|
[1] D. Kundur and K. Karthik, “Video fingerprinting and encryption principles for digital rights management,” in Proc. IEEE, vol. 92, pp. 918-932, 2004. [2] Data Encryption Standard (DES), Federal Information Processing Standards Publication 46, Jan. 1977. [3] Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, Nov. 26, 2001. [4] M. Grangetto, A. Grosso, and E. Magli, “Selective encryption of JPEG2000 images by means of randomized arithmetic coding,” in Proc. IEEE 6th Workshop on Multimedia Signal Process., Siena, Italy, Sep. 2004, pp. 347-350. [5] M. Grangetto, E. Magli, and G. Olmo, “Multimedia selective encryption by means of randomized arithmetic coding,” IEEE Trans. Multimedia, vol. 8, no. 5, pp. 905-917, Oct. 2006. [6] J. Meyer and F. Gadegast, “Security mechanisms for multimedia data with the example MPEG-1 video,” in Project Description of SECMPEG. Berlin, Germany: Technical Univ. Berlin, 1995. [7] G. A. Spanos and T. B. Maples, “Performance study of a selective encryption scheme for the security of networked, real-time video,” in Proc. 4th Int. Conf. Computer Communications and Networks, Las Vegas, NV, Sep. 20-23, 1995. [8] L. Tang, “Methods for encrypting and decrypting MPEG video data efficiently,” in Proc. 4th ACM Int. Multimedia Conf., Boston, MA, Nov. 18-22, 1996, pp. 219-230. [9] L. Qiao and K. Nahrstedt, “A new algorithm for MPEG video encryption,” in Proc. 1st Int. Conf. Imaging Science, Systems and Technology (CISST ’97), Las Vegas, NV, Jul. 1997, pp. 21-29. [10] C. Shi and B. Bhargava, “A fast MPEG video encryption algorithm,” in Proc. 6th Int. Multimedia Conf., Bristol, U.K., Sep. 12-16, 1998. [11] A. M. Alattar, G. I. Al-Regib, and S. A. Al-Semari, “Improved selective encryption techniques for secure transmission of MPEG video bit-streams,” in Proc. 1999 Int. Conf. Image Processing (ICIP ’99), Kobe, Japan, Oct. 24-28, 1999, Vol. 4, pp. 256-260. [12] C. Shi, S. -Y. Wang, and B. Bhargava, “MPEG video encryption in realtime using secret key cryptography,” in 1999 Int. Conf. Parallel and Distributed Processing Techniques and Applications (PDPTA’99), Las Vegas, NV, Jun. 28-Jul. 1, 1999. [13] H. Cheng and X. Li, “Partial encryption of compressed images and video,” IEEE Trans. Signal Process., vol. 48, pp. 2439-2451, 2000. [14] M. Van Droogenbroeck and R. Benedett, “Techniques for a selective encryption of uncompressed and compressed images,” in Proc. Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002, Ghent, Belgium, Sep. 9-11, 2002. [15] A. Servetti and J. C. De Martin, “Perception-based partial encryption of compressed speech,” IEEE Trans. Speech Audio Process., vol. 10, no. 8, pp. 637-643, 2002. [16] M. Podesser, H. -P. Schmidt, and A. Uhl, “Selective bitplane encryption for secure transmission of image data in mobile environments,” in Proc. 5th Nordic Signal Processing Symp., Oct. 4-7, 2002. [17] A. Pommer and A. Uhl, “Selective encryption of wavelet-packet encoded image data,” Multimedia Syst. J., vol. 9, no. 3, pp. 279-287, 2003. [18] W. Zeng and S. Lei, “Efficient frequency domain selective scrambling of digital video,” IEEE Trans. Multimedia, vol. 5, pp. 118-129, 2003. [19] T. Lookabaough and D. C. Sicker, “Selective encryption for consumer applications,” IEEE Commun. Mag., pp. 124-129, 2004. [20] S. Lian, Multimedia Content Encryption: Techniques and Applications, Auerbach Publication, Taylor & Francis Group, 2008. [21] A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, and J. -J. Quisquater, “Overview on Selective Encryption of Image and Video: Challenges and Perspectives,” EURASIP J. Inform. Security, vol. 2008, Article ID 179290, pp. 1-18, 2008. [22] R. G. Gallager, “Variations on a Theme by Huffman, ” IEEE Trans. on Information Theory, vol. IT-24, no. 6, pp. 668-674, Nov. 1978. [23] C. -P. Wu and C. -C. J. Kuo, “Fast encryption methods for audiovisual data confidentiality,” in Proc. SPIE Int. Symp. Information Technologies 2000, Boston, MA, Nov. 2000, pp. 284-295. [24] C. -P. Wu and C. -C. J. Kuo, “Efficient multimedia encryption via entropy codec design,” in Proc. SPIE Security and Watermarking of Multimedia Content III, Jan. 2001, Vol. 4314. [25] C. -P. Wu and C. -C. J. Kuo, “Design of integrated multimedia compression and encryption systems,” IEEE Trans. Multimedia, vol. 7, pp. 828-839, 2005. [26] J. Zhou, Z. Liang, Y. Chen, and O. C. Au, “Security analysis of multimedia encryption schemes based on multiple Huffman table,” IEEE Signal Process. Lett., vol. 14, no. 3, pp. 201-204, Mar. 2007. [27] G. Jakimoski and K. P. Subbalakshmi, “Cryptanalysis of some multimedia encryption schemes,” IEEE Trans. Multimedia, vol. 10, no. 3, pp. 330-338, Apr. 2008. [28] J. Rissanen, “Generalised Kraft inequality and arithmetic coding,” IBM J. Res. Develop. vol. 20, pp. 198-203, 1976. [29] J. Rissanen, and G. G. Langdon, “Arithmetic coding,” IBM J. Res. Develop. vol. 23, no. 2, pp. 149-162, Mar. 1979. [30] X. Ruan and R. S. Katti, “A new source coding scheme with small expected length and its application to simple data encryption,” IEEE Trans. Computers, vol. 55, no. 10, pp. 1300-1305, Oct. 2006. [31] H. Kim, J. Villasenor, and J. Wen, “Secure arithmetic coding using interval splitting,” in Proc. Thirty-Ninth Asilomar Conf. Signals, Systems and Computers, 2005, Oct. 28-Nov. 1, 2005, pp. 1218-1221. [32] J. Wen, H. Kim, and J. D. Villasenor, “Binary arithmetic coding with key-based interval splitting,” IEEE Signal Process. Lett., vol. 13, no. 2, pp. 69-72, Feb. 2006. [33] H. Kim, J.Wen, and J. D. Villasenor, “Secure arithmetic coding,” IEEE Trans. Signal Process., vol. 55, no. 5, pp. 2263-2272, May 2007. [34] I. H. Witten, R. M. Neal, and J. G. Cleary, “Arithmetic coding for data compression,” Commun. Assoc. Comp. Mach., vol. 30, no. 6, pp. 520-540, 1987. [35] P. G. Howard and J. S. Vitter, “Arithmetic coding for data compression,” in Proc. of the IEEE, vol. 82, no. 6, pp. 857-865, Jun., 1994. [36] D. S. Taubman and M. W. Marcellin, JPEG2000: Image Compression Fundamentals, Standards and Practice. Norwell, MA: Kluwer Academic, 2002. [37] T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560-576, Jul. 2003. [38] K. Sayood, Introduction to Data Compression, 3rd ed. San Diego, CA: Morgan Kaufmann, 2005. [39] R. S. Katti, S. K. Srinivasan, and A. Vosoughi, “On the security of randomized arithmetic codes against ciphertext-only attacks,” IEEE Trans. Inform. Forensics security, vol. 6, no. 1, pp. 19-27, Mar. 2011. [40] H. M. Sun, K. H. Wang, and W. C. Ting, “On the security of the secure arithmetic code,” IEEE Trans. Inform. Forensics Security, vol. 4, no. 4, pp. 781-789, Dec. 2009. [41] J. Zhou, O. Au, X. Fan, and P. Wong, “Joint security and performance enhancement for secure arithmetic coding,” in Proc. 15th IEEE Int. Conf. on Image Processing, Oct. 2008, pp. 3120-3123. [42] J. Zhou, O. C. Au, P. H. Wong, and X. Fan, “Cryptanalysis of secure arithmetic coding,” in Proc. of the IEEE Int. Conf. on Acoustics, Speech and Signal Process., 2008, pp. 1769-1772. [43] J. Zhou, O. C. Au, and P. H. Wong, “Adaptive chosen-ciphertext attack on secure arithmetic coding,” IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1825-1838, May 2009. [44] R. S. Katti, S. K. Srinivasan, and A. Vosoughi, “On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability,” IEEE Trans. Inform. Forensics security, vol. 7 no. 3, pp. 895-903, June 2012. [45] Secure Hath Standard (SHS), Federal Information Processing Standards Publication 180-3, Oct. 2008. [46] A. Menezes, P. V. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996. [47] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical J., vol. 28, pp. 656-715, 1949.
|