIViP(9), No. 6, September 2015, pp. 1281-1286.
Springer DOI 1509
BibRef

Xu, H.[Hui], Tong, X.J.[Xiao-Jun], Zhang, M.[Miao], Wang, Z.[Zhu], Li, L.H.[Ling-Hao],
Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system,
JOSA-A(33), No. 6, June 2016, pp. 1166-1174.
DOI Link 1606
Video BibRef

Boyadjis, B., Bergeron, C., Pesquet-Popescu, B., DuFaux, F.[Frédéric],
Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded Video Streams,
CirSysVideo(27), No. 4, April 2017, pp. 892-906.
IEEE DOI 1704
Channel coding BibRef

Minemura, K., Wong, K., Phan, R.C.W., Tanaka, K.,
A Novel Sketch Attack for H.264/AVC Format-Compliant Encrypted Video,
CirSysVideo(27), No. 11, November 2017, pp. 2309-2321.
IEEE DOI 1712
Discrete cosine transforms, Encoding, Encryption, Image coding, Standards, Transform coding, Format-compliant encryption, sketch attack BibRef

Khlif, N.[Naziha], Masmoudi, A.[Atef], Kammoun, F.[Fahmi], Masmoudi, N.[Nouri],
Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection,
IET-IPR(12), No. 1, January 2018, pp. 42-52.
DOI Link 1712
BibRef

Thiyagarajan, K., Lu, R., El-Sankary, K., Zhu, H.,
Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things,
CirSysVideo(29), No. 3, March 2019, pp. 610-624.
IEEE DOI 1903
Encryption, Streaming media, Transforms, Multimedia communication, Syntactics, HEVC, Internet of Multimedia Things (IoMT), low encryption overhead BibRef

Elkamchouchi, H.[Hassan], Salama, W.M.[Wessam M.], Abouelseoud, Y.[Yasmine],
New video encryption schemes based on chaotic maps,
IET-IPR(14), No. 2, February 2020, pp. 397-406.
DOI Link 2001
BibRef

Ghimire, S., Choi, J.Y., Lee, B.,
Using Blockchain for Improved Video Integrity Verification,
MultMed(22), No. 1, January 2020, pp. 108-121.
IEEE DOI 2001
Blockchain, video integrity, elliptic curve cryptography (ECC), HMAC BibRef

Panwar, K.[Kirtee], Purwar, R.K.[Ravindra Kumar], Srivastava, G.[Garima],
A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map,
IJIG(21), No. 2 2021, pp. 2150022.
DOI Link 2105
BibRef

Beugnon, S.[Sébastien], van Rensburg, B.J.[Bianca Jansen], Amalou, N.[Naima], Puech, W.[William], Pedeboy, J.P.[Jean-Pierre],
A 3D Visual Security (3DVS) score to measure the visual security level of selectively encrypted 3D objects,
SP:IC(108), 2022, pp. 116832.
Elsevier DOI 2209
3D object, 3D selective encryption, Subjective evaluation, Content protection, Visual security level BibRef


Li, D., Zhang, X., Zhai, G., Yang, X., Zhu, W., Gu, X.,
Modeling Thermal Sequence Signal Decreasing for Dual Modal Password Breaking,
ICIP18(1703-1707)
IEEE DOI 1809
Password, Cameras, Mathematical model, Estimation, Temperature measurement, Videos, Heat transfer, sequence analysis BibRef

Kim, J., Lee, S., Yoon, J., Ko, H., Kim, S., Oh, H.,
PASS: Privacy aware secure signature scheme for surveillance systems,
AVSS17(1-6)
IEEE DOI 1806
data privacy, digital signatures, private key cryptography, video signal processing, video surveillance, PASS, chameleon hash, Watermarking BibRef

Hu, Y., Zhou, W., Zhao, S., Chen, Z., Li, W.,
SDM: Semantic Distortion Measurement for Video Encryption,
FG18(764-768)
IEEE DOI 1806
Distortion, Distortion measurement, Encryption, Object segmentation, Semantics, Visualization, image caption, video encryption BibRef

Chang, Y.T.[Yao-Tang], Lin, Y.C.[Yih-Chuan], Chen, Y.C.[Yu-Chang], Liou, Y.T.[Yan-Tai],
Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network,
CompIMAGE16(241-250).
Springer DOI 1704
BibRef

Almarashda, K.[Khalfan], Dawood, A.[Ali], Martin, T.[Thomas], Al-Mualla, M.[Mohammed], Bhaskar, H.[Harish],
An Optimized Selective Encryption for Video Confidentiality,
ICIAR15(109-118).
Springer DOI 1507
BibRef

Puech, W., Erkin, Z., Barni, M., Rane, S., Lagendijk, R.L.,
Emerging cryptographic challenges in image and video processing,
ICIP12(2629-2632).
IEEE DOI 1302
enforce content access control, identity verification and authentication, and privacy protection BibRef

Li, C.H.[Chun-Hua], Yuan, C.[Chun], Zhong, Y.Z.[Yu-Zhuo],
Layered Encryption for Scalable Video Coding,
CISP09(1-4).
IEEE DOI 0910
BibRef

Raju, C.N.[C. Narsimha], Umadevi, G.[Ganugula], Srinathan, K.[Kannan], Jawahar, C.V.,
Fast and Secure Real-Time Video Encryption,
ICCVGIP08(257-264).
IEEE DOI 0812
BibRef
And:
A novel video encryption technique based on secret sharing,
ICIP08(3136-3139).
IEEE DOI 0810
BibRef

Chen, Z.Y.[Zhen-Yong], Xiong, Z.[Zhang], Tang, L.[Long],
A Novel Scrambling Scheme for Digital Video Encryption,
PSIVT06(997-1006).
Springer DOI 0612
BibRef

Socek, D.[Daniel], Kalva, H.[Hari], Magliveras, S.S.[Spyros S.], Marques, O.[Oge], Culibrk, D.[Dubravko], Furht, B.[Borko],
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos,
ICIAR06(I: 547-558).
Springer DOI 0610
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Watermarks: Extraction, Detection or Recovery .


Last update:Mar 16, 2024 at 20:36:19