Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics
暂无分享,去创建一个
Martin Fleury | Amna Shifa | Mamoona Naveed Asghar | Neelam Gohar | Salma Noor | M. Fleury | Amna Shifa | M. Asghar | Salma Noor | N. Gohar
[1] Waqar Mahmood,et al. Internet of multimedia things: Vision and challenges , 2015, Ad Hoc Networks.
[2] Zengqiang Chen,et al. Image encryption based on a new total shuffling algorithm , 2008 .
[3] Wolfgang A. Halang,et al. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.
[4] Fei Peng,et al. An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.
[5] Fei Peng,et al. Separable reversible data hiding and encryption for HEVC video , 2017, Journal of Real-Time Image Processing.
[6] Frederic Dufaux,et al. Video scrambling for privacy protection in video surveillance: recent results and validation framework , 2011, Defense + Commercial Sensing.
[7] Hartmut König,et al. A survey of video encryption algorithms , 2010, Comput. Secur..
[8] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[10] Jan Sher Khan,et al. Chaos based efficient selective image encryption , 2018, Multidimensional Systems and Signal Processing.
[11] Douglas C. Sicker,et al. Selective encryption for consumer applications , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..
[12] Mohammed Ghanbari,et al. The accuracy of PSNR in predicting video quality for different video scenes and frame rates , 2012, Telecommun. Syst..
[13] Gary J. Sullivan,et al. Overview of the High Efficiency Video Coding (HEVC) Standard , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[14] Mohammed Ghanbari,et al. Standard Codecs: Image Compression to Advanced Video Coding , 2003 .
[15] Xiangjian He,et al. Data Sharing in Secure Multimedia Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[16] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[17] Joonsang Baek,et al. Lightweight Encryption for Smart Home , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[18] Mohammed Ghanbari,et al. Confidentiality of a selectively encrypted H.264 coded video bit-stream , 2014, J. Vis. Commun. Image Represent..
[19] Edward Curry,et al. Towards a Generalized Approach for Deep Neural Network Based Event Processing for the Internet of Multimedia Things , 2018, IEEE Access.
[20] Marius Preda,et al. Beginning of a New Standard: Internet of Media Things , 2017, KSII Trans. Internet Inf. Syst..
[21] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[22] Ajay Mittal,et al. A Survey on Various Edge Detector Techniques , 2012 .
[23] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[24] Denny Darlis,et al. An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).
[25] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[26] Kosmas Dimitropoulos,et al. Video sensor network for real-time traffic monitoring and surveillance , 2010 .
[27] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[28] Martin Fleury,et al. Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes , 2017, J. Vis. Commun. Image Represent..
[29] Martin Fleury,et al. Multimedia security perspectives in IoT , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[30] M. Prasanth,et al. Encryption and hash based security in Internet of Things , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).
[31] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[32] Safwan El Assad,et al. A new chaos-based image encryption system , 2016, Signal Process. Image Commun..
[33] Saima Abdullah,et al. Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering , 2018, IEEE Access.
[34] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[35] Christof Paar,et al. Block Ciphers - Focus on the Linear Layer (feat. PRIDE) , 2014, CRYPTO.
[36] Qing Liu,et al. An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .
[37] Thomas Stütz,et al. A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[38] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[39] Mohammed Ghanbari,et al. Sufficient encryption based on entropy coding syntax elements of H.264/SVC , 2015, Multimedia Tools and Applications.
[40] Martin Fleury,et al. Prospects for live higher resolution video streaming to mobile devices: achievable quality across wireless links , 2018, Journal of Real-Time Image Processing.
[41] Ali Chehab,et al. One round cipher algorithm for multimedia IoT devices , 2018, Multimedia Tools and Applications.
[42] Haijun Lei,et al. A new H.264 video encryption scheme based on chaotic cipher , 2010, 2010 International Conference on Communications, Circuits and Systems (ICCCAS).
[43] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[44] Zafar Shahid,et al. Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[45] Xingyuan Wang,et al. Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .
[46] Mingyuan Xin,et al. A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System , 2015, 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[47] Rengarajan Amirtharajan,et al. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.
[48] Russ Housley,et al. Guidelines for Cryptographic Key Management , 2005, RFC.
[49] Mohammad Ghanbari,et al. An Efficient Security System for CABAC Bin-Strings of H.264/SVC , 2013, IEEE Transactions on Circuits and Systems for Video Technology.
[50] Zafar Shahid,et al. Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.
[51] Dominique Barchiesi,et al. A new image encryption scheme based on a chaotic function , 2012, Signal Process. Image Commun..
[52] Heiko Schwarz,et al. Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[53] Daniel W. Engels,et al. The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.
[54] Guanrong Chen,et al. Chaos-Based Encryption for Digital Images and Videos , 2004 .
[55] Martin Fleury,et al. Interoperable conditional access with video selective encryption for portable devices , 2016, Multimedia Tools and Applications.
[56] Yu-Hung Huang,et al. A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).
[57] Kazuhiko Minematsu,et al. $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.