2010
DOI: 10.1016/j.cose.2009.06.004
|View full text |Cite
|
Sign up to set email alerts
|

A survey of video encryption algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
78
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 119 publications
(78 citation statements)
references
References 17 publications
0
78
0
Order By: Relevance
“…A variety of video encryption algorithms have been proposed in order to fulfill the specific requirements raised by the peculiarities of video communication. However, the design of fast video encryption algorithm with a high security level remains, therefore there is still need to evolve a fast method to offer good level of security for video transmission [10]. Network is too vulnerable to security issues because during the designing of network architecture security has not taken in to consideration to counter the threats.…”
Section: Proposed Workmentioning
confidence: 99%
“…A variety of video encryption algorithms have been proposed in order to fulfill the specific requirements raised by the peculiarities of video communication. However, the design of fast video encryption algorithm with a high security level remains, therefore there is still need to evolve a fast method to offer good level of security for video transmission [10]. Network is too vulnerable to security issues because during the designing of network architecture security has not taken in to consideration to counter the threats.…”
Section: Proposed Workmentioning
confidence: 99%
“…The value of video data in entertainment application is associated with video quality and timeliness. In entertainment industry high quality video is priced and requires an authorized access , while low quality versions may free , to stimulate the user to purchase high quality version [2]. The verification of source and receiver identities is needed for entertainment applications as well as personalized video applications and this is achieved using digital signatures or certificates.…”
Section: Security Issues In Video Transmissionmentioning
confidence: 99%
“…Second, besides the I picture, motion vectors are also coded. Of course, this method is used for military and high security usages [11].…”
Section: Video Picturesmentioning
confidence: 99%
“…9 that sign encryption of AC coefficients only reduces quality of the I frames and is utilizable for decreasing the frame resolution in commercial applications. I frame scan be recovered by statistical attacks and the cipher text-only attack in this method [11,[21][22][23].…”
Section: Sign Encryption Of Dct Transformmentioning
confidence: 99%
See 1 more Smart Citation