International Image Processing, Applications and Systems Conference 2014
DOI: 10.1109/ipas.2014.7043256
|View full text |Cite
|
Sign up to set email alerts
|

A very efficient encryption scheme for the H.264/AVC CODEC adopted in Intra prediction mode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…On the basis of the previous works [13,37], we proposed to combine the three encryption methods together, taking into account all the already mentioned improvements to preserve the CR. The compression process as well as all the interventions of our encryption algorithm in our scheme are explained below.…”
Section: Current Proposed Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…On the basis of the previous works [13,37], we proposed to combine the three encryption methods together, taking into account all the already mentioned improvements to preserve the CR. The compression process as well as all the interventions of our encryption algorithm in our scheme are explained below.…”
Section: Current Proposed Methodsmentioning
confidence: 99%
“…We obtain the binary sequence by comparing each value generated to 1/2. For all the previous works [13,19,24,37], using one binary sequence generated from a logistic chaotic map [32] as a dynamic key for all of the selected coefficients without renewal, threatens the security of our algorithm. That is why, we thought of making the sequence renewable to avoid using some binary parts from the generated sequence repetitively.…”
Section: Current Proposed Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Many video encryption algorithms are proposed according to the different semantic elements of encryption. Some schemes are 2 of 15 proposed in those articles [4,5] to encrypt the video by scrambling the intra prediction mode (IPM) of the intra-coded macro block. Exclusive OR (XOR) operation is usually used in intra prediction mode (IPM) to protect data privacy.…”
Section: Introductionmentioning
confidence: 99%