Blockchain-based multimedia content protection: Review and open challenges
In this paper, we provide a holistic survey of multimedia content protection applications in
which blockchain technology is being used. A taxonomy is developed to classify these …
which blockchain technology is being used. A taxonomy is developed to classify these …
A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications
In this modernistic age of innovative technologies like big data processing, cloud computing,
and Internet of things, the utilization of multimedia information is growing daily. In contrast to …
and Internet of things, the utilization of multimedia information is growing daily. In contrast to …
Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication
The rapid growth of multimedia communication systems has expanded the High-Efficiency
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …
Survey on decentralized fingerprinting solutions: Copyright protection through piracy tracing
Copyright protection is one of the most relevant challenges in the network society. This
paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source …
paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source …
Recompression of JPEG crypto-compressed images without a key
The rising popularity of social networks and cloud computing has greatly increased a
number of JPEG compressed image exchanges. In this context, the security of the …
number of JPEG compressed image exchanges. In this context, the security of the …
[HTML][HTML] Real-time chaotic video encryption based on multi-threaded parallel confusion and diffusion
D Jiang, T Chen, Z Yuan, W Li, H Wang, L Lu - Information Sciences, 2024 - Elsevier
Due to the strong correlation among adjacent pixels, image encryption schemes typically
perform multiple rounds of confusion and diffusion to protect images against various attacks …
perform multiple rounds of confusion and diffusion to protect images against various attacks …
Chaos based encryption technique for compressed h264/avc videos
MA El-Mowafy, SM Gharghory, MA Abo-Elsoud… - IEEE …, 2022 - ieeexplore.ieee.org
Saving videos streaming from the unlawful users became an urgent claim. Cryptography
and Steganography are the most important and indispensable processes to protect and …
and Steganography are the most important and indispensable processes to protect and …
Efficient HEVC selective stream encryption using chaotic logistic map
At present, the digital video encryption technology has become an interest research topic as
a result of very rapid evolution in the application of real-time video over the Internet. So this …
a result of very rapid evolution in the application of real-time video over the Internet. So this …
Toward fine‐grained access control and privacy protection for video sharing in media convergence environment
F Ahmed, L Wei, Y Niu, T Zhao, W Zhang… - … journal of intelligent …, 2022 - Wiley Online Library
Video streaming applications are rapidly proliferating, allowing users to browse, download,
and share videos through platforms such as YouTube, Netflix, and Amazon. Media content …
and share videos through platforms such as YouTube, Netflix, and Amazon. Media content …
[HTML][HTML] A robust VVC video encryption scheme based on the dynamical chaotification model
C Chen, X Wang, J Xu - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the considerable surge of video assets, the demand for video content security has
undergone substantial growth. Since the advent of H. 264/AVC and H. 265/HEVC, selective …
undergone substantial growth. Since the advent of H. 264/AVC and H. 265/HEVC, selective …