Abstract-Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give researchers and practitioners an analytic and critical overview of the state-ofthe-art of video encryption narrowed down to its joint application with the H.264 standard suite and associated protocols (packaging / streaming) and processes (transcoding / watermarking).
No abstract
Image and video encryption has become a widely discussed topic; especially for the fully featured JPEG2000 compression standard numerous approaches have been proposed. A comprehensive survey of state-of-the-art JPEG2000 encryption is given. JPEG2000 encryption schemes are assessed in terms of security, runtime and compression performance and their suitability for a wide range of application scenarios.
BackgroundPatients with frozen shoulder show limited shoulder mobility often accompanied by pain. Common treatment methods include physiotherapy, pain medication, administration of corticosteroids, and surgical capsulotomy. Frozen shoulder often lasts from months to years and mostly affects persons in the age group of 40 to 70 years. It severely reduces the quality of life and the ability to work.ObjectiveThe objective of this study was to evaluate the feasibility of a mobile health (mHealth) intervention that supports patients affected by “stage two” frozen shoulder. Patients were supported with app-based exercise instructions and tools to monitor their training compliance and progress. These training compliance and progress data supplement the patients’ oral reports to the physiotherapists and physicians and can assist them in therapy adjustment.MethodsIn order to assess the feasibility of the mHealth intervention, a pilot study of a newly developed app for frozen shoulder patients was conducted with 5 patients for 3 weeks. The main function of the app was the instruction for exercising at home. Standardized questionnaires on usability such as System Usability Scale (SUS) and USE (Usefulness, Satisfaction, and Ease of use), and Technology Acceptance Model-2 (TAM-2) were completed by the study participants at the end of the study. Additionally, a nonstandardized questionnaire was completed by all patients. The correctness of the exercises as conducted by the patients was assessed by a physiotherapist at the end of the study. The mobility of the shoulder and pain in shoulder movement was assessed by a physiotherapist at the start and the end of the study.ResultsThe pilot study was successfully conducted, and the app was evaluated by the patients after 3 weeks. The results of the standardized questionnaires showed high acceptance (TAM-2) and high usability (SUS) of the developed app. The overall usability of the system as assessed by the SUS questionnaire was very good (an average score of 88 out of 100). The average score of the TAM-2 questionnaire on the intention to further use the app was 4.2 out of 5, which indicated that most patients would use the app if further available. The results of the USE questionnaires highlighted that the patients learned how to use the app easily (an average score of 4.2 out of 5) and were satisfied with the app (an average score of 4.7 out of 5). The frequency of app usage and training was very high based on patient reports and verified by analysis of the usage data. The patients conducted the exercises almost flawlessly.ConclusionsOur results indicate the feasibility of the mHealth intervention, as the app was easy to use and frequently used by the patients. The app supported the patients’ physiotherapy by providing clear exercising instructions.
An encryption approach for H.264/AVC and SVC is proposed. Although the bitstream (format stream) is encrypted with state-of-the-art symmetric ciphers, H.264/AVC and SVC compliance is preserved. Standard compliant encoder/decoder and conventional symmetric ciphers, e.g., in specialized hardware, can still be employed -a significant advantage compared to previous work. The approach is suitable for a wide range of application scenarios.
Despite user interaction problems in this group of patients the provided intervention resulted in a reduction in the absolute error of carbohydrate estimation. Intervention with smartphone applications to assist carbohydrate counting apparently results in more accurate estimations.
Thomas.Stuetz@fh-salzburg.ac.at Florent.Autrusseau@univ-nantes.fr uhl@cosy.sbg.ac.at 4) Conference & Publisher information:IEEE Trans on Multimedia -TMM http://www.signalprocessingsociety.org/tmm/ http://www.ieee.org/ Abstract-In this work we propose a novel non-blind H.264/CAVLC structure-preserving substitution watermarking algorithm. The proposed watermarking algorithm enables extremely efficient watermark embedding by simple bit substitutions (substitution watermarking). The bit-substitutions change the motion vector differences of non-reference frames. Furthermore our watermarking algorithm can be applied in applications scenarios which require that watermarking preserves the length of the bitstream units (structure-preserving watermarking). The watermark detection works in the image domain and thus is robust to video format changes. The quality and robustness of the approach are in depth evaluated and analyzed, the quality evaluation is backed up by subjective evaluations. Comparison to the state-of-the-art indicates a superior performance of our watermarking algorithm.
This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC). RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and VoD scenario are considered.Two basic alternatives to implement encryption and adaptation of H.264/SVC content are investigated: (i) full, format-independent encryption making use of Secure RTP (SRTP); (ii) SVC-specific encryption that leaves the metadata relevant for adaptation (NAL unit headers) unencrypted.The SRTP-based scheme (i) is straightforward to deploy, but requires the MANE to be in the security context of the delivery, i.e., to be a trusted node. For adaptation, the content needs to be decrypted, scaled, and re-encrypted. The SVC-specific approach (ii) enables both full and selective encryption, e.g., of the base layer only. SVC-specific encryption is based on own previous work, which is substantially extended and detailed in this paper. The adaptation MANE can now be an untrusted node; adaptation becomes a low-complexity process, avoiding full decryption and re-encryption of the content. This paper presents the first experimental comparison of these two approaches and evaluates whether multimedia-specific encryption can lead to performance and application benefits. Potential security threats and security properties of the two approaches in the IPTV and VoD scenario are elementarily analyzed. In terms of runtime performance on the MANE our SVC-specific encryption scheme significantly outperforms the SRTP-based approach. SVC-specific encryption is also superior in terms of induced end-to-end delays. The performance can even be improved by selective application of the SVC-specific encryption scheme. The results indicate that efficient adaptation of SVC-encrypted content on low-end, untrusted network devices is feasible.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.