2011
DOI: 10.1109/tcsvt.2011.2129090
|View full text |Cite
|
Sign up to set email alerts
|

Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
87
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 142 publications
(89 citation statements)
references
References 23 publications
1
87
0
1
Order By: Relevance
“…In [39] there is an analysis of a system for H.264/AVC I-frame only SE which also brings low computation, low bitrate overhead and decoder format compliance after encryption, though no analysis of the video distortion or image structural distortion arising from partial encryption was made in [39]. As another example employing CABAC-based encryption in [40] only I-and P-frames are selectively encrypted. The underlying motivation behind such schemes is that even if the bitstream is captured by packet 'sniffer' software or stored by some means at the receiver device successful decoding of the P-or B-frame compression data depends on being able to decode the corresponding I-frame within a Group of Pictures (GOP) [41].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [39] there is an analysis of a system for H.264/AVC I-frame only SE which also brings low computation, low bitrate overhead and decoder format compliance after encryption, though no analysis of the video distortion or image structural distortion arising from partial encryption was made in [39]. As another example employing CABAC-based encryption in [40] only I-and P-frames are selectively encrypted. The underlying motivation behind such schemes is that even if the bitstream is captured by packet 'sniffer' software or stored by some means at the receiver device successful decoding of the P-or B-frame compression data depends on being able to decode the corresponding I-frame within a Group of Pictures (GOP) [41].…”
Section: Methodsmentioning
confidence: 99%
“…The proposal of [46] also incurs a bit-rate overhead. The computational cost of the schemes described in both [24] and [40] is high because they used AES-based encryption of the selected parameters. Thus, the comparison of Table 10 shows that Scheme 1 is efficient with low computational cost and no bandwidth overhead.…”
Section: Security Analysismentioning
confidence: 99%
“…As shown in " Fig. 1", an encryption algorithm could be placed before, during, or after the compression process [2] [3]. The video encryption algorithms placed before or after compression are called encryption algorithms independent of the compression while those executed during the compression process are called encryption algorithms joint compression.…”
Section: Introductionmentioning
confidence: 99%
“…That is to say the bitrate overhead increases, while the video quality remains the same. Another promising technique applied in [7] to non-scalable H.264/AVC also uses SE on the codewords/bin-strings of the entropy coder. This has the advantage of preserving the bitrate, being standard compliant and involving negligible overhead.…”
Section: Introductionmentioning
confidence: 99%