Proceedings of IEEE International Conference on Multimedia Computing and Systems
DOI: 10.1109/mmcs.1997.609807
|View full text |Cite
|
Sign up to set email alerts
|

A scalable security architecture for multimedia communication standards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…We address the security of the basic method and Ipicture of the trade-off method, and prove that the probability that PR can recover a frame in real-time is less than 1/2 13 and that it prevents PR from reconstructing content with adequate service quality in real-time. Let us assume that there is a cryptanalysis of the current scheme, so that cryptological security is impossible.…”
Section: Analysis On Practical Security Of Basic Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We address the security of the basic method and Ipicture of the trade-off method, and prove that the probability that PR can recover a frame in real-time is less than 1/2 13 and that it prevents PR from reconstructing content with adequate service quality in real-time. Let us assume that there is a cryptanalysis of the current scheme, so that cryptological security is impossible.…”
Section: Analysis On Practical Security Of Basic Methodsmentioning
confidence: 99%
“…The AC-coefficients of low frequencies are encrypted in Kunlemann and Reinema' technique 13) and those of high frequencies are encrypted in Cheng and Li's technique 14) . Shi and Bhargava reduced the computational cost by encrypting only sign bits of all DCT coefficient 15) .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kunlemann and Reinema [11] suggest only the encryption of low order discrete cosine transform (DCT) coefficients. Cheng and Li [6] take exception with this approach saying that the higher order DCT coefficients carry edge information (they attack the secrecy of this approach though do not comment on the degradation aspect).…”
Section: 5mentioning
confidence: 99%
“…Scalable Systems Several researchers [11,22,28] have considered scalable versions of MPEG (in which the total bitstream can be divided into an ordered set of sub bitstreams with a useful albeit degraded reconstruction possible with only the first bitstream received, gradually yielding better and better reconstruction quality as additional bitstreams are received). There are straightforward applications of selective encryption to such systems, although they can be quite different in intent.…”
Section: 9mentioning
confidence: 99%