1998
DOI: 10.1016/s0097-8493(98)00033-8
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of MPEG encryption algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
115
0

Year Published

2003
2003
2010
2010

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 198 publications
(115 citation statements)
references
References 4 publications
0
115
0
Order By: Relevance
“…In selective encryption of visual data, application speciÿc data structures are exploited to create more e cient encryption systems (see e.g. encryption of MPEG video streams [8]). Consequently, selective encryption only protects the visually most important parts of an image or video representation relying on a secure but slow "classical" cipher.…”
Section: Selective Encryption Of Medical Image Datamentioning
confidence: 99%
See 1 more Smart Citation
“…In selective encryption of visual data, application speciÿc data structures are exploited to create more e cient encryption systems (see e.g. encryption of MPEG video streams [8]). Consequently, selective encryption only protects the visually most important parts of an image or video representation relying on a secure but slow "classical" cipher.…”
Section: Selective Encryption Of Medical Image Datamentioning
confidence: 99%
“…The ÿrst attempts in this direction have been made to secure DCT-based multimedia representations (see e.g. [8][9][10][11][12][13][14][15][16][17]), wavelet based [18][19][20][21]17] and quadtree based representations [22,23] have been considered also. Recently, selective encryption schemes based on selective bitplane encryption [24], resistant to bit errors [25], and compliant to video formats [26] have been proposed for wireless environments.…”
Section: Selective Encryption Of Medical Image Datamentioning
confidence: 99%
“…One Time Pad Qiao and Nahrstedt [15,16] propose their "video encryption algorithm" in which have the bytes of an MPEG bitstream are both encrypted with a standard encryption algorithm (they use DES) and used in an exclusive-or operation with the other half of the bytes. In effect, the DES encrypted half of the bitstream serves as a one-time pad for the other half.…”
Section: 7mentioning
confidence: 99%
“…The bulk of prior work implicitly evaluates this type of attack by using as its metric of successful attack whether a visually or audibly acceptable reproduction is generated by a standard decoder even though portions of the bitstream were "damaged" (by being encrypted -the attacker does not have the decryption key). However, prior work rarely examines how the error concealment functions of a decoder might be intentionally enhanced to increase their effectiveness against perceptual encryption (exceptions include [16,27]). This is important since it is not strictly necessary that error concealment produce a perceptually equivalent output to that of an authorized decoder; there are many instances in which an attacker might be satisfied with a reproduction of reduced quality if this allows him or her to avoid paying a fee to a content owner.…”
Section: 3mentioning
confidence: 99%
“…Kunkelmann [12,11] and Qiao and Nahrstedt [22] provide overviews, comparisons, and assessments of classical encryption schemes for visual data with emphasis on MPEG proposed up to 1998. Bhargava et al [1] review four MPEG encryption algorithms published by the authors themselves in the period 1997 -1999.…”
Section: Introductionmentioning
confidence: 99%