Efficient in-network adaptation of encrypted H.264/SVC content
暂无分享,去创建一个
Thomas Stütz | Hermann Hellwagner | Andreas Uhl | Robert Kuschnig | H. Hellwagner | A. Uhl | R. Kuschnig | Thomas Stütz
[1] Enrico Magli,et al. Conditional Access to H.264/AVC Video with Drift Control , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[2] David R. Bull,et al. A Novel Secure H.264 Transcoder using Selective Encryption , 2007, 2007 IEEE International Conference on Image Processing.
[3] Borko Furht,et al. New approaches to encryption and steganography for digital videos , 2007, Multimedia Systems.
[4] Yong Man Ro,et al. Scalable Protection and Access Control in Full Scalable Video Coding , 2006, IWDW.
[5] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[6] Hermann Hellwagner,et al. An H.264/SVC-based adaptation proxy on a WiFi router , 2008, NOSSDAV.
[7] Debargha Mukherjee,et al. A framework for fully format-independent adaptation of scalable bit streams , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Mark Handley,et al. SDP: Session Description Protocol , 1998, RFC.
[9] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[10] John G. Apostolopoulos. Architectural Principles for Secure Streaming & Secure Adaptation in the Developing Scalable Video Coding (SVC) Standard , 2006, 2006 International Conference on Image Processing.
[11] Abdulmotaleb El-Saddik,et al. Compressed-Domain Video Processing for Adaptation, Encryption, and Authentication , 2008, IEEE MultiMedia.
[12] Ajay Luthra,et al. Introduction to the Special Issue on Scalable Video Coding-Standardization and Beyond , 2007, IEEE Trans. Circuits Syst. Video Technol..
[13] Thomas Stütz,et al. Format-Compliant Encryption of H.264/AVC and SVC , 2008, 2008 Tenth IEEE International Symposium on Multimedia.
[14] Andreas Uhl,et al. Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.
[15] Thomas Stütz,et al. A survey on JPEG2000 encryption , 2009, Multimedia Systems.
[16] Henning Schulzrinne,et al. Real Time Streaming Protocol (RTSP) , 1998, RFC.
[17] Itu-T and Iso Iec Jtc. Advanced video coding for generic audiovisual services , 2010 .
[18] Henning Schulzrinne,et al. RTP Profile for Audio and Video Conferences with Minimal Control , 2003, RFC.
[19] Borko Furht,et al. Multimedia encryption and watermarking , 2005, Multimedia systems and applications.
[20] Steven McCanne,et al. Receiver-driven layered multicast , 1996, SIGCOMM '96.
[21] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[22] Информатика. Internet Streaming Media Alliance , 2010 .
[23] Debargha Mukherjee,et al. Format independent encryption of generalized scalable bit-streams enabling arbitrary secure adaptations [multimedia communication applications] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[24] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[25] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[26] Thomas Schierl,et al. RTP Payload Format for SVC Video , 2006 .
[27] Amir Said. Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.
[28] Deborah Estrin,et al. Conference proceedings on Applications, technologies, architectures, and protocols for computer communications , 1996, SIGCOMM 1996.
[29] Yong Man Ro,et al. A selective video encryption for the region of interest in scalable video coding , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[30] John G. Apostolopoulos,et al. Secure scalable streaming enabling transcoding without decryption , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[31] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[32] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.
[33] Byeungwoo Jeon,et al. Digital Video Scrambling Using Motion Vector and Slice Relocation , 2005, ICIAR.
[34] John G. Apostolopoulos,et al. Secure scalable video streaming for wireless networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[35] John G. Apostolopoulos,et al. Secure scalable streaming and secure transcoding with JPEG-2000 , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[36] Yuzhuo Zhong,et al. A Quality-Controllable Encryption for H.264/AVC Video Coding , 2006, PCM.
[37] Pascal Frossard,et al. Securing media for adaptive streaming , 2003, MULTIMEDIA '03.
[38] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[39] Andreas Uhl,et al. Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .
[40] Thomas Stütz,et al. Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters , 2007, EURASIP J. Inf. Secur..
[41] Touradj Ebrahimi,et al. The emerging JPEG-2000 security (JPSEC) standard , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[42] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[43] Hermann Hellwagner,et al. Design options and comparison of in-network H.264/SVC adaptation , 2008, J. Vis. Commun. Image Represent..