2006
DOI: 10.1109/tip.2006.873426
|View full text |Cite
|
Sign up to set email alerts
|

A joint signal processing and cryptographic approach to multimedia encryption

Abstract: Abstract-In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search, and retrieval. These delegate services have brought new challenges to the protection of multimedia content confidentiality. This paper discusses the importance and feasibility of applying a joint signal processing and cryptographic approach to multimedia encryption, in order to address the access control issues unique to multimedia applications.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 109 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Therefore, selective encryption algorithms for video content protection should be considered. Selective encryption is carried out on the most significant information at a choice of different stages of the codec, such as on the original pixels, the transform coefficients, the quantization indexes, the bit-planes, the entropy coder, or the final bit-stream [14]. We can select only the most important coefficients from either final or intermediate steps of a compression process [28] and encrypt those coefficients.…”
Section: Selective Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, selective encryption algorithms for video content protection should be considered. Selective encryption is carried out on the most significant information at a choice of different stages of the codec, such as on the original pixels, the transform coefficients, the quantization indexes, the bit-planes, the entropy coder, or the final bit-stream [14]. We can select only the most important coefficients from either final or intermediate steps of a compression process [28] and encrypt those coefficients.…”
Section: Selective Encryptionmentioning
confidence: 99%
“…However, the computational overhead of naive encryption is great, so it is only suitable for highly confidential and low efficient requirements applications. SE only encrypts on some essential parts of the entire video stream, such as on the original pixels, the transform coefficients, the quantization indexes, the bitplanes, the entropy coder, or the final bit-stream [14], which due to a reduced confidentiality and combined with a reduction in computational cost.…”
mentioning
confidence: 99%
“…In order to protect data privacy, images need to be encrypted before being transferred to a remote server. Image encryption can be done using state-of-the-art ciphers such as AES or RSA by treating images as ordinary data, or using image specific encryption such as selective and formatcompliant encryption [17]- [19] to enable post-processing such as transcoding. As these techniques are built upon established cryptographic encryption tools, it is computationally difficult for an adversary to decrypt the encrypted image files.…”
Section: Problem Formulationmentioning
confidence: 99%
“…[1,4] Currently, the discussion about arithmetic encryption is mainly dedicated to the issue of only data encryption or the arithmetic compression encryption with all kinds of simple models. [4][5][6][7] Their common feature is that the arithmetic coding model is relatively simple. For example, the fixed probability distribution of symbols from a source or a simple firstorder Markov source is assumed, so that it is easy to draw meaningful results.…”
Section: Introductionmentioning
confidence: 99%