메뉴 건너뛰기




Volumn 7, Issue 5, 2005, Pages 828-839

Design of integrated multimedia compression and encryption systems

Author keywords

CELP; Confidentiality; Entropy coder; G.723.1 speech coding; Huffman coding; Multimedia encryption; QM coder; Selective encryption; Signal scrambling

Indexed keywords

CELP; CONFIDENTIALITY; ENTROPY CODER; G.723.1 SPEECH CODING; HUFFMAN CODING; MULTIMEDIA ENCRYPTION; QM CODER; SELECTIVE ENCRYPTION; SIGNAL SCRAMBLING;

EID: 26844567623     PISSN: 15209210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMM.2005.854469     Document Type: Article
Times cited : (302)

References (41)
  • 1
    • 0023965684 scopus 로고
    • Managing stored voice in the etherphone system
    • Feb.
    • D. Terry and D. Swinehart, "Managing stored voice in the etherphone system" ACM Trans. Comput. Syst., vol. 6, no. 1, pp. 3-27, Feb. 1988.
    • (1988) ACM Trans. Comput. Syst , vol.6 , Issue.1 , pp. 3-27
    • Terry, D.1    Swinehart, D.2
  • 2
    • 4243507072 scopus 로고
    • Secure speech and data communication over the public switching telephone network
    • Apr.
    • L. Diez-Del-Rio et al., "Secure speech and data communication over the public switching telephone network," in Proc. ICASSP-94, Apr. 1994.
    • (1994) Proc. ICASSP-94
    • Diez-Del-Rio, L.1
  • 5
    • 1542387334 scopus 로고    scopus 로고
    • Techniques for a selective encryption of uncompressed and compressed images
    • Ghent, Belgium, Sep.
    • M. Droogenbroeck and R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," in Proc. ACIVS, Ghent, Belgium, Sep. 2002.
    • (2002) Proc. ACIVS
    • Droogenbroeck, M.1    Benedett, R.2
  • 7
    • 0027617334 scopus 로고
    • Design and crypt-analysis of transform-based analog speech scramblers
    • Jun.
    • B. Goldburg, S. Sridharan, and E. Dawson, "Design and crypt-analysis of transform-based analog speech scramblers," IEEE J. Select. Areas Commun., vol. 11, no. 5, p. 735, Jun. 1993.
    • (1993) IEEE J. Select. Areas Commun. , vol.11 , Issue.5 , pp. 735
    • Goldburg, B.1    Sridharan, S.2    Dawson, E.3
  • 10
    • 0026116964 scopus 로고
    • Design of a discrete cosine transform based speech scrambler
    • Mar.
    • E. Dawson, "Design of a discrete cosine transform based speech scrambler," Electron. Lett., vol. 27, no. 7, p. 613, Mar. 1991.
    • (1991) Electron. Lett. , vol.27 , Issue.7 , pp. 613
    • Dawson, E.1
  • 11
    • 0030125877 scopus 로고    scopus 로고
    • Wavelet transform-based analogue speech scrambling scheme
    • Apr.
    • F. Ma et al., "Wavelet transform-based analogue speech scrambling scheme," IEEE Electron. Lett., vol. 32, no. 8, p. 719, Apr. 1996.
    • (1996) IEEE Electron. Lett. , vol.32 , Issue.8 , pp. 719
    • Ma, F.1
  • 15
    • 0038273965 scopus 로고    scopus 로고
    • Efficient frequency domain selective scrambling of digital video
    • Mar.
    • W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, no. 1, p. 118, Mar. 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.1 , pp. 118
    • Zeng, W.1    Lei, S.2
  • 16
    • 0029424437 scopus 로고
    • Performance study of a selective encryption scheme for the security of networked, real-time video
    • Oct.
    • G. A. Spanos and T. B. Maples, "Performance study of a selective encryption scheme for the security of networked, real-time video," in Proc. Int. Conf. Computer Commmunication and Networking, Oct. 1995.
    • (1995) Proc. Int. Conf. Computer Commmunication and Networking
    • Spanos, G.A.1    Maples, T.B.2
  • 17
    • 0029699168 scopus 로고    scopus 로고
    • Security for real-time MPEG compressed video in distributed multimedia applications
    • Mar.
    • _, "Security for real-time MPEG compressed video in distributed multimedia applications," in Proc. 15th IEEE Int. Phoenix Conf. Comput. Commun., Mar. 1996.
    • (1996) Proc. 15th IEEE Int. Phoenix Conf. Comput. Commun.
  • 18
    • 85056396217 scopus 로고    scopus 로고
    • An empirical study of secure MPEG video transmissions
    • Feb.
    • I. Agi and L. Gong, "An empirical study of secure MPEG video transmissions," in Proc. ISOC-SNDSS'96, Feb. 1996.
    • (1996) Proc. ISOC-SNDSS'96
    • Agi, I.1    Gong, L.2
  • 20
    • 0030419062 scopus 로고    scopus 로고
    • Methods for encrypting and decrypting MPEG video data efficiently
    • Nov.
    • L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. 4th ACM Int. Conf. Multimedia, Nov. 1996, p. 219.
    • (1996) Proc. 4th ACM Int. Conf. Multimedia , pp. 219
    • Tang, L.1
  • 21
    • 0031379148 scopus 로고    scopus 로고
    • Is MPEG encryption by using random list instead of zigzag order secure?
    • Dec.
    • L. Qiao et al., "Is MPEG encryption by using random list instead of zigzag order secure?," in Proc. IEEE Int. Symp. Consumer Electronics, Dec. 1997.
    • (1997) Proc. IEEE Int. Symp. Consumer Electronics
    • Qiao, L.1
  • 22
    • 0032116538 scopus 로고    scopus 로고
    • Comparison of MPEG encryption algorithms
    • Jan.
    • L. Qiao and K. Nahrstedt, "Comparison of MPEG encryption algorithms," Int. J. Comput. and Graph., vol. 22, no. 3, Jan. 1998.
    • (1998) Int. J. Comput. and Graph. , vol.22 , Issue.3
    • Qiao, L.1    Nahrstedt, K.2
  • 24
    • 0004893214 scopus 로고    scopus 로고
    • MPEG video encryption in real-time using secret key cryptography
    • Jun.
    • C. Shi, S. Wang, and B. Bhargava, "MPEG video encryption in real-time using secret key cryptography," Proc. PDPTA'99, vol. 6, p. 2822, Jun. 1999.
    • (1999) Proc. PDPTA'99 , vol.6 , pp. 2822
    • Shi, C.1    Wang, S.2    Bhargava, B.3
  • 25
    • 0034249821 scopus 로고    scopus 로고
    • Partial encryption of compressed images and videos
    • Aug.
    • H. Cheng and X. Li, "Partial encryption of compressed images and videos," IEEE Trans. Signal Process., vol. 48, no. 8, p. 2439, Aug. 2000.
    • (2000) IEEE Trans. Signal Process. , vol.48 , Issue.8 , pp. 2439
    • Cheng, H.1    Li, X.2
  • 26
    • 0034992482 scopus 로고    scopus 로고
    • Fast encryption methods for audio-visual data confidentiality
    • Nov.
    • C.-P. Wu and C.-C. J. Kuo, "Fast encryption methods for audio-visual data confidentiality," in SPIE Int. Symp. Information Technologies 2000, vol. 4209, Nov. 2000, p. 284.
    • (2000) SPIE Int. Symp. Information Technologies 2000 , vol.4209 , pp. 284
    • Wu, C.-P.1    Kuo, C.-C.J.2
  • 27
    • 0036879750 scopus 로고    scopus 로고
    • Perception-based partial encryption of compressed speech
    • Nov.
    • A. Servetti and J. Martin, "Perception-based partial encryption of compressed speech," IEEE Trans. Speech Audio Process., vol. 10, p. 637, Nov. 2002.
    • (2002) IEEE Trans. Speech Audio Process. , vol.10 , pp. 637
    • Servetti, A.1    Martin, J.2
  • 28
    • 0036298113 scopus 로고    scopus 로고
    • Perception-based selective encryption of g.729 speech
    • May
    • _, "Perception-based selective encryption of g.729 speech," in Proc. ICASSP 2002, vol. 1, May 2002, pp. 621-624.
    • (2002) Proc. ICASSP 2002 , vol.1 , pp. 621-624
  • 29
    • 0030704417 scopus 로고    scopus 로고
    • A methodology for performing secure data compression
    • Mar.
    • A. Barbir, "A methodology for performing secure data compression," in Proc. 29th Southeastern Symp. System Theory, Mar. 1997, p. 266.
    • (1997) Proc. 29th Southeastern Symp. System Theory , pp. 266
    • Barbir, A.1
  • 30
    • 0027561382 scopus 로고
    • A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
    • H. Bergen and J. Hogan, "A chosen plaintext attack on an adaptive arithmetic coding compression algorithm," Comput. Secur., vol. 12, p. 157, 1993.
    • (1993) Comput. Secur. , vol.12 , pp. 157
    • Bergen, H.1    Hogan, J.2
  • 31
    • 0029232898 scopus 로고
    • On the insecurity of arithmetic coding
    • J. Cleary et al., "On the insecurity of arithmetic coding," Comput. and Secur., vol. 14, p. 167, 1995.
    • (1995) Comput. and Secur. , vol.14 , pp. 167
    • Cleary, J.1
  • 32
    • 84957886287 scopus 로고    scopus 로고
    • Cryptanalysis of adaptive arithmetic coding encryption scheme
    • J. Lim, C. Boyd, and E. Dawson, "Cryptanalysis of adaptive arithmetic coding encryption scheme," in Proc. ACISP, 1997, pp. 216-227.
    • (1997) Proc. ACISP , pp. 216-227
    • Lim, J.1    Boyd, C.2    Dawson, E.3
  • 33
    • 0024055716 scopus 로고
    • On the privacy afforded by adaptive text compression
    • I. H. Witten and J. G. Cleary, "On the privacy afforded by adaptive text compression," Comput. and Secur., vol. 7, pp. 397-408, 1988.
    • (1988) Comput. and Secur. , vol.7 , pp. 397-408
    • Witten, I.H.1    Cleary, J.G.2
  • 36
    • 0034774807 scopus 로고    scopus 로고
    • Efficient multimedia encryption via entropy codec design
    • Jan.
    • C.-P. Wu and C.-C. J. Kuo, "Efficient multimedia encryption via entropy codec design," in Proc. SPIE Int. Symp. Electronic Imaging 2001, vol. 4314, Jan. 2001, p. 128.
    • (2001) Proc. SPIE Int. Symp. Electronic Imaging 2001 , vol.4314 , pp. 128
    • Wu, C.-P.1    Kuo, C.-C.J.2
  • 37
    • 0003618441 scopus 로고    scopus 로고
    • Report on the development of the advanced encryption standard
    • National Institute of Standards and Technology, Oct.
    • J. Nechvatal et al., "Report on the Development of the Advanced Encryption Standard," National Institute of Standards and Technology, U.S. Dept. Commerce, Tech. Rep., Oct. 2000.
    • (2000) U.S. Dept. Commerce, Tech. Rep.
    • Nechvatal, J.1
  • 39
    • 84861258497 scopus 로고    scopus 로고
    • [Online]
    • E. Filiol. The Cos Cipher Family. [Online]. Available: www-rocq.inria.fr/codes/Eric.Filiol/English/COS/COS.html
    • The Cos Cipher Family
    • Filiol, E.1
  • 40
    • 0003477797 scopus 로고    scopus 로고
    • Cambridge, U.K.: Press Syndicate of the Univ. of Cambridge
    • V. D. Lubbe, Basic Methods of Cryptography. Cambridge, U.K.: Press Syndicate of the Univ. of Cambridge, 1998.
    • (1998) Basic Methods of Cryptography
    • Lubbe, V.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.