2020
DOI: 10.1109/tcsvt.2019.2924910
|View full text |Cite
|
Sign up to set email alerts
|

A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(24 citation statements)
references
References 34 publications
0
21
0
Order By: Relevance
“…Several authors have utilized the context-based adaptive binary arithmetic coding (CABAC) in their encryption systems [19], [29], [30]. The authors of [29] have utilized the coefficient and the intra prediction mode (IPM) to implement a tunable system to increase edge loss and visual distortion. Initially, the AES-CTR (Counter-mode encryption) is used to generate a random sequence number.…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Several authors have utilized the context-based adaptive binary arithmetic coding (CABAC) in their encryption systems [19], [29], [30]. The authors of [29] have utilized the coefficient and the intra prediction mode (IPM) to implement a tunable system to increase edge loss and visual distortion. Initially, the AES-CTR (Counter-mode encryption) is used to generate a random sequence number.…”
Section: Related Studiesmentioning
confidence: 99%
“…The outlines of destructive and constructive obstruction displayed as dark and bright dots in digital videos and images have resulted from the effect of the speckle noise [29]. Figure 8 illustrates the outcomes of enciphered and deciphered HEVC frames of the speckle noise study with diverse variance rates of 0.02, 0.04, and 0.06.…”
Section: B: Speckle Noise Analysismentioning
confidence: 99%
“…When the parameters are set as a = 1, b = 1.98, c = 1.0 and the initial condition is designated to be x 0 = 0.1, y 0 = 0.1, map (1) is chaotic, as is diagrammed in Fig.1 by the phase portrait and time trajectories. The fixed points of map (1) can be calculated by the transformed equations x n = ay 2 n and y n = by n − cx n y n . It is well known that map (1) has one fixed point P 0 = (0, 0) when b ≤ 1; and map (1) has three fixed point when b >1, depicted as P 0 = (0, 0),…”
Section: The Two-dimensional Robust Chaotic Map a Model Descriptionmentioning
confidence: 99%
“…With the rapid development of network communication, the data security and encryption have been paid more and more attention by engineers and scientists [1], [2]. Compared with traditional schemes, chaotic information encryption technology is suggested to have higher security and rapidity [3], [4].…”
Section: Introductionmentioning
confidence: 99%
“…Random number generators (RNGs) are widely used in many fields. For example, in asymmetric (public key) algorithms such as RSA, DSA and Diffie-Hellman, they are used to generate public or private keys and generate keys in symmetric and hybrid cryptosystems [11]- [14].…”
Section: Introductionmentioning
confidence: 99%