We describe a novel multimedia security framework based on a modification of the arithmetic coder, which is used by most international image and video coding standards as entropy coding stage. In particular, we propose a randomized arithmetic coding paradigm, which achieves encryption by randomly swapping the intervals of the least and most probable symbols in arithmetic coding; moreover, we describe an implementation tailored to the JPEG 2000 standard. The proposed approach turns out to be robust towards attempts to discover the key, and allows very flexible procedures for insertion of redundancy at the codeblock level, allowing to perform total and selective encryption, conditional access, and encryption of regions of interest
Increased demand of multimedia data over heterogeneous networks has led to the requirement for incre...
This thesis examines a variety of arithmetic coding encryption schemes proposed in existing literatu...
In this paper, we study the overall performance of two main forms of secret entropy coding – secret ...
International audienceThe increasing usage of personal multimedia devices such as mobiles phones, sm...
Abstract—Two approaches for integrating encryption with multimedia compression systems are studied i...
Abstract: The current network scenario demands secure and fast communication of information. This re...
With the widespread use of multimedia content, the multimedia security and digital rights management...
Abstract—Encryption is one of the fundamental technolo-gies that is used in digital rights managemen...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
International audienceThe impact of confidentiality and privacy breaches are more pronounced when de...
This work investigates the problem of efficient multimedia data encryption. A novel methodology is p...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
Actuellement, nous vivons dans une société numérique. L'avènement de l'Internet et l'arrivée du mult...
Abstract—Arithmetic coding is increasingly being used in upcoming image and video compression standa...
To enhance the security of double random phase encoding, a kind of amplitude scrambling operation is...
Increased demand of multimedia data over heterogeneous networks has led to the requirement for incre...
This thesis examines a variety of arithmetic coding encryption schemes proposed in existing literatu...
In this paper, we study the overall performance of two main forms of secret entropy coding – secret ...
International audienceThe increasing usage of personal multimedia devices such as mobiles phones, sm...
Abstract—Two approaches for integrating encryption with multimedia compression systems are studied i...
Abstract: The current network scenario demands secure and fast communication of information. This re...
With the widespread use of multimedia content, the multimedia security and digital rights management...
Abstract—Encryption is one of the fundamental technolo-gies that is used in digital rights managemen...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
International audienceThe impact of confidentiality and privacy breaches are more pronounced when de...
This work investigates the problem of efficient multimedia data encryption. A novel methodology is p...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
Actuellement, nous vivons dans une société numérique. L'avènement de l'Internet et l'arrivée du mult...
Abstract—Arithmetic coding is increasingly being used in upcoming image and video compression standa...
To enhance the security of double random phase encoding, a kind of amplitude scrambling operation is...
Increased demand of multimedia data over heterogeneous networks has led to the requirement for incre...
This thesis examines a variety of arithmetic coding encryption schemes proposed in existing literatu...
In this paper, we study the overall performance of two main forms of secret entropy coding – secret ...