Embedded Multimedia Security Systems 2013
DOI: 10.1007/978-1-4471-4459-5_3
|View full text |Cite
|
Sign up to set email alerts
|

Securing Multimedia Content Using Joint Compression and Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 35 publications
0
17
0
Order By: Relevance
“…In this section, a review of commonly used protection methods to protect visual privacy is presented. Wagstaff ( Continued on next page Spanos & Maples (1995), Macq & Quisquater (1995), Agi & Gong (1996), Tang (1996), Qiao et al (1997), Zeng & Lei (2003), Yang et al (2004), Boult (2005), Yabuta et al (2005), Yabuta et al (2006), , , Chattopadhyay & Boult (2007), Baaziz et al (2007), Raju et al (2008), Dufaux & Ebrahimi (2008a), Dufaux & Ebrahimi (2008b), Xiangdong et al (2008), Carrillo et al (2010), Dufaux & Ebrahimi (2010), Tong et al (2010), Tong et al (2011), Dufaux (2011), Sohn et al (2011), Pande & Zambreno (2013, Li et al (2013), Ra et al (2013) Redaction: K-same family 7 Newton et al (2005), Gross et al (2006a), Gross et al (2006b), Bitouk et al (2008), Gross et al (2009), De la Hunty et al (2010, Lin et al (2012) Redaction: Object / people removal 22 Kokaram et al (1995), Igehy & Pereira (1997), Masnou & Morel (1998), Morse & Schwartzwald (1998), Efros & Leung (1999)…”
Section: Protection Methodsmentioning
confidence: 99%
“…In this section, a review of commonly used protection methods to protect visual privacy is presented. Wagstaff ( Continued on next page Spanos & Maples (1995), Macq & Quisquater (1995), Agi & Gong (1996), Tang (1996), Qiao et al (1997), Zeng & Lei (2003), Yang et al (2004), Boult (2005), Yabuta et al (2005), Yabuta et al (2006), , , Chattopadhyay & Boult (2007), Baaziz et al (2007), Raju et al (2008), Dufaux & Ebrahimi (2008a), Dufaux & Ebrahimi (2008b), Xiangdong et al (2008), Carrillo et al (2010), Dufaux & Ebrahimi (2010), Tong et al (2010), Tong et al (2011), Dufaux (2011), Sohn et al (2011), Pande & Zambreno (2013, Li et al (2013), Ra et al (2013) Redaction: K-same family 7 Newton et al (2005), Gross et al (2006a), Gross et al (2006b), Bitouk et al (2008), Gross et al (2009), De la Hunty et al (2010, Lin et al (2012) Redaction: Object / people removal 22 Kokaram et al (1995), Igehy & Pereira (1997), Masnou & Morel (1998), Morse & Schwartzwald (1998), Efros & Leung (1999)…”
Section: Protection Methodsmentioning
confidence: 99%
“…Such joint compression and encryption framework is achieved either by embedding key-controlled confusion and diffusion in these source-coding schemes or by incorporating compression in cryptographic algorithms [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…In order to obtain high level multimedia communication security, multimedia encryption methods can be used to scramble the selective part of multimedia in spatial and transform domains, respectively. In this case, the frequency transform can increase burden of server [19]. Chaotic system is a good way favorable to secure multimedia communications because of their significant features such as parameter sensitivity and ergodicity.…”
Section: Figure 6 Multimedia Content Encryption Architecturementioning
confidence: 99%