-
1
-
-
85045783142
-
Fundamentals of multimedia encryption techniques
-
B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, ch. 3, pp
-
B. Furht, D. Socek, and A. M. Eskicioglu, "Fundamentals of multimedia encryption techniques," in Multimedia Security Handbook, B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, 2004, ch. 3, pp. 93-132.
-
(2004)
Multimedia Security Handbook
, pp. 93-132
-
-
Furht, B.1
Socek, D.2
Eskicioglu, A.M.3
-
2
-
-
85008921093
-
Chaos-based encryption for digital images and videos
-
B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, ch. 4, pp, On-line, Available:, preprint is available at
-
S. Li, G. Chen, and X. Zheng, "Chaos-based encryption for digital images and videos," in Multimedia Security Handbook, B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, 2004, ch. 4, pp. 133-167 [On-line], Available: http://www.hooklee.com/pub.html, preprint is available at
-
(2004)
Multimedia Security Handbook
, pp. 133-167
-
-
Li, S.1
Chen, G.2
Zheng, X.3
-
3
-
-
41649085677
-
-
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Boston, MA: Springer Science, Business Media, 2005
-
A. UhI and A. Pommer, Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Boston, MA: Springer Science + Business Media, 2005.
-
-
-
UhI, A.1
Pommer, A.2
-
4
-
-
33847743046
-
-
B. Furht, E. Muharemagic, and D. Socek, Eds, New York: Springer-Verlag
-
B. Furht, E. Muharemagic, and D. Socek, Eds., Multimedia Encryption and Watermarking. New York: Springer-Verlag, 2005.
-
(2005)
Multimedia Encryption and Watermarking
-
-
-
5
-
-
85013717190
-
-
W. Zeng, H. Yu, and C.-Y. Lin, Eds, Orlando, FL: Academic
-
W. Zeng, H. Yu, and C.-Y. Lin, Eds., Multimedia Security Technologies for Digital Rights Management. Orlando, FL: Academic, 2006.
-
(2006)
Multimedia Security Technologies for Digital Rights Management
-
-
-
8
-
-
0003508560
-
-
Nat. Inst. Standards Technol, US, Nov, Federal Information Processing Standards Publication 197 HPS PUB 197
-
Specification for the Advanced Encryption Standard (AES), Nat. Inst. Standards Technol. (US), Nov. 2001, Federal Information Processing Standards Publication 197 (HPS PUB 197).
-
(2001)
Specification for the Advanced Encryption Standard (AES)
-
-
-
9
-
-
0038209203
-
Multimedia security and copyright protection,
-
Ph.D. dissertation, Dept. of Comput. Sci, Univ. of Illinois at Urbana-Champaign, Urbana
-
L. Qiao, "Multimedia security and copyright protection," Ph.D. dissertation, Dept. of Comput. Sci., Univ. of Illinois at Urbana-Champaign, Urbana, 1998.
-
(1998)
-
-
Qiao, L.1
-
10
-
-
33847755567
-
On the design of perceptual MPEG-video encryption algorithms
-
Feb
-
S. Li, G. Chen, A. Cheung, B. Bhargava, and K.-T. Lo, "On the design of perceptual MPEG-video encryption algorithms," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 2, pp. 214-223, Feb. 2007.
-
(2007)
IEEE Trans. Circuits Syst. Video Technol
, vol.17
, Issue.2
, pp. 214-223
-
-
Li, S.1
Chen, G.2
Cheung, A.3
Bhargava, B.4
Lo, K.-T.5
-
11
-
-
0036612847
-
A formatcompliant configurable encryption framework for access control of video
-
Jun
-
J. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin, "A formatcompliant configurable encryption framework for access control of video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 545-557, Jun. 2002.
-
(2002)
IEEE Trans. Circuits Syst. Video Technol
, vol.12
, Issue.6
, pp. 545-557
-
-
Wen, J.1
Severa, M.2
Zeng, W.3
Luttrell, M.H.4
Jin, W.5
-
12
-
-
84857536837
-
A video scrambing technique based on space filling curve (extended abstract)
-
Y. Matias and A. Shamir, "A video scrambing technique based on space filling curve (extended abstract)," in Proc. Advances in Cryptology - Crypto"87, 1987, vol. 293, pp. 398-417.
-
(1987)
Proc. Advances in Cryptology - Crypto87
, vol.293
, pp. 398-417
-
-
Matias, Y.1
Shamir, A.2
-
13
-
-
0000326312
-
Picture data encryption using scan patterns
-
N. Bourbakis and C. Alexopoulos, "Picture data encryption using scan patterns," Patt. Recognit., vol. 25, no. 6, pp. 567-581, 1992.
-
(1992)
Patt. Recognit
, vol.25
, Issue.6
, pp. 567-581
-
-
Bourbakis, N.1
Alexopoulos, C.2
-
14
-
-
33746978693
-
Method for Scrambling and Unscrambling a Video Signal,
-
U.S. Patent 5375168
-
A. Kudelski, "Method for Scrambling and Unscrambling a Video Signal," U.S. Patent 5375168, 1994.
-
(1994)
-
-
Kudelski, A.1
-
15
-
-
0026173255
-
Design and cryptanalysis of transform-based analog speech scramblers
-
S. Sridharan, E. Dawson, and B. Goldburg, "Design and cryptanalysis of transform-based analog speech scramblers," IEE Proc. I - Comm., Speech Vis., vol. 138, no. 3, pp. 215-223, 1991.
-
(1991)
IEE Proc. I - Comm., Speech Vis
, vol.138
, Issue.3
, pp. 215-223
-
-
Sridharan, S.1
Dawson, E.2
Goldburg, B.3
-
16
-
-
0027617334
-
Design and cryptanalysis of transform-based analog speech scramblers
-
May
-
B. Goldburg, S. Sridharan, and E. Dawson, "Design and cryptanalysis of transform-based analog speech scramblers," in IEEE J. Sel. Areas Commun., May 1993, vol. 11, no. 5, pp. 735-744.
-
(1993)
IEEE J. Sel. Areas Commun
, vol.11
, Issue.5
, pp. 735-744
-
-
Goldburg, B.1
Sridharan, S.2
Dawson, E.3
-
17
-
-
0030419062
-
Methods for encrypting and decrypting MPEG video data efficiently
-
L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. 4th ACM Int. Conf. Multimedia, 1996, pp. 219-229.
-
(1996)
Proc. 4th ACM Int. Conf. Multimedia
, pp. 219-229
-
-
Tang, L.1
-
18
-
-
0032045063
-
Large encrypting binary images with higher security
-
K.-L. Chung and L.-C. Chang, "Large encrypting binary images with higher security," Patt. Recognit. Lett., vol. 19, no. 5-6, pp. 461-468, 1998.
-
(1998)
Patt. Recognit. Lett
, vol.19
, Issue.5-6
, pp. 461-468
-
-
Chung, K.-L.1
Chang, L.-C.2
-
19
-
-
2342457357
-
A secrecy scheme for MPEG video data using the joint of compression and encryption
-
Proc. Inf. Security: 2nd Int. Workshop
-
S. U. Shin, K. S. Sim, and K. H. Rhee, "A secrecy scheme for MPEG video data using the joint of compression and encryption," in Proc. Inf. Security: 2nd Int. Workshop, 1999, vol. 1729, pp. 191-201, ser. Lecture Notes in Computer Science.
-
(1999)
ser. Lecture Notes in Computer Science
, vol.1729
, pp. 191-201
-
-
Shin, S.U.1
Sim, K.S.2
Rhee, K.H.3
-
20
-
-
0038273965
-
Efficient frequency domain selective scrambling of digital video
-
Jan
-
W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129, Jan. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.1
, pp. 118-129
-
-
Zeng, W.1
Lei, S.2
-
21
-
-
42049089340
-
Cryptanalysis of video encryption based on space-filling curves
-
M. Bertilsson, E. F. Brickell, and I. Ingemarson, "Cryptanalysis of video encryption based on space-filling curves," in Proc. Advances in Cryptology - EuroCrypt, 1989, vol. 434, pp. 403-411.
-
(1989)
Proc. Advances in Cryptology - EuroCrypt
, vol.434
, pp. 403-411
-
-
Bertilsson, M.1
Brickell, E.F.2
Ingemarson, I.3
-
22
-
-
0030577343
-
On the security of image encryption method
-
J.-K. Jan and Y.-M. Tseng, "On the security of image encryption method," Inf. Pmcess. Lett., vol. 60, no. 5, pp. 261-265, 1996.
-
(1996)
Inf. Pmcess. Lett
, vol.60
, Issue.5
, pp. 261-265
-
-
Jan, J.-K.1
Tseng, Y.-M.2
-
24
-
-
0003993602
-
Partial Encryption for Image and Video Communication.,
-
Master's thesis, Dept. of Comput. Sci, Univ. of Alberta, Edmonton, AB, Canada
-
H. C. H. Cheng, "Partial Encryption for Image and Video Communication.," Master's thesis, Dept. of Comput. Sci., Univ. of Alberta, Edmonton, AB, Canada, 1998.
-
(1998)
-
-
Cheng, H.C.H.1
-
26
-
-
0036885204
-
Cryptanalysis of an encryption scheme for binary images
-
C.-C. Chang and T.-X. Yu, "Cryptanalysis of an encryption scheme for binary images," Patt. Recognit. Lett., vol. 23, no. 14, pp. 1847-1852, 2002.
-
(2002)
Patt. Recognit. Lett
, vol.23
, Issue.14
, pp. 1847-1852
-
-
Chang, C.-C.1
Yu, T.-X.2
-
27
-
-
41649110336
-
A general cryptanalysis of permutation-only multimedia encryption algorithms
-
accepted for publication
-
S. Li, C. Li, G. Chen, N. G. Bourbakis, and K.-T. Lo, "A general cryptanalysis of permutation-only multimedia encryption algorithms," Signal Process: Image Process., 2008, accepted for publication.
-
(2008)
Signal Process: Image Process
-
-
Li, S.1
Li, C.2
Chen, G.3
Bourbakis, N.G.4
Lo, K.-T.5
-
28
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett., vol. 20, no. 7, pp. 767-769, 1995.
-
(1995)
Opt. Lett
, vol.20
, Issue.7
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
29
-
-
0000235402
-
Secure optical storage that uses fully phase encryption
-
X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, "Secure optical storage that uses fully phase encryption," Appl. Opt., vol. 39, no. 35, pp. 6689-6694, 2000.
-
(2000)
Appl. Opt
, vol.39
, Issue.35
, pp. 6689-6694
-
-
Tan, X.1
Matoba, O.2
Shimura, T.3
Kuroda, K.4
Javidi, B.5
-
30
-
-
22144431522
-
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
-
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett., vol. 30, no. 13, pp. 1644-1646, 2005.
-
(2005)
Opt. Lett
, vol.30
, Issue.13
, pp. 1644-1646
-
-
Carnicer, A.1
Montes-Usategui, M.2
Arcos, S.3
Juvells, I.4
-
31
-
-
33744788334
-
-
X. Peng, P. Zhang, H. Wei, and B. Yu, Known-plaintext attack on optical encryption based on double random phase keys, Opt. Lett., 3.1, no. 8, pp. 1044-1046, 2006.
-
X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett., vol. 3.1, no. 8, pp. 1044-1046, 2006.
-
-
-
-
32
-
-
33645790805
-
Known-plaintext attack on double random encoding encryption technique
-
X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on double random encoding encryption technique," Acta Physica Sinica, vol. 55, no. 3, pp. 1130-1136, 2006.
-
(2006)
Acta Physica Sinica
, vol.55
, Issue.3
, pp. 1130-1136
-
-
Peng, X.1
Zhang, P.2
Wei, H.3
Yu, B.4
-
33
-
-
0000378191
-
Fast encryption of image data using chaotic Kolmogorov flows
-
J. Scharinger, "Fast encryption of image data using chaotic Kolmogorov flows," J. Electron. Imaging, vol. 7, no. 2, pp. 318-325, 1998.
-
(1998)
J. Electron. Imaging
, vol.7
, Issue.2
, pp. 318-325
-
-
Scharinger, J.1
-
34
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," Int. J. Bifurc. Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
-
(1998)
Int. J. Bifurc. Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
35
-
-
1342306864
-
A symmetric image encryption scheme based on 3-D chaotic cat maps
-
Y. Mao, G. Chen, and C. K. Chui, "A symmetric image encryption scheme based on 3-D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Mao, Y.1
Chen, G.2
Chui, C.K.3
-
36
-
-
0036296858
-
Cryptanalysis of a chaotic image encryption method
-
S. Li and X. Zheng, "Cryptanalysis of a chaotic image encryption method," in Proc. IEEE Int. Symp. Circuits Syst., 2002, vol. II, pp. 708-711.
-
(2002)
Proc. IEEE Int. Symp. Circuits Syst
, vol.2
, pp. 708-711
-
-
Li, S.1
Zheng, X.2
-
37
-
-
0036453480
-
On the security of an image encryption method
-
S. Li and X. Zheng, "On the security of an image encryption method," in Proc. IEEE Int. Conf. Image. Process., 2002, vol. 2, pp. 925-928.
-
(2002)
Proc. IEEE Int. Conf. Image. Process
, vol.2
, pp. 925-928
-
-
Li, S.1
Zheng, X.2
-
38
-
-
35048844681
-
Cryptanalysis of a chaotic neural network based multimedia encryption scheme
-
C. Li, S. Li, D. Zhang, and G. Chen, "Cryptanalysis of a chaotic neural network based multimedia encryption scheme," in Proc. Adv. Multimedia Inf. Process., 2004, vol. 3333, pp. 418-425.
-
(2004)
Proc. Adv. Multimedia Inf. Process
, vol.3333
, pp. 418-425
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
39
-
-
41649121962
-
Cryptanalysis of RCES/RSES image encryption scheme
-
Jul. 2007 [Online, Available
-
S. Li, C. Li, G. Chen, and K.-T. Lo, "Cryptanalysis of RCES/RSES image encryption scheme," J. Syst. Softw., Jul. 2007 [Online]. Available: http://eprint.iacr.org/2004/376
-
J. Syst. Softw
-
-
Li, S.1
Li, C.2
Chen, G.3
Lo, K.-T.4
-
40
-
-
33750556057
-
Cryptanalysis of a multistage encryption system
-
C. Li, X. Li, S. Li, and G. Chen, "Cryptanalysis of a multistage encryption system," in Proc. IEEE Int. Symp. Circuits Syst., 2005, pp. 880-883.
-
(2005)
Proc. IEEE Int. Symp. Circuits Syst
, pp. 880-883
-
-
Li, C.1
Li, X.2
Li, S.3
Chen, G.4
-
41
-
-
24344510301
-
Cryptanalysis of a new signal security system for multimedia data transmission
-
C. Li, S. Li, G. Chen, G. Chen, and L. Hu, "Cryptanalysis of a new signal security system for multimedia data transmission," EURASIP J. Appl. Signal Process., vol. 2005, no. 8, pp. 1277-1288, 2005.
-
(2005)
EURASIP J. Appl. Signal Process
, vol.2005
, Issue.8
, pp. 1277-1288
-
-
Li, C.1
Li, S.2
Chen, G.3
Chen, G.4
Hu, L.5
-
42
-
-
32544436119
-
On the security of the YenGuo's domino signal encryption algorithm. (DSEA)
-
C. Li, S. Li, D.-C. Lou, and D. Zhang, "On the security of the YenGuo's domino signal encryption algorithm. (DSEA)," J. Syst. Software, vol. 79, no. 2. pp. 253-258, 2006.
-
(2006)
J. Syst. Software
, vol.79
, Issue.2
, pp. 253-258
-
-
Li, C.1
Li, S.2
Lou, D.-C.3
Zhang, D.4
-
43
-
-
2942661839
-
Image scrambling without bandwidth expansion
-
Jun
-
D. V. D. Ville, W. Philips, R. V. de Walle, and I. Lemanhieu, "Image scrambling without bandwidth expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 6, pp. 892-897, Jun. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, Issue.6
, pp. 892-897
-
-
Ville, D.V.D.1
Philips, W.2
de Walle, R.V.3
Lemanhieu, I.4
-
44
-
-
0018467416
-
An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time
-
A. D. Wyner, "An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time," IEEE Trans. Inf. Theory, vol. 25, no. 3, pp. 261-274, 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.25
, Issue.3
, pp. 261-274
-
-
Wyner, A.D.1
-
45
-
-
0017961888
-
Prolate spheroidal wave functions, Fourier analysis, and uncertainty-V: The discrete case
-
D. Slepian, "Prolate spheroidal wave functions, Fourier analysis, and uncertainty-V: The discrete case," Bell Syst. Tech. J., vol. 57, no. 5, pp. 1371-1430, 1978.
-
(1978)
Bell Syst. Tech. J
, vol.57
, Issue.5
, pp. 1371-1430
-
-
Slepian, D.1
-
46
-
-
41649113028
-
Hadamard matrix
-
Web Resource, Online, Available
-
E. W. Weisstein, "Hadamard matrix," From MathWorld - A Wolfram. Web Resource. [Online]. Available: http://mathworld.wol-fram.com/ HadamardMatrix.html2005
-
From MathWorld - A Wolfram
-
-
Weisstein, E.W.1
-
47
-
-
26844567623
-
Design of integrated multimedia compression and encryption systems
-
May
-
C.-P. Wu and C.-C. J. Kuo, "Design of integrated multimedia compression and encryption systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828-839, May 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.5
, pp. 828-839
-
-
Wu, C.-P.1
Kuo, C.-C.J.2
|