2009
DOI: 10.1016/j.image.2009.02.004
|View full text |Cite
|
Sign up to set email alerts
|

Adaptation–aware encryption of scalable H.264/AVC video for content security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…Even if the content is additionally encrypted, adaptation still can be done in the same way by simply discarding packets. This principle has already worked in IP-based networks as shown in [4,10]. Scalable content enables the design of an inherent ICN adaptation mechanism similar to network-inherent caching.…”
Section: Adaptation Through Scalable Contentmentioning
confidence: 98%
“…Even if the content is additionally encrypted, adaptation still can be done in the same way by simply discarding packets. This principle has already worked in IP-based networks as shown in [4,10]. Scalable content enables the design of an inherent ICN adaptation mechanism similar to network-inherent caching.…”
Section: Adaptation Through Scalable Contentmentioning
confidence: 98%
“…Moreover, these techniques do not consider the adaptability since they do not address encrypting scalable video contents. In contrast, the techniques reported in [11]- [13] ( [12] will be used throughout this paper) attempt to implement comprehensive security while retaining the in-network adaptability. Naturally, these techniques encrypt the payloads of each NAL unit while keeping the header information plain so that any in-network adaptation node can treat them as if they are not encrypted.…”
Section: B Content Protection For Adaptationmentioning
confidence: 99%
“…As the name implies, a trusted AE is the one that can make use of the security keys provided to it for decrypting a secured content, so as to be able to perform a number of both structural and signal-level content adaptation operations on the audiovisual media streams. With a similar analogy, an untrusted AE is a content adapting engine, with which a security key cannot be shared, and thus the content adaptation operation should be performed on the media stream blindly (that is to say, without decrypting the content) [12].…”
Section: Proposed Architecture For the Adaptation Of Secured Conmentioning
confidence: 99%
See 1 more Smart Citation
“…The approaches of [5][6][7][8] have been proposed for SVC encryption, which all preserve the NALU (network abstraction layer units) structure and encrypt the NALU payload directly.…”
Section: Introductionmentioning
confidence: 99%