2010
DOI: 10.7763/ijcee.2010.v2.141
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard

Abstract: Abstract-Multimedia information availability has increased dramatically with the advent of mobile devices. But with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, and combination between video compression and encryption to increase information security. The strength of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(20 citation statements)
references
References 9 publications
0
20
0
Order By: Relevance
“…In [39] there is an analysis of a system for H.264/AVC I-frame only SE which also brings low computation, low bitrate overhead and decoder format compliance after encryption, though no analysis of the video distortion or image structural distortion arising from partial encryption was made in [39]. As another example employing CABAC-based encryption in [40] only I-and P-frames are selectively encrypted.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [39] there is an analysis of a system for H.264/AVC I-frame only SE which also brings low computation, low bitrate overhead and decoder format compliance after encryption, though no analysis of the video distortion or image structural distortion arising from partial encryption was made in [39]. As another example employing CABAC-based encryption in [40] only I-and P-frames are selectively encrypted.…”
Section: Methodsmentioning
confidence: 99%
“…The underlying motivation behind such schemes is that even if the bitstream is captured by packet 'sniffer' software or stored by some means at the receiver device successful decoding of the P-or B-frame compression data depends on being able to decode the corresponding I-frame within a Group of Pictures (GOP) [41]. Therefore, in [39] P-and B-frame data are sent in the clear. However, if it is possible to only encrypt B-frames, as in our experimental scheme, then the computational and bitrate overhead is much reduced.…”
Section: Methodsmentioning
confidence: 99%
“…The study in [9] describes the SE on I-frames by extracting them from the H.264 bit-stream and using the AES algorithm for ciphering and deciphering. The scheme reduces the computational cost, but it is nonformat-compliant.…”
Section: Prior Research On H264 Securitymentioning
confidence: 99%
“…a) UFL-coded block − pattern is encoded using a 4-bit FL prefix for luma and TU suffix with cutoff value CV = 2 for chroma. b) UEG3-motion vector differences are encoded with a concatenation of a unary prefix and a third-order Exp-Golomb code suffix: for a value MVD, the prefix is a TU coding with the cutoff value CV = 9 of the value min(|MVD|, 9), or, if MVD = 0, just the bit 0. If |MVD| ≤ 9, a suffix is output with the value | MVD |−9 using the EG3 code.…”
Section: ) Fixed-length (Fl) Code: This Fl Binarization Ismentioning
confidence: 99%
See 1 more Smart Citation