2015
DOI: 10.1007/s00530-015-0473-6
|View full text |Cite
|
Sign up to set email alerts
|

Building a post-compression region-of-interest encryption framework for existing video surveillance systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…An RA [18] implies to set all encrypted values to zero while keeping the unencrypted values. To implement this attack on the three methods, we set all AC coefficients of the luminance channel to zero while keeping the DC values.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…An RA [18] implies to set all encrypted values to zero while keeping the unencrypted values. To implement this attack on the three methods, we set all AC coefficients of the luminance channel to zero while keeping the DC values.…”
Section: Resultsmentioning
confidence: 99%
“…[4]), or after (e.g. [5]) compression, denoted pre-, in-, and post-compression encryption algorithms. Pre-compression encryption produces images that are structurally similar to the noise and then hampers the surveillance.…”
Section: Introductionmentioning
confidence: 99%
“…The FEs that work before JPEG (FBJs) [11]- [13] apply four encryption modules (scrambling, rotation/inversion, nega-posi transformation, and component shuffling) to the original image or multiple video frames (or three encryption modules except for component shuffling to a grayscale image [14]) to achieve high confidentiality and good or moderate compression friendliness. The FEs that work after JPEG (FAJs) [15]- [18] apply XOR operations or permutations to specific syntax elements of the compressed bitstream to achieve different types of perceptual degradation, e.g., luma-only degradation and DC-and-AC degradation. However, the FBJs and FAJs have no or less tunability.…”
Section: Introductionmentioning
confidence: 99%
“…If such behaviour is identified and a law enforcement agent is notified the identity containing portion of the video can be decrypted. There are a number of papers dealing with problems like this, focusing on the technical side of performing encryption without destroying the rest of the video through drift errors and similar things, e.g., [2][3][4]22].…”
Section: Introductionmentioning
confidence: 99%