1997
DOI: 10.1007/bfb0026619
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of different video encryption methods for a secure multimedia conferencing gateway

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

1998
1998
2019
2019

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In addition, as mentioned above, scalability and perceptibility are generally realized via selective encryption. Some reviews of selective encryption methods and their performances can be found in [9,[45][46][47], among which [47] gave a partial list of some representative selective encryption methods and [9] analyzed the potential insecurity of different selective syntactic elements in MPEG-2 video stream against possible attacks. Although it seems that selective encryption is a good idea for the design of high-efficiency image/video encryption schemes, some essential defects of selective encryption have been pointed out, showing its incapability to provide a satisfactory balance between security and usability.…”
Section: Selective Encryptionmentioning
confidence: 99%
“…In addition, as mentioned above, scalability and perceptibility are generally realized via selective encryption. Some reviews of selective encryption methods and their performances can be found in [9,[45][46][47], among which [47] gave a partial list of some representative selective encryption methods and [9] analyzed the potential insecurity of different selective syntactic elements in MPEG-2 video stream against possible attacks. Although it seems that selective encryption is a good idea for the design of high-efficiency image/video encryption schemes, some essential defects of selective encryption have been pointed out, showing its incapability to provide a satisfactory balance between security and usability.…”
Section: Selective Encryptionmentioning
confidence: 99%
“…In addition, as mentioned above, scalability and perceptibility are generally realized via selective encryption. Some reviews of selective encryption methods and their performances can be found in [9,[45][46][47], among which [47] gave a partial list of some representative selective encryption methods and [9] analyzed the potential insecurity of different selective syntactic elements in MPEG-2 video stream against possible attacks. Although it seems that selective encryption is a good idea for the design of high-efficiency image/video encryption schemes, some essential defects of selective encryption have been pointed out, showing its incapability to provide a satisfactory balance between security and usability.…”
Section: Selective Encryptionmentioning
confidence: 99%
“…Kunkelmann et.al. present in [8] a variety of approaches to the partial encryption of the complete video stream, for use with a security gateway, and come to the conclusion that a mix of partial bit stream encryption and variable length code encryption is the most efficient for their application. They consider a partial encryption of 10% of the data appropriate for VoD applications, while full protection requires a major part of all data to be encrypted to prevent reconstruction.…”
Section: Related Workmentioning
confidence: 99%