MIKEY for keys management of H.264 scalable video coded layers
暂无分享,去创建一个
[1] Edward J. Delp,et al. Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.
[2] Wen Gao,et al. H.264 video encryption scheme adaptive to DRM , 2006, IEEE Transactions on Consumer Electronics.
[3] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[4] Dale Tesch,et al. Security Threat Mitigation and Response, Understanding Cisco Security Mars , 2006 .
[5] Andreas Uhl,et al. Selective encryption of the MC EZBC bitstream for DRM scenarios , 2009, MM&Sec '09.
[6] Sang-Uk Shin,et al. An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding , 2009, IEICE Trans. Inf. Syst..
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Yuzhuo Zhong,et al. Layered Encryption for Scalable Video Coding , 2009, 2009 2nd International Congress on Image and Signal Processing.
[9] Abd Rahim Mat Sidek,et al. Comparison Analysis Of Stream Cipher Algorithms For Digital Communication , 2007 .
[10] Mohan S. Kankanhalli,et al. Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture , 2009, IEEE Transactions on Information Forensics and Security.
[11] Martin Euchner,et al. Status of This Memo HMAC-Authenticated Diffie-Hellman for Multimedia Internet KEYing (MIKEY) , 2006 .
[12] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Nanning Zheng,et al. Hash key-based video encryption scheme for H.264/AVC , 2010, Signal Process. Image Commun..
[14] Russ Housley,et al. Advanced Encryption Standard (AES) Key Wrap Algorithm , 2002, RFC.
[15] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[16] Yong Man Ro,et al. Scalable Protection and Access Control in Full Scalable Video Coding , 2006, IWDW.
[17] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[18] Chun-I Fan,et al. Buyer-seller watermarking protocols with off-line trusted third parties , 2009, Int. J. Ad Hoc Ubiquitous Comput..
[19] David S Isenberg,et al. Method, system and device for communication , 1995 .
[20] Dirk Kroeselberg,et al. A method of forming and distribute cryptographic keys in a mobile radio system and corresponding mobile radio system , 2004 .
[21] Chun-I Fan,et al. Buyer-Seller Watermarking Protocols with Off-line Trusted Parties , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[22] Dong Hoon Lee,et al. An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.
[23] Thomas Schierl,et al. RTP Payload Format for SVC Video , 2006 .
[24] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[25] Jari Arkko,et al. MIKEY: Multimedia Internet KEYing , 2004, RFC.
[26] D. Marpe,et al. Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.
[27] Yong Man Ro,et al. A selective video encryption for the region of interest in scalable video coding , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[28] Udo W. Pooch,et al. Computer system and network security , 1995 .