2013
DOI: 10.1109/msp.2012.2230220
|View full text |Cite
|
Sign up to set email alerts
|

End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation

Abstract: End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation AbstractAbstract. Content distribution applications such as digital broadcasting, video-on-demand services (VoD), video conferencing, surveillance and telesurgery are confronted with difficulties -besides the inevitable compression and quality challenges -with respect to intellectual property management, authenticity, privacy regulations, access control etc. Meeting such security requirements in an en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 47 publications
(31 citation statements)
references
References 25 publications
0
31
0
Order By: Relevance
“…The authors of [49] proposed an entropy-coding stage SE scheme that avoided affecting syntax elements which potentially might be manipulated by encryption. For example: splicing of video is suggests that Network Abstraction Layer (NAL) headers cannot be encrypted; motion information bits affect no-reference quality assessment [50]; compression domain insertion of watermarks [51] may be affected; and more specifically to the current paper, certain forms of compression domain transcoding [52] can be impacted. In fact, the possibility of combining more than one compression domain process, such as transcoding, watermarking, and encryption needs to be considered [51] [53].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [49] proposed an entropy-coding stage SE scheme that avoided affecting syntax elements which potentially might be manipulated by encryption. For example: splicing of video is suggests that Network Abstraction Layer (NAL) headers cannot be encrypted; motion information bits affect no-reference quality assessment [50]; compression domain insertion of watermarks [51] may be affected; and more specifically to the current paper, certain forms of compression domain transcoding [52] can be impacted. In fact, the possibility of combining more than one compression domain process, such as transcoding, watermarking, and encryption needs to be considered [51] [53].…”
Section: Related Workmentioning
confidence: 99%
“…Popa et al [19] and Bkakria et al [4] have proposed approaches based on adjustable encryption, they combine different encryption schemes to get the best trade-off between data confidentiality and data utility for outsourced relational databases. Boho et al [6] have proposed interesting approach combining watermarking and encryption to protect both the confidentiality and traceability 1 Databases composed of only one table of outsourced multimedia files. All previously cited approaches have three main limitations: First, they are defined in such a way that only two pre-selected security mechanisms can be combined together.…”
Section: Related Workmentioning
confidence: 99%
“…From a security perspective, the random-based [3]- [5] and cryptographic primitives [6]- [9] are the main categories to classify the encryption used in JEC algorithms. The randombased scrambling uses PRNG [5] and chaotic-based [4] sources to deploy one of the randomization functionality such as sign or bit(s) inversion [3] or random mapping [10].…”
Section: State Of the Artmentioning
confidence: 99%
“…The randombased scrambling uses PRNG [5] and chaotic-based [4] sources to deploy one of the randomization functionality such as sign or bit(s) inversion [3] or random mapping [10]. The second main approach is based on cryptographic primitives such as hash functions [7], [11], block ciphers [6], [8] and stream ciphers [9]. Fig.…”
Section: State Of the Artmentioning
confidence: 99%