Proceedings of the 11th ACM Workshop on Multimedia and Security 2009
DOI: 10.1145/1597817.1597846
|View full text |Cite
|
Sign up to set email alerts
|

Selective encryption of the MC EZBC bitstream for DRM scenarios

Abstract: Universal Multimedia Access (UMA) calls for solutions where content is created once and subsequently adapted to given requirements. With regard to UMA and scalability, which is required often due to a wide variety of end clients, the best suited codecs are wavelet based (like the MC-EZBC) due to their inherent high number of scaling options. However, we do not only want to adapt the content to given requirements but we want to do so in a secure way. Through DRM we can ensure that the actual content is safe and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Fig. 7 illustrates the performance of the LFBVS metric on the silent sequence when encryption according to [24] is applied in comparison to white noise.…”
Section: Overview Of Security Metricsmentioning
confidence: 99%
See 2 more Smart Citations
“…Fig. 7 illustrates the performance of the LFBVS metric on the silent sequence when encryption according to [24] is applied in comparison to white noise.…”
Section: Overview Of Security Metricsmentioning
confidence: 99%
“…In order to test whether a security metric can operate in the encrypted domain a number of well known video sequences have been encrypted for three target qualities, utilizing EZBC encryption methods described in [24]. To generate the different target qualities the selective encryption was applied to either all I-frames (low quality), low frequency bands of all frames (medium quality), and high frequency bands of all frames (high quality).…”
Section: Application Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, we have to take into account replacement attacks [15,16,17,18], which can reduce the visual distortion by replacing encrypted bitstream elements by elements which are statistically more likely to not introduce an error. Since the sign distribution is uniform, the easiest attack is to set the coefficients for which the signs are encrypted to zero.…”
Section: Discussionmentioning
confidence: 99%
“…Full encryption cannot suitable for this case, because only some parts of the data are secret. As a matter of fact, selective encryption is a proven technology in the field of secure multimedia communication [6]. The purpose of selective encryption is just to encrypt certain portions of the message with less overhead consumption.…”
Section: Introductionmentioning
confidence: 99%