2007
DOI: 10.1007/s11042-007-0150-7
|View full text |Cite
|
Sign up to set email alerts
|

Efficient video encryption scheme based on advanced video coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
1

Year Published

2008
2008
2016
2016

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 10 publications
0
28
1
Order By: Relevance
“…In intra-coding the pixel data of a block can be either predicted on the basis of previous block data (in raster scan order) or transmitted directly (I PCM mode). The prediction mode has to be signalled in the bitstream, modification of the intra-prediction modes for encryption has been proposed in [1], [36], [7], [39], [37], [38], [40], [56], [62]. A visual example of a encryption of the intra-prediction modes is shown in figure 10(a).…”
Section: Table II Exponential Golomb Code Encryptionmentioning
confidence: 99%
See 4 more Smart Citations
“…In intra-coding the pixel data of a block can be either predicted on the basis of previous block data (in raster scan order) or transmitted directly (I PCM mode). The prediction mode has to be signalled in the bitstream, modification of the intra-prediction modes for encryption has been proposed in [1], [36], [7], [39], [37], [38], [40], [56], [62]. A visual example of a encryption of the intra-prediction modes is shown in figure 10(a).…”
Section: Table II Exponential Golomb Code Encryptionmentioning
confidence: 99%
“…The motion vector data are subject to further processing before entropy coding, i.e., motion vector prediction, which yields motion vector differences. The modification of motion vectors and motion vector difference data for encryption has been proposed frequently [36], [39], [30], [44], [74], [18], [28], [38], [42], [66], [37], [40], [62]. The schemes to modify the motion vectors and motion vector differences are diverse, e.g., many propose sign encryption [39], [74], [66], [62], while other encrypt the suffix of the exponential Golomb code [38], [40].…”
Section: Table II Exponential Golomb Code Encryptionmentioning
confidence: 99%
See 3 more Smart Citations