Computer Science ›› 2022, Vol. 49 ›› Issue (1): 314-320.doi: 10.11896/jsjkx.201100089
• Information Security • Previous Articles Next Articles
LIANG Jian, HE Jun-hui
CLC Number:
[1]TABASH F K,IZHARUDDIN M.Encryption techniques forH.264/AVC videos:A literature review[J].Journal of Information Security and Applications,2019,45(APR.):20-34. [2]BOHO A,WALLENDAEL G V,DOOMS A,et al.End-to-end security for video distribution[J].IEEE Signal Processing Ma-gazine,2013,30(2):97-107. [3]AHN J,SHIM H J,JEON B,et al.Digital VideoScramblingMethod Using Intra Prediction Mode[C]//Conference on Advances in Multimedia Information Processing-PCM.2004:386-393. [4]LI Y,LIANG L,SU Z,et al.A New Video Encryption Algorithm for H.264[C]//IEEE International Conference on Information,2005:1121-1124. [5]KHLIF N,DAMAK T,KAMMOUN F,et al.Motion vectorssigns encryption for H.264/AVC[C]//IEEE International Conference on Advanced Technologies for Signal & Image Proces-sing,2014:1-6. [6]SU P C,HSU C W,WU C Y.A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting[J].Multimedia Tools & Applications,2011,52(2/3):529-549. [7]SHEN H,ZHUO L,ZHAO Y.An efficient motion referencestructure based selective encryption algorithm for H.264 videos[J].IET Information Security,2014,8(3):199-206. [8]WANG Y,O'NEILL M,KURUGOLLU F.Partial encryption by randomized zig-zag scanning for video encoding[C]//IEEE International Symposium on Circuits & Systems.2013:229-232. [9]DING X,DENG Y,YANG G,et al.Design of new scan orders for perceptual encryption of H.264/AVC videos[J].IET Information Security,2017,11(2):55-65. [10]DI X Q,WANG Y Z,LI J Q,et al.Video encryption methodbased on hyperchaos of quantum cellular neural network[J].Journal of Jilin University (Engineering and Technology Edition),2018,48(3):919-928. [11]BAI S,GUO Y,ZHAO B,et al.H.264 video perceptual encryption algorithm with controllable visual quality based on CABAC[J].Journal of Electronics and Information,2016,38(10):2582-2589. [12]WANG Y S,O'NEILL.A Tunable Encryption Scheme andAnalysis of Fast Selective Encryption for CAVLC and CABAC in H.264/AVC[J].IEEE Transactions on Circuits & Systems for Video Technology,2013,23(9):1476-1490. [13]PENG F,GONG X Q,LONG M,et al.A selective encryptionscheme for protecting H.264/AVC video in multimedia social network[J].Multimedia Tools and Applications,2017,76(3):3235-3253. [14]XU D,WANG R,SHI Y Q.Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution[J].IEEE Tran-sactions on Information Forensics and Security,2014,9(4):596-606. [15]KHLIF N,MASMOUDI A,KAMMOUN F,et al.Secure chao-tic dual encryption scheme for H.264/AVC video conferencing protection[J].IET Image Processing,2018,12(1):42-52. [16]LIU S,RHO S,JIFARA W,et al.A hybrid framework of data hiding and encryption in H.264/SVC[J].Discrete Applied Mathematics,2018,241:48-57. [17]MINEMURA K,WONG K.A novel sketch attack for H.264/AVC format-compliant encrypted video[J].IEEE Transactions on Circuits and Systems for Video Technology,2017,27(11):2309-2321. [18]WIEGAND T,SULLIVAN G J,BJONTEGAARD G,et al.Overview of the H.264/AVC video coding standard[J].IEEE Transactions on Circuits & Systems for Video Technology,2003,13(7):560-576. [19]LIU B,BAAS B M.Parallel AES Encryption Engines for Many-Core Processor Arrays[J].IEEE Transactions on Computers,2013,62(3):536-547. [20]SKARLATOS D,YAN M,GOPIREDDY B,et al.MicroScope:Enabling Microarchitectural Replay Attacks[C]//ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA).2019:318-331. [21]KARATZAS D,SHAFAIT F,UCHIDA S,et al.ICDAR 2013robust reading competition[C]//12th International Conference on Document Analysis and Recognition (ICDAR).2013:1484-1493. [22]WANG H,GAN W,HU S,et al.MCL-JCV:A JND-based H.264/AVC video quality assessment dataset[C]//IEEE International Conference on Image Processing (ICIP).2016:1509-1513. [23]OU T S,HUANG Y H,CHEN H H.SSIM-Based PerceptualRate Control for Video Coding[J].IEEE Transactions on Circuits and Systems for Video Technology,2011,21(5):682-691. [24]LI Z,AARON A,KATSAVOUNIDISI,et al.Toward A Practical Perceptual Video Quality Metric[EB/OL].(2016-06-06).http://techblog.netflix.com/2016/06/toward-practical-percep-tual-video.html. [25]CANNY J.A Computational Approach To Edge Detection[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1986,PAMI-8(6):679-698. [26]OTSU N.A threshold selection method from gray level histo-gram[J].IEEE Transactions on Systems,Man,and Cyberne-tics,1979,9(1):62-66. [27]WU Y,NOONAN J S,AGAIAN S.NPCR and UACI Randomness Tests for Image Encryption[J].Cyber Journals:Multidisciplinary Journals in Science and Technology,Journal of Selected Areas in Telecommunications,2011(April):31-38. |
[1] | JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22. |
[2] | GAO Zi-yan and WANG Yong. Load Balancing Strategy of Distributed Messaging System for Cloud Services [J]. Computer Science, 2020, 47(6A): 318-324. |
[3] | JIA Zhi-chun, LI Xiang, YU Zhan-lin, LU Yuan, XING Xing. QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model [J]. Computer Science, 2019, 46(9): 321-324. |
[4] | LIU Ming-cong, WANG Na, ZHOU Ning. Dependency Analysis Based Cloud Composition Service Information Flow Control Mechanism [J]. Computer Science, 2019, 46(4): 189-196. |
[5] | YANG Lu and YE Xiao-jun. Key Management Issues and Challenges in Cloud [J]. Computer Science, 2017, 44(3): 3-9. |
[6] | CHEN Hong-song, WANG Gang and FU Zhong-chuan. Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check [J]. Computer Science, 2016, 43(4): 140-144. |
[7] | SHEN Zhang-guo,LOU Jun-gang,MA Xiao-long and MA Wang-yong. Resource Allocation and Pricing Mechanism for Multi-type Resources of Cloud Market Based on Mechanism Theory [J]. Computer Science, 2014, 41(6): 59-62. |
[8] | WANG Jin-dong,WEI Bo,ZHANG Heng-wei and He Jia-jing. Research on Service Trust Evaluation Approach under Cloud Computing Environment [J]. Computer Science, 2014, 41(12): 38-42. |
[9] | LIANG Yuan-ning,CHEN Jian-liang and YE Li. Research on Reliability Optimal Method of Cloud Service [J]. Computer Science, 2013, 40(8): 129-135. |
[10] | LIU Zhi-zhong,WANG Zhi-jian,XUE Xiao and LU Bao-yun. Research on Cloud Service Composition Based on Culture Social Cognitive Optimization Algorithm [J]. Computer Science, 2013, 40(5): 103-106. |
[11] | ZHONG Wei-bo and MENG Yan-ru. Fast Multiple Reference Frame Selection Algorithm for H.264 Based on Temporal and Spatial Correlation [J]. Computer Science, 2013, 40(5): 93-96. |
[12] | ZHANG Yong-jun,SHI Dian-xi,XIAO Xi,WU Zhen-dong and DING Bo. Research and Implementation of Mobile Cloud Services Access Mechanism Based on Proxy [J]. Computer Science, 2013, 40(5): 58-61. |
[13] | . Survey on Embedded Urban Computing [J]. Computer Science, 2013, 40(3): 8-15. |
[14] | . Research on RFID Process Definition Language Based on Cloud Service [J]. Computer Science, 2012, 39(Z11): 114-118. |
[15] | . Stochastic Model Checking Composed Services in Cloud Computing Environment [J]. Computer Science, 2012, 39(10): 31-34. |
|