On the Performance of Secret Entropy Coding: A Perspective Beyond Security
暂无分享,去创建一个
[1] Itu-T and Iso Iec Jtc. Advanced video coding for generic audiovisual services , 2010 .
[2] Iskender Agi,et al. An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[3] Klara Nahrstedt,et al. Comparison of MPEG encryption algorithms , 1998, Comput. Graph..
[4] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[5] Andreas Uhl,et al. Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.
[6] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[7] Iso/iec 14496-2 Information Technology — Coding of Audio-visual Objects — Part 2: Visual , 2022 .
[8] Xiaolin Wu,et al. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[9] Mohan S. Kankanhalli,et al. Compressed-domain scrambler/descrambler for digital video , 2002, IEEE Trans. Consumer Electron..
[10] Thomas Stütz,et al. Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters , 2007, EURASIP J. Inf. Secur..
[11] Bharat K. Bhargava,et al. On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Borko Furht,et al. Multimedia encryption and watermarking , 2005, Multimedia systems and applications.
[13] Philip Ogunbona,et al. Recovering DC Coefficients in Block-Based DCT , 2006, IEEE Transactions on Image Processing.
[14] Bharat K. Bhargava,et al. MPEG Video Encryption Algorithms , 2004, Multimedia Tools and Applications.
[15] C.-C. Jay Kuo,et al. Recovering missing coefficients in DCT-transformed images , 2011, 2011 18th IEEE International Conference on Image Processing.
[16] John G. Cleary,et al. The subset sum problem and arithmetic coding , 1995 .
[17] C.-C. Jay Kuo,et al. An improved DC recovery method from AC coefficients of DCT-transformed images , 2010, 2010 IEEE International Conference on Image Processing.
[18] Mohan S. Kankanhalli,et al. On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables , 2005, PSIVT.
[19] Ian H. Witten,et al. On the privacy afforded by adaptive text compression , 1988, Comput. Secur..
[20] Boyce Nemec,et al. Society of Motion Picture and Television Engineers , 1954 .
[21] Kiyoshi Tanaka,et al. Data encryption scheme with extended arithmetic coding , 2001, SPIE Optics + Photonics.
[22] Reihaneh Safavi-Naini,et al. Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme , 1999, Communications and Multimedia Security.
[23] Ed Dawson,et al. Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes , 1997, ACISP.
[24] Hyungjin Kim,et al. Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.
[25] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[26] Ian F. Akyildiz,et al. Wireless Multimedia Sensor Networks: Applications and Testbeds , 2008, Proceedings of the IEEE.
[27] Luis Rueda,et al. Advances in Image and Video Technology, Second Pacific Rim Symposium, PSIVT 2007, Santiago, Chile, December 17-19, 2007, Proceedings , 2007, PSIVT.
[28] A. Barbir. A methodology for performing secure data compression , 1997, Proceedings The Twenty-Ninth Southeastern Symposium on System Theory.
[29] K. P. Subbalakshmi,et al. Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.
[30] Wenjun Zeng,et al. A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..
[31] C.-C. Jay Kuo,et al. Efficient multimedia data encryption based on flexible QM coder , 2004, IS&T/SPIE Electronic Imaging.
[32] Colin Boyd,et al. Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding , 1997, IMACC.
[33] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[34] Ranjan Bose,et al. A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[35] Indrani Vedula,et al. Security analysis of selectively encrypted MPEG-2 streams , 2003, SPIE ITCom.
[36] Wenjun Zeng,et al. Multimedia Security Technologies for Digital Rights Management , 2006 .
[37] Colin Boyd,et al. A Unified Code , 1999, IMACC.
[38] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[39] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[40] James M. Hogan,et al. A chosen plaintext attack on an adaptive arithmetic coding compression algorithm , 1993, Comput. Secur..
[41] James M. Hogan,et al. Data security in a fixed-model arithmetic coding compression algorithm , 1992, Comput. Secur..