2014
DOI: 10.1016/j.jvcir.2013.12.015
|View full text |Cite
|
Sign up to set email alerts
|

Confidentiality of a selectively encrypted H.264 coded video bit-stream

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 23 publications
(23 citation statements)
references
References 34 publications
0
23
0
Order By: Relevance
“…Hence, it might be claimed that it is easy to guess the values of the changed signs and, thus, make the video watchable. In addressing this issue, consider Table 2 of [25]. In [25] it is demonstrated that there are literally millions of MVDs and TCs in some of the video sequences listed in Table 9 of the current paper, which video sequences also appear in Table 2 of [25].…”
Section: Security Analysismentioning
confidence: 94%
See 4 more Smart Citations
“…Hence, it might be claimed that it is easy to guess the values of the changed signs and, thus, make the video watchable. In addressing this issue, consider Table 2 of [25]. In [25] it is demonstrated that there are literally millions of MVDs and TCs in some of the video sequences listed in Table 9 of the current paper, which video sequences also appear in Table 2 of [25].…”
Section: Security Analysismentioning
confidence: 94%
“…In addressing this issue, consider Table 2 of [25]. In [25] it is demonstrated that there are literally millions of MVDs and TCs in some of the video sequences listed in Table 9 of the current paper, which video sequences also appear in Table 2 of [25]. The probability of guessing the signs [25] can be found from the standard formula for a combination:…”
Section: Security Analysismentioning
confidence: 99%
See 3 more Smart Citations