MULTIMEDIA DATA ENCRYPTION IN BLOCK-BASED CODECS

S. Lian, Z. Liu, Z. Ren, and Z. Wang

References

  1. [1] J. Fridrich, Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, 8 (6), 1998, 1259–1284. doi:10.1142/S021812749800098X
  2. [2] S.G. Lian, J.S. Sun, & Z.Q. Wang, A block cipher based on a suitable use of the chaotic standard map, International Journal of Chaos, Solitons and Fractals, 26 (1), 2005, 117–129.
  3. [3] S.G. Lian, J.S. Sun, & Z.Q. Wang, Security analysis of a chaos-based image encryption algorithm, Physica A: Statistical and Theoretical Physics, 351 (2–4), 2005, 645–661. doi:10.1016/j.physa.2005.01.001
  4. [4] G. Chen, Y.B. Mao, & C.K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, International Journal of Chaos, Solitons and Fractals, 21 (3), 2004, 749–761.
  5. [5] Y.B. Mao, G. Chen, & S.G. Lian, A novel fast image encryption scheme based on the 3D chaotic baker map, International Journal of Bifurcation and Chaos, 14 (10), 2004, 3613–3624. doi:10.1142/S021812740401151X
  6. [6] L. Qiao & K. Nahrstedt, A new algorithm for MPEG video encryption, Proc. 1st Int. Conf. on Imaging Science, Systems, and Technology (CISST’97), Las Vegas, Nevada, 1997, 21–29.
  7. [7] A. Romeo, G. Romdotti, M. Mattavelli, & D. Mlynek, Cryptosystem architectures for very high throughput multimedia encryption: the RPK solution, 6th IEEE Int. Conf. on Electronics, Circuits and Systems (ICECS’99), Pafos, Cyprus, Vol. 1, 1999, 261–264.
  8. [8] J.-C. Yen & J.-I. Guo, A new MPEG encryption system and its VLSI architecture, IEEE Workshop on Signal Processing Systems, Taipei, 1999, 430–437.
  9. [9] C. Shi, S. Wang, & B. Bhargava, MPEG video encryption in real-time using secret key cryptography, Proc. Int. Conf. of Parallel and Distributed Processing Techniques and Applications (PDPTA’99), Las Vegas, Nevada, 1999, 2822–2828.
  10. [10] L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, Proc. 4th ACM Int. Multimedia Conf. (ACM Multimedia’96), Boston, MA, 1996, 219–230. doi:10.1145/244130.244209
  11. [11] A.S. Tosum & W.-C. Feng, Efficient multi-layer coding and encryption of MPEG video streams, IEEE Int. Conf. on Multimedia and Expo (I), New York, 30 July–2 August, 2000, (1): 119–122.
  12. [12] J. Wen, M. Sevra, W. Zeng, M. Luttrell, & W. Jin, A formatcompliant configurable encryption framework for access control of multimedia, Proc. IEEE Workshop on Multimedia Signal Processing, Cannes, 2001, 435–440.
  13. [13] C. Wu & C.C. Kuo, Fast encryption methods for audiovisual data confidentiality, Proc. of SPIE Int. Symp. on Information Technologies, 4209, Boston, 2000, 284–295.
  14. [14] C. Wu & C.C. Kuo, Efficient multimedia encryption via entropy codec design, Proc. of SPIE Int. Symp. on Electronic Imaging, 4314, San Jose, 2001, 128–138.
  15. [15] ISO/IEC 15444-1: Information technology JPEG 2000 image coding system: Core coding system, 2000, American National Standards Institute (ANSI).
  16. [16] ISO 11172-1 Information Technology—Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s—Part I: Systems. International Organization for Standardization, 1993. 23
  17. [17] Y. Matias & A. Shamir, A video scrambling technique based on space filling curves, Proc. of Advances in Cryptology— CRYPTO’87, A conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, London, UK, Lecture Notes In Computer Science, Springer-Verlag, Vol. 293, 1987, 398–417.
  18. [18] C.J. Kuo & M.S. Chen, A new signal encryption technique and its attack study, IEEE Int. Conf. on Security Technology, Taipei, 1991, 149–153. doi:10.1109/CCST.1991.202208
  19. [19] A. Torrubia & F. Mora, Perceptual cryptography of JPEG compressed images on the JFIF bit-stream domain, 2003 IEEE Int. Conf. on Consumer Electronics, Los Angeles, California, 17–19 June, 2003, 58–59.
  20. [20] A. Torrubia & F. Mora, Perceptual cryptography on MPEG Layer III bit-streams, IEEE Trans. on Consumer Electronics, 48 (4), 2002, 1046–1050. doi:10.1109/TCE.2003.1196437

Important Links:

Go Back