-
1
-
-
34147191751
-
-
Image and Video Encryption, From Digital Rights Management to Secured Personal Communication, 15 of Advances in Information Security. Springer-Verlag, 2005
-
A. Util and A. Pommer, Image and Video Encryption, From Digital Rights Management to Secured Personal Communication, vol. 15 of Advances in Information Security. Springer-Verlag, 2005.
-
-
-
Util, A.1
Pommer, A.2
-
2
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
June
-
B. M. Macq and J.-J. Quisquater, "Cryptology for digital TV broadcasting," Proceedings of the IEEE, vol. 83, pp. 944-957, June 1995.
-
(1995)
Proceedings of the IEEE
, vol.83
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.-J.2
-
3
-
-
3142760861
-
MPEG video encryption algorithms
-
B. Bhargava, C. Shi, and Y. Wang, "MPEG video encryption algorithms," Multimedia Tools and Applications, vol. 24, no. 1, pp. 57-79, 2004.
-
(2004)
Multimedia Tools and Applications
, vol.24
, Issue.1
, pp. 57-79
-
-
Bhargava, B.1
Shi, C.2
Wang, Y.3
-
4
-
-
0032116538
-
Comparison of MPEG encryption algorithms
-
L. Qiao and K. Nahrstedt, "Comparison of MPEG encryption algorithms," International Journal on Computers and Graphics (Special Issue on Data Security in Image Communication and Networks), vol. 22, no. 3, pp. 437-444, 1998.
-
(1998)
International Journal on Computers and Graphics (Special Issue on Data Security in Image Communication and Networks)
, vol.22
, Issue.3
, pp. 437-444
-
-
Qiao, L.1
Nahrstedt, K.2
-
5
-
-
85056396217
-
An empirical study of secure MPEG video transmissions
-
San Diego, California, pp
-
I. Agi and L. Gong, "An empirical study of secure MPEG video transmissions," in ISOC Symposium on Network and Distributed Systems Security, (San Diego, California), pp. 137-144, 1996.
-
(1996)
ISOC Symposium on Network and Distributed Systems Security
, pp. 137-144
-
-
Agi, I.1
Gong, L.2
-
7
-
-
0036612847
-
A format-compliant configurable encryption framework for access control of video
-
June
-
J. Wen, M. Severa, W. Zeng, M. Luttrell, and W. Jin, "A format-compliant configurable encryption framework for access control of video," IEEE Transactions on Circuits and Systems for Video Technology, vol. 12, pp. 545-557, June 2002.
-
(2002)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.12
, pp. 545-557
-
-
Wen, J.1
Severa, M.2
Zeng, W.3
Luttrell, M.4
Jin, W.5
-
8
-
-
2342457357
-
A secrecy scheme for MPEG video data using the joint of compression and encryption
-
Proceedings of the 1999 Information Security Workshop ISW'99, of, Kuala Lumpur, pp, Springer-Verlag. Nov
-
S. Shin, K. Sim, and K. Rhee, "A secrecy scheme for MPEG video data using the joint of compression and encryption," in Proceedings of the 1999 Information Security Workshop (ISW'99), vol. 1729 of Lecture Notes on Computer Science, (Kuala Lumpur), pp. 191-201, Springer-Verlag. Nov. 1999.
-
(1999)
Lecture Notes on Computer Science
, vol.1729
, pp. 191-201
-
-
Shin, S.1
Sim, K.2
Rhee, K.3
-
9
-
-
0030419062
-
Methods for encrypting and decrypting MPEG video data efficiently
-
Boston, USA, pp, Nov
-
L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proceedings of the ACM Multimedia 1996, (Boston, USA), pp. 219-229, Nov. 1996.
-
(1996)
Proceedings of the ACM Multimedia 1996
, pp. 219-229
-
-
Tang, L.1
-
10
-
-
2642538533
-
Application scenarios for selective encryption of visual data
-
J. Dittmann, J. Fridrich, and P. Wohlmacher, eds, Juan-les-Pins, France, pp, Dec
-
A. Pommer and A. Uhl, "Application scenarios for selective encryption of visual data," in Multimedia and Security Workshop, ACM Multimedia (J. Dittmann, J. Fridrich, and P. Wohlmacher, eds.), (Juan-les-Pins, France), pp. 71-74, Dec. 2002.
-
(2002)
Multimedia and Security Workshop, ACM Multimedia
, pp. 71-74
-
-
Pommer, A.1
Uhl, A.2
-
11
-
-
84957882001
-
Enabling technology for the trading of MPEG-encoded video
-
July
-
J. Dittmann and R. Steinmetz, "Enabling technology for the trading of MPEG-encoded video," in Information Security and Privacy. Second Australasian Conference, ACISP '97, vol. 1270, pp. 314-324, July 1997
-
(1997)
Information Security and Privacy. Second Australasian Conference, ACISP '97
, vol.1270
, pp. 314-324
-
-
Dittmann, J.1
Steinmetz, R.2
-
12
-
-
34347214958
-
An integrated approach to encrypting scalable video
-
Laussanne, Switzerland, Aug
-
A. Eskicioglu and E. J. Delp, "An integrated approach to encrypting scalable video," in Proceedings of the IEEE International Conference on Multimedia and Expo, ICME '02, (Laussanne, Switzerland), Aug. 2002
-
(2002)
Proceedings of the IEEE International Conference on Multimedia and Expo, ICME '02
-
-
Eskicioglu, A.1
Delp, E.J.2
-
13
-
-
1442310336
-
Applying encryption to video communication
-
Bristol, England, pp, Sept
-
T. Kunkelmann, "Applying encryption to video communication," in Proceedings of the Multimedia and Security Workshop at ACM Multimedia '98, (Bristol, England), pp, 41-47, Sept. 1998.
-
(1998)
Proceedings of the Multimedia and Security Workshop at ACM Multimedia '98
, pp. 41-47
-
-
Kunkelmann, T.1
-
14
-
-
0037745868
-
Efficient and fully scalable encryption for MPEG-4 FGS
-
Bangkok, Thailand, May
-
C. Yuan, B. B. Zhu, Y. Wang, S. Li, and Y. Zhong, "Efficient and fully scalable encryption for MPEG-4 FGS," in IEEE International Symposium on Circuits and Systems (ISCAS'03), (Bangkok, Thailand), May 2003.
-
(2003)
IEEE International Symposium on Circuits and Systems (ISCAS'03)
-
-
Yuan, C.1
Zhu, B.B.2
Wang, Y.3
Li, S.4
Zhong, Y.5
-
16
-
-
2342467011
-
On the application of image decomposition to image compression and encryption
-
P. Horster, ed, Essen, Germany, pp, Chapman & Hall, Sept
-
H. Cheng and X. Li, "On the application of image decomposition to image compression and encryption," in Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS '96 (P. Horster, ed.), (Essen, Germany), pp. 116-127, Chapman & Hall, Sept. 1996.
-
(1996)
Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS '96
, pp. 116-127
-
-
Cheng, H.1
Li, X.2
-
18
-
-
33646131508
-
Layered encryption techniques for DCT-coded visual data
-
Vienna, Austria, Sept, paper cr1361
-
M. M. Fisch, H. Stögner, and A. Uhl, "Layered encryption techniques for DCT-coded visual data," in Proceedings (CD-ROM) of the European Signal Processing Conference, EUSIPCO '04, (Vienna, Austria), Sept. 2004, paper cr1361.
-
(2004)
Proceedings (CD-ROM) of the European Signal Processing Conference, EUSIPCO '04
-
-
Fisch, M.M.1
Stögner, H.2
Uhl, A.3
-
19
-
-
33646144108
-
Selective bitplane encryption for secure transmission of image data in mobile environments
-
Tromso-Trondheim, Norway, IEEE Norway Section
-
M. Podesser, H.-P, Schmidt, and A. Uhl, "Selective bitplane encryption for secure transmission of image data in mobile environments," in CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), (Tromso-Trondheim, Norway), IEEE Norway Section, Oct. 2002. file cr1037.pdf.
-
CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002)
-
-
Podesser, M.1
Schmidt, H.-P.2
Uhl, A.3
-
20
-
-
20444496548
-
Security evaluation for communication-friendly encryption of multimedia
-
Singapore, IEEE Signal Processing Society, Oct
-
Y. Mao and M. Wu, "Security evaluation for communication-friendly encryption of multimedia," in Proceedings of the IEEE International Conference on Image Processing (ICIP'04), (Singapore), IEEE Signal Processing Society, Oct. 2004.
-
(2004)
Proceedings of the IEEE International Conference on Image Processing (ICIP'04)
-
-
Mao, Y.1
Wu, M.2
|