2002
DOI: 10.1109/tce.2002.1010141
|View full text |Cite
|
Sign up to set email alerts
|

A MPEG2-transparent scrambling technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(25 citation statements)
references
References 1 publication
0
25
0
Order By: Relevance
“…Adaptation of encrypted content has been made possible in [4,[11][12][13], but these techniques adversely affect the compression efficiency of the entropy coder. Technique proposed by Wu and Kuo [8] maintains the compression efficiency, but the existence of invalid Huffman codewords in encrypted bitstream makes it infeasible to perform content adaptation without decryption.…”
Section: Introductionmentioning
confidence: 99%
“…Adaptation of encrypted content has been made possible in [4,[11][12][13], but these techniques adversely affect the compression efficiency of the entropy coder. Technique proposed by Wu and Kuo [8] maintains the compression efficiency, but the existence of invalid Huffman codewords in encrypted bitstream makes it infeasible to perform content adaptation without decryption.…”
Section: Introductionmentioning
confidence: 99%
“…A perceptual encryption scheme is proposed in [26] which uses four linear transforms and then the cipher video data is handed over to MPEG-2 encoder. Unauthorized users are allowed to watch the degraded video.…”
Section: Mpeg-2 Transparent Scrambling Techniquementioning
confidence: 99%
“…Four linear transformation are defined to encrypt the video pixels . It can keep the compression efficiency of the video codec [27]. But Li et all (2007) shows that the scheme is not secure enough against brute force attacks because its key space is not sufficiently large.…”
Section: Video Encryption Techniquesmentioning
confidence: 99%