2003 International Symposium on VLSI Technology, Systems and Applications. Proceedings of Technical Papers. (IEEE Cat. No.03TH8
DOI: 10.1109/ccnc.2004.1286915
|View full text |Cite
|
Sign up to set email alerts
|

Selective encryption for consumer applications

Abstract: Selective encryption is a technique to save computational complexity or enable interesting new system functionality by only encrypting a portion of a compressed bitstream while still achieving adequate security. Although suggested in a number of specific cases, selective encryption could be much more widely used in consumer electronic applications ranging from mobile multimedia terminals through digital cameras were it subjected to a more thorough security analysis. We describe selective encryption and develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…Our work is therefore also closely related to research on security and performance metrics which can characterize different security configurations. Lookabaugh and Sicker [19] describe the security obtained when selective encryption is applied on a scalar quantizer. Their analysis is based on the classical work of Shannon [20], where entropy is used as a measure of security.…”
Section: Introductionmentioning
confidence: 99%
“…Our work is therefore also closely related to research on security and performance metrics which can characterize different security configurations. Lookabaugh and Sicker [19] describe the security obtained when selective encryption is applied on a scalar quantizer. Their analysis is based on the classical work of Shannon [20], where entropy is used as a measure of security.…”
Section: Introductionmentioning
confidence: 99%
“…Image encryption and decryption are particularly timeconsuming [1], hence justifying a compromise solution where image data are only selectively encrypted to reduce the total computational complexity. This concept proves to be effective and efficient considering that the complex interdependence structure among image compression bit streams [1] can be completely hidden by partial encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Image encryption and decryption are particularly timeconsuming [1], hence justifying a compromise solution where image data are only selectively encrypted to reduce the total computational complexity. This concept proves to be effective and efficient considering that the complex interdependence structure among image compression bit streams [1] can be completely hidden by partial encryption. However, there have been very few papers in literature addressing the correlations among such partial encryption methods and the associated wireless transmission approaches, not to mention the corresponding efforts to meet the resource constraints for sensor networks.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the fact that encryption and decryption are unfortunately slow, while image data are often in huge amount, it is impractical to encrypt the whole body of image data for real-time signal processing applications in WSN [2]. To cope with this situation, in the first step, we propose a novel component based partial (or selective) encryption approach to achieve image security as well as fast speed of encryption and decryption for in-network processing.…”
Section: Introductionmentioning
confidence: 99%