Citation: | LIAN Shi-guo, SUN Jin-sheng, WANG Zhi-quan. Video Encryption and Its Development[J]. INFORMATION AND CONTROL, 2004, 33(5): 560-566. |
[1] |
ISO11172;ISO/MPEG90/176,Coding of Moving Pictures and Associated Audio[S].
|
[2] |
ITU-T Rec.H.263,Video Coding for Narrow Telecommunication Channels at<64kbit/s[S].
|
[3] |
Wallace Gregory K.The JPEG still image compression standard [J].Communications of the ACM,1991,34(4);30~44.
|
[4] |
Qao L,Nahrstedt K.A new algorithm for MPEG video encryption [A].Proecedings of the First International Conference on Imaging Science,Systems and Technology(CISST97)[C].Las Vegas,Nevada;1997.21~29.
|
[5] |
NIST FIPS Publication 46-2,1993,Data Encryption Standard [S].
|
[6] |
Tosun A S,Feng W C.Lightweight security mechanisms for wireless video transmission[A].Proceedings of the International Conference on Information Technology;Coding and Computing(ITCC01)[C].Las Vegas,Nevada;IEEE,2001.157~161.
|
[7] |
Agi I,Gong L.An empirical study of MPEG video transmissions [A].Proceedings of the Internet Society Symposium on Network and Distributed System Security[C].San Diego,CA,1996.137~144.
|
[8] |
Romeo A,Romdotti G,Mattavelli M,et al.Cryptosystem architectures for very high throughput multimedia encryption;the RPK solution[A].The 6th IEEE International Conference on Electronics,Circuits and Systems(ICECS'99)[C].Cyprus;Elsevier North-Holland,1999.261~264.
|
[9] |
Wee S J,Apostolopoulos J G.Secure scalable video streaming for wireless networks [A].Proceedings of the IEEE International Conference on Acoustics,Speech,and Signal Processing [C].Salt Lake City;IEEE,2001.2049~2052.
|
[10] |
Wee S J,Apostolopoulos J G.Secure scalable streaming enabling transcoding without decryption[A].Proceedings of the IEEE International Conference on Image Processing [C].Thessaloniki,Greece;IEEE,2001.437~440.
|
[11] |
Qiao L,Nahrstedt K.Comparison of MPEG encryption algorithm [J].International Journal on Computers and Graphics,1998,22(4);437~448.
|
[12] |
Kuhn M G.Analysis of the nagravision video scrambling method [EB/OL].http://www.cl.cam.ac.uk/~mgk25/,1998-08-23.
|
[13] |
Tang L.Methods for encrypting and decrypting MPEG video data efficiently[A].Proceedings of the Fourth ACM International Multimedia Conference(ACM Multimedia 96')[C].Boston,MA;Elsevier Engineering Information Inc.,1996.219~230.
|
[14] |
TosumAS,FengWC.Efficient multi-layer coding and encryption of MPEG video streams[A].IEEE International Conference on Multimedia and Expo[C].New York;IEEE,2000.119~122.
|
[15] |
Qiao L,Nahrstedt K,Tam I.Is MPEG encryption by using random list instead of zigzag order secure [A].IEEE International Symposium on Consumer Electronics[C].Singapore;IEEE Piscataway,1997.226~229.
|
[16] |
Shi C G,Bhargsva B.A fast MPEG video encryption algorithm [A].Proceedings of the 6th ACM International Multimedia Conference[C].Bristol;Elsevier Engineering Information Inc.,1998.81~88.
|
[17] |
Shi C G,Wang SY,BhargavaB.MPEG video encryption in real-time using secret key cryptography[A].Proceedings of the International Conference of Parallel and Distributed Processing Techniques and Applications(PDPTA99')[C].Las Vegas,Nevada;Computer Science Research,Education and Application Press,1999.2822~2828.
|
[18] |
Yen J C,Guo J I.A new MPEG encryption system and its VLSI architecture[A].IEEE Workshop on Signal Processing Systems [C].Taipei;Kluwer Academic Publisher,1999.430~437.
|
[19] |
Zeng W J,Lei S M.Efficient frequency domain selective scrambling of digital video [J].IEEE Transactions on Multimedia,2003,5(1);118~129.
|
[20] |
Shannon C.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4);656~715.
|
[21] |
Uehara T.Combined encryption and source coding [EB/OL].http;//www.uow.edu.au/~tu01/CESC.html.
|
[22] |
Wen J T,Sevra M,Wen J,et al.A format-compliant configurable encryption framework for access control of multimedia[A].Proceedings of IEEE Workshop on Multimedia Signal Processing [C].Cannes,France;IEEE,2001.435~440.
|
[23] |
Tosun A S,Feng W C.On error preserving encryption algorithms for wireless video transmission [A].Proceedings of the ACM International Multimedia Conference and Exhibition [C].Ottawa,Ont.;Elsevier Engineering Information Inc.,2001.302~308.
|
[24] |
Wu C P,Kuo C C J.Fast encryption methods for audiovisual data confidentiality[A].Proceedings of SPIE International Symposis on Information Technologies 2000 [C].Boston,USA;SPIE,2000.284~295.
|
[25] |
Wu C P,Kuo C C J.Efficient multimedia encryption via entropy codec design [A].SPIE International Symposium on Electronic Imaging 2001 [C].San Jose,USA;SPIE,2001.128~138.
|
[26] |
Lim J,Boyd C,Dawson E.Cryptanalysis of adaptive arithmetic coding encryption scheme[A].The Second Australasian Conference on Information Security and Privacy(ACISP97)[C].Sydney,Australia;Springer,1997.216~227.
|
[27] |
Cleary J G,Irvine S A,Rinsma-Melchert I.On the insecurity of arithmetic coding[J].Computers and Security,1995,14(2):167~180.
|