Securecam: Selective detection and encryption enabled application for dynamic camera surveillance videos

I Aribilola, MN Asghar, N Kanwal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Using dynamic surveillance cameras for security has significantly increased the privacy
concerns for captured individuals. Malicious users may misuse these videos by performing …

Data hiding in encrypted H. 264/AVC video streams by codeword substitution

D Xu, R Wang, YQ Shi - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Digital video sometimes needs to be stored and processed in an encrypted format to
maintain security and privacy. For the purpose of content notation and/or tampering …

A tunable selective encryption scheme for H. 265/HEVC based on chroma IPM and coefficient scrambling

F Peng, X Zhang, ZX Lin, M Long - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Designing selective encryption (SE) schemes for H. 265/HEVC has been attracted much
attention with the advent of H. 265/HEVC codec in the past two decades. However, the most …

Extended selective encryption of H. 264/AVC (CABAC)-and HEVC-encoded video streams

B Boyadjis, C Bergeron… - … on circuits and …, 2016 - ieeexplore.ieee.org
This paper proposes an extended selective encryption (SE) method for both H.
264/advanced video coding (AVC)(CABAC) and High Efficiency Video Coding (HEVC) …

MuLViS: Multi-level encryption based security system for surveillance videos

A Shifa, MN Asghar, M Fleury, N Kanwal… - Ieee …, 2020 - ieeexplore.ieee.org
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event
detection and autonomous video analytics. Video captured by surveillance cameras in real …

An efficient chaos pseudo-random number generator applied to video encryption

H Xu, X Tong, X Meng - Optik, 2016 - Elsevier
Traditional cipher systems are not appropriate for video encryption due to the high
computation overhead. Video encryption must take account of the trade-off of both data …

Cryptography-based secure data storage and sharing using HEVC and public clouds

M Usman, MA Jan, X He - Information Sciences, 2017 - Elsevier
Mobile devices are widely used for uploading/downloading media files such as audio, video
and images to/from the remote servers. These devices have limited resources and are …

An ROI privacy protection scheme for H. 264 video based on FMO and chaos

F Peng, X Zhu, M Long - IEEE transactions on information …, 2013 - ieeexplore.ieee.org
With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely
used on many occasions. However, abuse of surveillance video may result in the leakage of …

Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams

A Shifa, M Naveed Asghar, A Ahmed… - Journal of Ambient …, 2020 - Springer
This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a
method to auto-detect three different confidentiality levels for videos streamed from …

Lightweight cipher for H. 264 videos in the Internet of multimedia things with encryption space ratio diagnostics

A Shifa, MN Asghar, S Noor, N Gohar, M Fleury - Sensors, 2019 - mdpi.com
Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such
as that arising from video surveillance, is of heightened concern. This leads to the encryption …