-
1
-
-
0023965684
-
Managing stored voice in the etherphone system
-
Feb.
-
D. Terry and D. Swinehart, "Managing stored voice in the etherphone system" ACM Trans. Comput. Syst., vol. 6, no. 1, pp. 3-27, Feb. 1988.
-
(1988)
ACM Trans. Comput. Syst
, vol.6
, Issue.1
, pp. 3-27
-
-
Terry, D.1
Swinehart, D.2
-
2
-
-
4243507072
-
Secure speech and data communication over the public switching telephone network
-
Apr.
-
L. Diez-Del-Rio et al., "Secure speech and data communication over the public switching telephone network," in Proc. ICASSP-94, Apr. 1994.
-
(1994)
Proc. ICASSP-94
-
-
Diez-Del-Rio, L.1
-
3
-
-
0003921939
-
-
Technical Univ. Berlin, Berlin, Germany, Project Description of SECMPEG, May
-
J. Meyer and F. Gadegast, "Security Mechanisms for Multimedia Data with the Example MPEG-1 Video," Technical Univ. Berlin, Berlin, Germany, Project Description of SECMPEG, May 1995.
-
(1995)
Security Mechanisms for Multimedia Data with the Example MPEG-1 Video
-
-
Meyer, J.1
Gadegast, F.2
-
5
-
-
1542387334
-
Techniques for a selective encryption of uncompressed and compressed images
-
Ghent, Belgium, Sep.
-
M. Droogenbroeck and R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," in Proc. ACIVS, Ghent, Belgium, Sep. 2002.
-
(2002)
Proc. ACIVS
-
-
Droogenbroeck, M.1
Benedett, R.2
-
7
-
-
0027617334
-
Design and crypt-analysis of transform-based analog speech scramblers
-
Jun.
-
B. Goldburg, S. Sridharan, and E. Dawson, "Design and crypt-analysis of transform-based analog speech scramblers," IEEE J. Select. Areas Commun., vol. 11, no. 5, p. 735, Jun. 1993.
-
(1993)
IEEE J. Select. Areas Commun.
, vol.11
, Issue.5
, pp. 735
-
-
Goldburg, B.1
Sridharan, S.2
Dawson, E.3
-
8
-
-
0026173255
-
Fast Fourier transform based speech encryption system
-
S. Sridharan, E. Dawson, and B. Goldburg, "Fast Fourier transform based speech encryption system," in Commun., Speech and Vision, IEE Proc. I, vol. 138, 1991, p. 215.
-
(1991)
Commun., Speech and Vision, IEE Proc. I
, vol.138
, pp. 215
-
-
Sridharan, S.1
Dawson, E.2
Goldburg, B.3
-
10
-
-
0026116964
-
Design of a discrete cosine transform based speech scrambler
-
Mar.
-
E. Dawson, "Design of a discrete cosine transform based speech scrambler," Electron. Lett., vol. 27, no. 7, p. 613, Mar. 1991.
-
(1991)
Electron. Lett.
, vol.27
, Issue.7
, pp. 613
-
-
Dawson, E.1
-
11
-
-
0030125877
-
Wavelet transform-based analogue speech scrambling scheme
-
Apr.
-
F. Ma et al., "Wavelet transform-based analogue speech scrambling scheme," IEEE Electron. Lett., vol. 32, no. 8, p. 719, Apr. 1996.
-
(1996)
IEEE Electron. Lett.
, vol.32
, Issue.8
, pp. 719
-
-
Ma, F.1
-
13
-
-
0027640603
-
Cryptanalysis of frequency domain analogue speech scramblers
-
Aug.
-
B. Goldburg, S. Sridharan, and E. Dawson, "Cryptanalysis of frequency domain analogue speech scramblers," in Proc. Inst. Electr. Eng., Commun., Speech Vis., vol. 140, Aug. 1993, p. 235.
-
(1993)
Proc. Inst. Electr. Eng., Commun., Speech Vis.
, vol.140
, pp. 235
-
-
Goldburg, B.1
Sridharan, S.2
Dawson, E.3
-
15
-
-
0038273965
-
Efficient frequency domain selective scrambling of digital video
-
Mar.
-
W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, no. 1, p. 118, Mar. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.1
, pp. 118
-
-
Zeng, W.1
Lei, S.2
-
16
-
-
0029424437
-
Performance study of a selective encryption scheme for the security of networked, real-time video
-
Oct.
-
G. A. Spanos and T. B. Maples, "Performance study of a selective encryption scheme for the security of networked, real-time video," in Proc. Int. Conf. Computer Commmunication and Networking, Oct. 1995.
-
(1995)
Proc. Int. Conf. Computer Commmunication and Networking
-
-
Spanos, G.A.1
Maples, T.B.2
-
17
-
-
0029699168
-
Security for real-time MPEG compressed video in distributed multimedia applications
-
Mar.
-
_, "Security for real-time MPEG compressed video in distributed multimedia applications," in Proc. 15th IEEE Int. Phoenix Conf. Comput. Commun., Mar. 1996.
-
(1996)
Proc. 15th IEEE Int. Phoenix Conf. Comput. Commun.
-
-
-
18
-
-
85056396217
-
An empirical study of secure MPEG video transmissions
-
Feb.
-
I. Agi and L. Gong, "An empirical study of secure MPEG video transmissions," in Proc. ISOC-SNDSS'96, Feb. 1996.
-
(1996)
Proc. ISOC-SNDSS'96
-
-
Agi, I.1
Gong, L.2
-
20
-
-
0030419062
-
Methods for encrypting and decrypting MPEG video data efficiently
-
Nov.
-
L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. 4th ACM Int. Conf. Multimedia, Nov. 1996, p. 219.
-
(1996)
Proc. 4th ACM Int. Conf. Multimedia
, pp. 219
-
-
Tang, L.1
-
21
-
-
0031379148
-
Is MPEG encryption by using random list instead of zigzag order secure?
-
Dec.
-
L. Qiao et al., "Is MPEG encryption by using random list instead of zigzag order secure?," in Proc. IEEE Int. Symp. Consumer Electronics, Dec. 1997.
-
(1997)
Proc. IEEE Int. Symp. Consumer Electronics
-
-
Qiao, L.1
-
22
-
-
0032116538
-
Comparison of MPEG encryption algorithms
-
Jan.
-
L. Qiao and K. Nahrstedt, "Comparison of MPEG encryption algorithms," Int. J. Comput. and Graph., vol. 22, no. 3, Jan. 1998.
-
(1998)
Int. J. Comput. and Graph.
, vol.22
, Issue.3
-
-
Qiao, L.1
Nahrstedt, K.2
-
24
-
-
0004893214
-
MPEG video encryption in real-time using secret key cryptography
-
Jun.
-
C. Shi, S. Wang, and B. Bhargava, "MPEG video encryption in real-time using secret key cryptography," Proc. PDPTA'99, vol. 6, p. 2822, Jun. 1999.
-
(1999)
Proc. PDPTA'99
, vol.6
, pp. 2822
-
-
Shi, C.1
Wang, S.2
Bhargava, B.3
-
25
-
-
0034249821
-
Partial encryption of compressed images and videos
-
Aug.
-
H. Cheng and X. Li, "Partial encryption of compressed images and videos," IEEE Trans. Signal Process., vol. 48, no. 8, p. 2439, Aug. 2000.
-
(2000)
IEEE Trans. Signal Process.
, vol.48
, Issue.8
, pp. 2439
-
-
Cheng, H.1
Li, X.2
-
26
-
-
0034992482
-
Fast encryption methods for audio-visual data confidentiality
-
Nov.
-
C.-P. Wu and C.-C. J. Kuo, "Fast encryption methods for audio-visual data confidentiality," in SPIE Int. Symp. Information Technologies 2000, vol. 4209, Nov. 2000, p. 284.
-
(2000)
SPIE Int. Symp. Information Technologies 2000
, vol.4209
, pp. 284
-
-
Wu, C.-P.1
Kuo, C.-C.J.2
-
27
-
-
0036879750
-
Perception-based partial encryption of compressed speech
-
Nov.
-
A. Servetti and J. Martin, "Perception-based partial encryption of compressed speech," IEEE Trans. Speech Audio Process., vol. 10, p. 637, Nov. 2002.
-
(2002)
IEEE Trans. Speech Audio Process.
, vol.10
, pp. 637
-
-
Servetti, A.1
Martin, J.2
-
28
-
-
0036298113
-
Perception-based selective encryption of g.729 speech
-
May
-
_, "Perception-based selective encryption of g.729 speech," in Proc. ICASSP 2002, vol. 1, May 2002, pp. 621-624.
-
(2002)
Proc. ICASSP 2002
, vol.1
, pp. 621-624
-
-
-
29
-
-
0030704417
-
A methodology for performing secure data compression
-
Mar.
-
A. Barbir, "A methodology for performing secure data compression," in Proc. 29th Southeastern Symp. System Theory, Mar. 1997, p. 266.
-
(1997)
Proc. 29th Southeastern Symp. System Theory
, pp. 266
-
-
Barbir, A.1
-
30
-
-
0027561382
-
A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
-
H. Bergen and J. Hogan, "A chosen plaintext attack on an adaptive arithmetic coding compression algorithm," Comput. Secur., vol. 12, p. 157, 1993.
-
(1993)
Comput. Secur.
, vol.12
, pp. 157
-
-
Bergen, H.1
Hogan, J.2
-
31
-
-
0029232898
-
On the insecurity of arithmetic coding
-
J. Cleary et al., "On the insecurity of arithmetic coding," Comput. and Secur., vol. 14, p. 167, 1995.
-
(1995)
Comput. and Secur.
, vol.14
, pp. 167
-
-
Cleary, J.1
-
32
-
-
84957886287
-
Cryptanalysis of adaptive arithmetic coding encryption scheme
-
J. Lim, C. Boyd, and E. Dawson, "Cryptanalysis of adaptive arithmetic coding encryption scheme," in Proc. ACISP, 1997, pp. 216-227.
-
(1997)
Proc. ACISP
, pp. 216-227
-
-
Lim, J.1
Boyd, C.2
Dawson, E.3
-
33
-
-
0024055716
-
On the privacy afforded by adaptive text compression
-
I. H. Witten and J. G. Cleary, "On the privacy afforded by adaptive text compression," Comput. and Secur., vol. 7, pp. 397-408, 1988.
-
(1988)
Comput. and Secur.
, vol.7
, pp. 397-408
-
-
Witten, I.H.1
Cleary, J.G.2
-
34
-
-
0030150167
-
On breaking a huffman code
-
May
-
D. Gillman, M. Mohtashemi, and R. Rivest, "On breaking a huffman code," IEEE Trans. Inform. Theory, vol. 42, no. 3, p. 972, May 1996.
-
(1996)
IEEE Trans. Inform. Theory
, vol.42
, Issue.3
, pp. 972
-
-
Gillman, D.1
Mohtashemi, M.2
Rivest, R.3
-
37
-
-
0003618441
-
Report on the development of the advanced encryption standard
-
National Institute of Standards and Technology, Oct.
-
J. Nechvatal et al., "Report on the Development of the Advanced Encryption Standard," National Institute of Standards and Technology, U.S. Dept. Commerce, Tech. Rep., Oct. 2000.
-
(2000)
U.S. Dept. Commerce, Tech. Rep.
-
-
Nechvatal, J.1
-
39
-
-
84861258497
-
-
[Online]
-
E. Filiol. The Cos Cipher Family. [Online]. Available: www-rocq.inria.fr/codes/Eric.Filiol/English/COS/COS.html
-
The Cos Cipher Family
-
-
Filiol, E.1
-
40
-
-
0003477797
-
-
Cambridge, U.K.: Press Syndicate of the Univ. of Cambridge
-
V. D. Lubbe, Basic Methods of Cryptography. Cambridge, U.K.: Press Syndicate of the Univ. of Cambridge, 1998.
-
(1998)
Basic Methods of Cryptography
-
-
Lubbe, V.D.1
|