Proceedings of the International Conference on Advances in Computing, Communication and Control 2009
DOI: 10.1145/1523103.1523163
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of MPEG video encryption algorithms

Abstract: Over the last couple of years several encryption algorithms applied to MPEG video streams emerged. Most of the algorithms tried to optimize the encryption process with respect to encryption speed. In this paper we will describe, evaluate and compare four MPEG encryption algorithms. Video Encryption Algorithm (VEA),Modified video encryption algorithm (MVEA), Real time Video Encryption Algorithm (RVEA), Perceptual Video Encryption Algorithm (PVEA) with respect to their encryption speed, security level and string… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The first coefficient, namely DC, has the most energy and the remaining coefficients, namely AC, have the details of the frame [14,20]. In this mode, the sign of AC coefficients is encrypted, then the inversion of both quantization and DCT transform is done, and finally the encrypted frame is depicted.…”
Section: Sign Encryption Of Dct Transformmentioning
confidence: 99%
“…The first coefficient, namely DC, has the most energy and the remaining coefficients, namely AC, have the details of the frame [14,20]. In this mode, the sign of AC coefficients is encrypted, then the inversion of both quantization and DCT transform is done, and finally the encrypted frame is depicted.…”
Section: Sign Encryption Of Dct Transformmentioning
confidence: 99%
“…In terms of simple length-preserving encryption algorithms on DCT-based images and videos, pseudo-randomly toggling DC and/or AC coefficient signs as proposed for example by Potdar, Talele, & Gandhe (2009), or Bhargava, Shi, & Wang (2003 is frequently used. However, the attack complexity for breaking such themes is significantly lower than in our approach as we encrypt multiple bits per coefficient instead of only one (the sign bit).…”
Section: Introductionmentioning
confidence: 99%
“…In terms of simple length-preserving encryption algorithms on Discrete Cosine Transform (DCT)-based images and videos, pseudo-randomly toggling DC and/or AC coefficient signs as proposed e.g. in [12,1] is frequently used. However, the attack complexity for breaking such themes is significantly lower than in our approach as we encrypt multiple bits per coefficient instead of only one (the sign bit).…”
Section: Introductionmentioning
confidence: 99%