Skip to main content
Top

2013 | OriginalPaper | Chapter

2. Advances in Multimedia Encryption

Authors : Amit Pande, Joseph Zambreno

Published in: Embedded Multimedia Security Systems

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Rapid advances in embedded systems and mobile communications have flooded the market with a large volume of multimedia data. In this chapter, we present a summary of multimedia compression and encryption schemes, and the way they have evolved over the decades.
Chapter goals:
  • Familiarize with existing deal of research approaches in the area of multimedia encryption.
  • Summary of key/popular schemes proposed in research literature.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE Press, New York (1996) CrossRef Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE Press, New York (1996) CrossRef
2.
go back to reference Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time transport protocol (SRTP) (2004) Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time transport protocol (SRTP) (2004)
3.
go back to reference Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi:10.1109/MMSP.2005.248641 Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi:10.​1109/​MMSP.​2005.​248641
5.
go back to reference Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002) CrossRef Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002) CrossRef
6.
go back to reference Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002) CrossRef Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002) CrossRef
7.
go back to reference Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006) CrossRef Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006) CrossRef
8.
go back to reference Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007) CrossRef Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007) CrossRef
9.
go back to reference Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: challenges and new directions. In: Communications, Internet, and Information Technology (CIIT 2003), pp. 276–285 (2003) Liu, X., Eskicioglu, A.M.: Selective encryption of multimedia content in distribution networks: challenges and new directions. In: Communications, Internet, and Information Technology (CIIT 2003), pp. 276–285 (2003)
10.
go back to reference Meyer, J., Gadegast, F.: Security mechanisms for multimedia data with the example mpeg-1 video. Project Description of SECMPEG, Technical University of Berlin, Germany (1995) Meyer, J., Gadegast, F.: Security mechanisms for multimedia data with the example mpeg-1 video. Project Description of SECMPEG, Technical University of Berlin, Germany (1995)
11.
go back to reference Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006) CrossRef Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006) CrossRef
12.
go back to reference Pazarci, M., Dipcin, V.: A mpeg2-transparent scrambling technique. IEEE Trans. Consum. Electron. 48(2), 345–355 (2002) CrossRef Pazarci, M., Dipcin, V.: A mpeg2-transparent scrambling technique. IEEE Trans. Consum. Electron. 48(2), 345–355 (2002) CrossRef
13.
go back to reference Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimed. Syst. 9(3), 279–287 (2003) CrossRef Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimed. Syst. 9(3), 279–287 (2003) CrossRef
14.
go back to reference Qiao, L., Nahrstedt, K.: A new algorithm for mpeg video encryption. In: Proc. of First International Conference on Imaging Science System and Technology, pp. 21–29 (1997) Qiao, L., Nahrstedt, K.: A new algorithm for mpeg video encryption. In: Proc. of First International Conference on Imaging Science System and Technology, pp. 21–29 (1997)
15.
go back to reference Shi, C., Wang, S.Y., Bhargava, B.: Mpeg video encryption in real-time using secret key cryptography. In: Proc. Int. Conf. Parallel and Distributed Processing Techniques and Applications (1999) Shi, C., Wang, S.Y., Bhargava, B.: Mpeg video encryption in real-time using secret key cryptography. In: Proc. Int. Conf. Parallel and Distributed Processing Techniques and Applications (1999)
16.
go back to reference Slagell, A.J.: Known-plaintext attack against a permutation based video encryption algorithm (2004) Slagell, A.J.: Known-plaintext attack against a permutation based video encryption algorithm (2004)
17.
go back to reference Spanos, G.A., Maples, T.B.: Performance study of a selective encryption scheme for the security of networked, real-time video. In: ICCCN, pp. 2–10. IEEE Comput. Soc., Los Alamitos (1995) Spanos, G.A., Maples, T.B.: Performance study of a selective encryption scheme for the security of networked, real-time video. In: ICCCN, pp. 2–10. IEEE Comput. Soc., Los Alamitos (1995)
18.
go back to reference Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (2006) MATH Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (2006) MATH
19.
go back to reference Tang, L.: Methods for encrypting and decrypting mpeg video data efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia, pp. 219–229. ACM Press, New York (1997) Tang, L.: Methods for encrypting and decrypting mpeg video data efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia, pp. 219–229. ACM Press, New York (1997)
20.
go back to reference Wen, J., Luttrell, M., Severa, M.: Access control of standard video bitstreams. In: Proc. IEEE Intl. Conf. Media Future (2001) Wen, J., Luttrell, M., Severa, M.: Access control of standard video bitstreams. In: Proc. IEEE Intl. Conf. Media Future (2001)
22.
go back to reference Wu, C.P., Kuo, C.C.J.: Efficient multimedia encryption via entropy codec design. In: Proceedings of SPIE, vol. 4314, p. 128 (2001) Wu, C.P., Kuo, C.C.J.: Efficient multimedia encryption via entropy codec design. In: Proceedings of SPIE, vol. 4314, p. 128 (2001)
Metadata
Title
Advances in Multimedia Encryption
Authors
Amit Pande
Joseph Zambreno
Copyright Year
2013
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-4459-5_2

Premium Partner