Video Encryption Technology and Application ( Media and Communications - Technologies, Policies and Challenges )

Publication series :Media and Communications - Technologies, Policies and Challenges

Author: Zhengquan Xu;Jing Sun  

Publisher: Nova Science Publishers, Inc.‎

Publication year: 2016

E-ISBN: 9781616687342

Subject: L No classification

Keyword: 暂无分类

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Video Encryption Technology and Application

Chapter

2.3. Overview of Video Coding

2.4. Digital Video Encryption Algorithm

2.4.1. Direct Encryption

2.4.2. Selective Encryption

I-Frame and I Block of the Frame Encryption

Head Information Encryption

DCT Coefficient Encryption

2.4.3. Chaos Encryption

Video Encryption Algorithms with Format Compliance

3.1. Definition and Significance of Format Compliance

3.2. Principles for Format Compliance

3.2.1. Related Definition

3.2.2. Principles for Video Encryption with Format Compliance

3.2.3. Principles for Video Code Element Encryption

3.2.3.1. Fixed-Length Code Element Encryption

3.2.3.2. Variable-Length Code

Element Encryption

3.2.3.3. Code Element Context Encryption

3.2.4. Summary of Principles and Means

3.3. Video Encryption with Format Compliance

3.3.1. VLC Encryption with Random Sequence

3.3.1.1. Principle of Randomly Change Codewords

Table Algorithms (RCTA)

3.3.1.2. Making Reference Code Table by Grouping Code Word

3.3.1.3. Encryption and Decryption Algorithms

3.3.1.4. A Random Sequence Generation

Algorithm of Variable Mode

3.3.1.5. Experiments and Analysis

3.3.2. Video Encryption Algorithm Based on Spatial Shuffling

3.3.2.1. Pseudo-Random Sequence and Encryption Shuffling Table

3.3.2.1.1. Shuffling Table Generation Based on Pseudo-Random Sequence

3.3.2.1.2. Shuffling Table Application

3.3.2.2. Video Encryption Approach and Critical Blocks of Bitstreams

3.3.2.2.1. Video Encryption Approach

3.3.2.2.2. Critical Data Blocks of Bitstreams

3.3.2.3. Security Level Design and Analysis

3.3.2.3.1. Security Level Design

3.3.2.3.2. Resultant Images of Different Security Level

3.3.2.3.3. Performance of Different Security Level

3.3.2.4. Performance Analysis

3.3.3. H.264/AVC Video Encryption Algorithm

3.3.3.1. Self-Adaptive Selective Encryption Algorithm for H.264/AVC

3.3.3.1.1. Encryption of Quantization Step

3.3.3.1.2. Encryption of Predictive Code Word

3.3.3.1.3. Encryption of Motion Vector Difference

3.3.3.1.4. Encryption of Residual Coefficient Relevant Information

3.3.3.1.5. Encryption of I-PCM Mode Macroblock

3.3.3.2. Residual Block Scrambling Algorithm for H.264/AVC

3.3.3.2.1. H.264/AVC Residual Values Coding

3.3.3.2.2. The Basic Principle of Algorithm

3.3.3.2.3. Algorithm Implementation

3.3.3.3. Combination of Two Encryption Algorithms: AVCEA

3.3.3.4. Performance Analysis

3.3.3.4.1. Visual Security

3.3.3.4.2. Semantic Format Compatibility

3.3.3.4.3. Security Analysis

3.3.3.4.4. Computational Complexity

3.3.3.4.5. Affection to the Size of Coding Stream

3.4.4. Video Encryption Based on Chaos

3.4.4.1. Chaotic Sequences Generator Based on Coupled Logistic Maps

3.4.4.2. Video Encryption Scheme and Experiment

Visual Security Assessments for Visual Media

4.1. Definition

4.2. Visual Security Assessment Methods

4.2.1. Assessment Based on Cryptographic Analysis

4.2.2. Assessment Based on Subjective Evaluation

4.2.3. Assessment Based on Video Quality Assessment

4.2.4. Visual Security Assessment vs Video Quality Assessment

4.3. Introduce of Three Kinds of Objective Visual Security Assessments

4.3.1. Method Based on Structure Distortion

4.3.2. Method Based on Local Image Entropy

4.3.3. Method Based on Spatial Correlation

4.3.4. Results and Analysis

Content-Based Multi-Level Encryption and Multi-Level Authorization

5.1. Definition and Significance

5.1.1. Concept of Content-Based

5.1.2. Concept of Multi-Level Authorization

5.1.3. Advantage of Content-Based Multi-Level Authorization

5.2. Content-Based Multi-Level Encryption and Authorization Method

5.2.1. Theoretical Model of Content-Based

Multi-Level Authorization

5.2.2. Extraction of Key Information Based on Content

5.2.2.1. Selection of Encryption Point

5.2.2.2. Analysis of Key Information

5.2.2.2.1. DC Coefficient and AC Coefficient

5.2.2.2.2. Motion Vector (MV)

5.2.2.2.3. Other Key Information

5.2.3. Frameworks of Multi-Level Authorization Protection of Visual Media

5.3. Multi-Level Encryption and Authorization Model Based on Remote Sensing Images

5.3.1. Data Characteristics of Remote Sensing Image and Extraction of Confidential Region

5.3.2. Framework of Multi-Level Encryption and Authorization Model of Remote Sensing Images

5.3.3. Experiment and Analysis

Conclusion

References

Index

The users who browse this book also browse


No browse record.