A selective video encryption scheme based on coding characteristics

S Cheng, L Wang, N Ao, Q Han - Symmetry, 2020 - mdpi.com
The protection of video data has become a hot topic of research. Researchers have
proposed a series of coding algorithms to ensure the safe and efficient transmission of video …

An efficient chaos pseudo-random number generator applied to video encryption

H Xu, X Tong, X Meng - Optik, 2016 - Elsevier
Traditional cipher systems are not appropriate for video encryption due to the high
computation overhead. Video encryption must take account of the trade-off of both data …

Toward encrypted cloud media center with secure deduplication

Y Zheng, X Yuan, X Wang, J Jiang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The explosive growth of multimedia contents, especially videos, is pushing forward the
paradigm of cloud-based media hosting today. However, the wide attacking surface of the …

A novel encryption frame for medical image with watermark based on hyperchaotic system

S Zhang, T Gao, L Gao - Mathematical Problems in …, 2014 - Wiley Online Library
An encryption frame of medical image with watermark based on hyperchaotic system is
proposed in this paper. Medical information, such as the patients' private information, data …

Enabling encrypted cloud media center with secure deduplication

Y Zheng, X Yuan, X Wang, J Jiang, C Wang… - Proceedings of the 10th …, 2015 - dl.acm.org
Multimedia contents, especially videos, are being exponentially generated today. Due to the
limited local storage, people are willing to store the videos at the remote cloud media center …

Privacy protection in real time HEVC standard using chaotic system

M Abu Taha, W Hamidouche, N Sidaty, M Viitanen… - Cryptography, 2020 - mdpi.com
Video protection and access control have gathered steam over recent years. However, the
most common methods encrypt the whole video bit stream as unique data without taking into …

Robust video encryption for h. 264 compressed bitstream based on cross-coupled chaotic cipher

H Xu, X Tong, Z Wang, M Zhang, Y Liu, J Ma - Multimedia Systems, 2020 - Springer
In order to realize the secure transmission of the H. 264 compressed video bitstream, a
detailed analysis of the structure for video bitstream is performed. The parameter set and …

Computationally efficient selective video encryption with chaos based block cipher

M Altaf, A Ahmad, FA Khan, Z Uddin, X Yang - Multimedia Tools and …, 2018 - Springer
Selective encryption techniques are usually used with resource limited communication
infrastructure and devices like wireless networks and mobile devices, to reduce …

A Hierarchical encryption and key management scheme for layered access control on H. 264/SVC bitstream in the internet of things

C Xu, W Ren, L Yu, T Zhu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Terminals with diverse technological specifications, heterogeneous network environment,
and personalized user requirements raise new challenges to streaming media services …

Degradation and encryption for outsourced PNG images in cloud storage

Y Wang, J Du, X Cheng, Z Liu… - International Journal of …, 2016 - inderscienceonline.com
In cloud storage environment, users frequently store images and retrieve them by personal
device, including mobile phones. However, the content of outsourced images will be leaked …