CHAPTER 17 – Video Security and Protection

[1]  Hyungjin Kim,et al.  Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.

[2]  J. Apostolopoulos,et al.  Rate-Distortion-Authentication Optimized Streaming of Authenticated Video , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[4]  Min Wu,et al.  Collusion-Resistant Video Fingerprinting for Large User Group , 2006, IEEE Transactions on Information Forensics and Security.

[5]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[6]  Qi Tian,et al.  A Secure and Robust Authentication Scheme for Video Transcoding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Lawrence Wai-Choong Wong,et al.  Rate-Distortion Optimized Streaming of Authenticated Video , 2006, 2006 International Conference on Image Processing.

[8]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[9]  Philip A. Chou,et al.  Rate-distortion optimized streaming of packetized media , 2006, IEEE Transactions on Multimedia.

[10]  K. J. Ray Liu,et al.  Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .

[11]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[12]  Rick S. Blum,et al.  Multi-sensor image fusion and its applications , 2005 .

[13]  Lawrence Wai-Choong Wong,et al.  A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[14]  Gary J. Sullivan,et al.  Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.

[15]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[16]  Min Wu,et al.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.

[17]  Deepa Kundur,et al.  Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.

[18]  John G. Apostolopoulos,et al.  Secure transcoding with JPSEC confidentiality and authentication , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[19]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[20]  Douglas C. Sicker,et al.  Selective encryption for consumer applications , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[21]  Hakan Hacigümüs,et al.  Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.

[22]  Zhou Wang,et al.  Video quality assessment based on structural distortion measurement , 2004, Signal Process. Image Commun..

[23]  Min Wu,et al.  Data hiding in image and video .II. Designs and applications , 2003, IEEE Trans. Image Process..

[24]  Nasir D. Memon,et al.  Automated reassembly of fragmented images , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[25]  Hui Cheng,et al.  Robust content-dependent high-fidelity watermark for tracking in digital cinema , 2003, IS&T/SPIE Electronic Imaging.

[26]  Yuzhuo Zhong,et al.  Efficient and fully scalable encryption for MPEG-4 FGS , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[27]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[28]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[29]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[30]  Min Wu,et al.  Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.

[31]  Reihaneh Safavi-Naini,et al.  Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.

[32]  John G. Apostolopoulos,et al.  Secure scalable streaming enabling transcoding without decryption , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[33]  C.-C. Jay Kuo,et al.  Efficient multimedia encryption via entropy codec design , 2001, IS&T/SPIE Electronic Imaging.

[34]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[35]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[36]  Mihaela van der Schaar,et al.  The MPEG-4 fine-grained scalable video coding method for multimedia streaming over IP , 2001, IEEE Trans. Multim..

[37]  Weiping Li,et al.  Overview of fine granularity scalability in MPEG-4 video standard , 2001, IEEE Trans. Circuits Syst. Video Technol..

[38]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[39]  Min Wu,et al.  Dynamic resource allocation via video content and short-term traffic statistics , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[40]  Aggelos K. Katsaggelos,et al.  Error resilient video coding techniques , 2000, IEEE Signal Process. Mag..

[41]  J. O’Sullivan,et al.  Information-theoretic analysis of information hiding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[42]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[43]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[44]  Wenjun Zeng,et al.  Efficient frequency domain video scrambling for content access control , 1999, MULTIMEDIA '99.

[45]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[46]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[47]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[48]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[49]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[50]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[51]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[52]  Mihir Bellare,et al.  A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[53]  Mihir Bellare,et al.  Practice-Oriented Provable-Security , 1997, ISW.

[54]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[55]  David Hutchinson,et al.  Continuous media filters for heterogeneous internetworking , 1996, Electronic Imaging.

[56]  Jack C. Lee,et al.  Toward on-line, worldwide access to Vatican Library materials , 1996, IBM J. Res. Dev..

[57]  Boon-Lock Yeo,et al.  Rapid scene analysis on compressed video , 1995, IEEE Trans. Circuits Syst. Video Technol..

[58]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[59]  Yao Wang,et al.  Maximally smooth image recovery in transform coding , 1993, IEEE Trans. Commun..

[60]  David J. Field,et al.  Contour integration by the human visual system: Evidence for a local “association field” , 1993, Vision Research.

[61]  R. Cox,et al.  The analog voice privacy system , 1987, ICASSP '86. IEEE International Conference on Acoustics, Speech, and Signal Processing.

[62]  A.V. Oppenheim,et al.  The importance of phase in signals , 1980, Proceedings of the IEEE.

[63]  Shih-Fu Chang,et al.  Quality-Optimized and Secure End-to-End Authentication for Media Delivery , 2008, Proceedings of the IEEE.

[64]  Min Wu,et al.  PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING , 2004 .

[65]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.