A scheme for conditional access-based systems using index locations of DCT coefficients
暂无分享,去创建一个
[1] Hyoung-Kee Choi,et al. Improvements on Sun 's Conditional Access System in Pay-TV Broadcasting Systems , 2010, IEEE Transactions on Multimedia.
[2] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[3] Fei Peng,et al. An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.
[4] Douglas Sicker,et al. Selective encryption for consumer applications , 2004, CCNC.
[5] D. Diaz-Sanchez,et al. Sharing conditional access modules through the home network for pay TV access , 2009, IEEE Transactions on Consumer Electronics.
[6] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[7] Subhamoy Maitra,et al. Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.
[8] Chi-Sung Laih,et al. Efficient Key Distribution for Access Control in Pay-TV Systems , 2008, IEEE Transactions on Multimedia.
[9] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Zafar Shahid,et al. Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.
[11] Bharat K. Bhargava,et al. On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Hamid Sharif,et al. Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks , 2010, IEEE Transactions on Multimedia.
[13] Tony Thomas,et al. Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption , 2012, IEEE Transactions on Multimedia.
[14] Elisa Bertino,et al. A selective encryption approach to fine-grained access control for P2P file sharing , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[15] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1992 .
[16] Xi Chen,et al. On the design of partial encryption scheme for multimedia content , 2013, Math. Comput. Model..
[17] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[18] Robert F. Easley,et al. Optimal Digital Rights Management with Uncertain Piracy , 2012, 2012 45th Hawaii International Conference on System Sciences.
[19] Jaime Delgado,et al. Digital rights and privacy policies management as a service , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[20] Hamid Sharif,et al. On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks , 2010, IEEE Transactions on Multimedia.
[21] Jianying Zhou,et al. Cryptanalysis of Chu's DCT based watermarking scheme , 2006, IEEE Transactions on Multimedia.
[22] Ed Dawson,et al. Design and Cryptanalysis of Transform-Based Analog Speech Scamblers , 1993, IEEE J. Sel. Areas Commun..
[23] Andrés Marín López,et al. Sharing Conditional Access Modules through the home network , 2009, 2009 Digest of Technical Papers International Conference on Consumer Electronics.
[24] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] Prasant Mohapatra,et al. Securing Multimedia Content Using Joint Compression and Encryption , 2013, IEEE MultiMedia.
[27] Moni Naor,et al. Protecting Cryptographic Keys: The Trace-and-Revoke Approach , 2003, Computer.