Abstract
We discuss techniques for selective encryption of visual data. After introducing a classification of application scenarios for selective encryption we derive conditions for the sensible employment of such an approach in each scenario. Finally, we propose and evaluate experimentally several selective encryption approaches for a specific lossless application scenario.
This artificial name represents a group of students working on this project in the framework of the multimedia 1 laboratory (winterterm 2001/2002).
This work has been partially supported by the Austrian Science Fund, project no. 15170
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35612-9_23
Chapter PDF
Similar content being viewed by others
References
A. M. Alattar, G. I. Al-Regib, and S. A. Al-Semari. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP ‘89). IEEE Signal Processing Society, 1999.
H. Cheng and X. Li. Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48 (8): 2439–2451, 2000.
Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal G. Shamoon. Secure spread spectrum watermarking for multimedia. In Proceedings of the IEEE International Conference on Image Processing, ICIP ‘87, volume 6, pages 16731687, Santa Barbara, California, USA, October 1997.
Raphaël Grosbois, Pierre Gerbelot, and Touradj Ebrahimi. Authentication and access control in the JPEG 2000 compressed domain. In A.G. Tescher, editor, Applications of Digital Image Processing XXIV, volume 4472 of Proceedings of SPIE, San Diego, CA, USA, July 2001.
Thomas Kunkelmann. Applying encryption to video communication. In Proceedings of the Multimedia and Security Workshop at ACM Multimedia ‘88, pages 41–47, Bristol, England, September 1998.
Benoit M. Macq and Jean-Jacques Quisquater. Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83 (6): 944–957, June 1995.
P. Meerwald and A. Uhl. A survey of wavelet-domain watermarking algorithms. In Ping Wah Wong and Edward J. Delp, editors, Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, January 2001. SPIE.
A. Pommer and A. Uhl. Wavelet packet methods for multimedia compression and encryption. In Proceedings of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing,pages 1–4, Victoria, Canada, August 2001. IEEE Signal Processing Society.
A. Pommer and A. Uhl. Selective encryption of wavelet packet subb and structures for obscured transmission of visual data. In Proceedings of the 3rd IEEE Benelux Signal Processing Symposium (SPS 2002),pages 25–28, Leuven, Belgium, March 2002. IEEE Benelux Signal Processing Chapter.
Lintian Qiao and Klara Nahrstedt. Comparison of MPEG encryption algorithms. International Journal on Computers and Graphics (Special Issue on Data Security in Image Communication and Networks), 22 (3): 437–444, 1998.
C. Shi and B. Bhargava. A fast MPEG video encryption algorithm. In Proceedings of the ACM Multimedia 1998, pages 81–88, Boston, USA, 1998.
L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the ACM Multimedia 1996, pages 219–229, Boston, USA, November 1996.
T. Uehara, R. Safavi-Naini, and P. Ogunbona. Securing wavelet compression with random permutations. In Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, pages 332–335, Sydney, December 2000. IEEE Signal Processing Society.
S. Wong, L. Zaremba, D. Gooden, and H.K. Huang. Radiologic image compression — a review. Proceedings of the IEEE, 83 (2): 194–219, 1995.
Wenjun Zeng and Shawmin Lei. Efficient frequency domain video scrambling for content access control. In Proceedings of ACM Multimedia 1999, pages 285–293, Orlando, FL, USA, November 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Skrepth, C.J., Uhl, A. (2002). Selective Encryption of Visual Data. In: Jerman-Blažič, B., Klobučar, T. (eds) Advanced Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 100. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35612-9_16
Download citation
DOI: https://doi.org/10.1007/978-0-387-35612-9_16
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4405-7
Online ISBN: 978-0-387-35612-9
eBook Packages: Springer Book Archive