Confidentiality of a selectively encrypted H.264 coded video bit-stream

[1]  Liang-Gee Chen,et al.  Architecture Design of Context-Based Adaptive Variable-Length Coding for H.264/AVC , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[2]  Indrani Vedula,et al.  Security analysis of selectively encrypted MPEG-2 streams , 2003, SPIE ITCom.

[3]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[4]  Andreas Uhl,et al.  Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .

[5]  Máire O'Neill,et al.  A Tunable Encryption Scheme and Analysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[7]  Emrullah Turhan Tunali,et al.  Scalable video encryption of H.264 SVC Codec , 2011, J. Vis. Commun. Image Represent..

[8]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[9]  Shipeng Li,et al.  Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.

[10]  Mohammad Ghanbari,et al.  Sufficient Encryption with Codewords and Bin-strings of H.264/SVC , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Lawrence Harte Introduction To Digital Rights Management (Drm); Identifying, Tracking, Authorizing And Restricting Access To Digital Media , 2006 .

[13]  D. Marpe,et al.  Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.

[14]  D. Kahn The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .

[15]  Willem Jonker An Introduction to Digital Rights Management Systems , 2007, Security, Privacy, and Trust in Modern Data Management.

[16]  Sang-Uk Shin,et al.  Efficient Selective Encryption Scheme for the H.264/Scalable Video Coding(SVC) , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[17]  Pradeep Kumar Advanced video compression using H.264 , 2013 .

[18]  Iain E. G. Richardson,et al.  The H.264 Advanced Video Compression Standard , 2010 .

[19]  Enrico Magli,et al.  Transparent encryption techniques for H.264/AVC and H.264/SVC compressed video , 2011, Signal Process..

[20]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[21]  Mohammed Ghanbari,et al.  The accuracy of PSNR in predicting video quality for different video scenes and frame rates , 2012, Telecommun. Syst..

[22]  Zafar Shahid,et al.  Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[23]  Zafar Shahid,et al.  Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Mohammed Ghanbari,et al.  Efficient selective encryption with H.264/SVC CABAC bin-strings , 2012, 2012 19th IEEE International Conference on Image Processing.

[25]  Thomas Stütz,et al.  Format-Compliant Encryption of H.264/AVC and SVC , 2008, 2008 Tenth IEEE International Symposium on Multimedia.

[26]  Borko Furht,et al.  Multimedia Encryption and Watermarking (Multimedia Systems and Applications) , 2005 .

[27]  Mohammed Ghanbari,et al.  Standard Codecs: Image Compression to Advanced Video Coding , 2003 .

[28]  Thomas Stütz,et al.  A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[29]  Heiko Schwarz,et al.  Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[30]  Heather Yu Streaming Media Encryption , 2006 .

[31]  Michal Sramka,et al.  Cryptanalysis of Video Encryption Algorithms , 2003 .

[32]  Douglas Sicker,et al.  Selective encryption for consumer applications , 2004, CCNC.

[33]  Andreas Uhl,et al.  A symbolic transform attack on lightweight encryption based on wavelet filter parameterization , 2006, MM&Sec '06.

[34]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[35]  Amir Said Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.

[36]  Andreas Uhl,et al.  Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.

[37]  Wesley De Neve,et al.  Flexible macroblock ordering in H.264/AVC , 2006, J. Vis. Commun. Image Represent..

[38]  Bharat K. Bhargava,et al.  MPEG Video Encryption Algorithms , 2004, Multimedia Tools and Applications.

[39]  Borko Furht,et al.  Survey of Watermarking Techniques and Applications , 2004 .

[40]  Bharat K. Bhargava,et al.  A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.