Securecam: Selective detection and encryption enabled application for dynamic camera surveillance videos
Using dynamic surveillance cameras for security has significantly increased the privacy
concerns for captured individuals. Malicious users may misuse these videos by performing …
concerns for captured individuals. Malicious users may misuse these videos by performing …
Data hiding in encrypted H. 264/AVC video streams by codeword substitution
Digital video sometimes needs to be stored and processed in an encrypted format to
maintain security and privacy. For the purpose of content notation and/or tampering …
maintain security and privacy. For the purpose of content notation and/or tampering …
A tunable selective encryption scheme for H. 265/HEVC based on chroma IPM and coefficient scrambling
Designing selective encryption (SE) schemes for H. 265/HEVC has been attracted much
attention with the advent of H. 265/HEVC codec in the past two decades. However, the most …
attention with the advent of H. 265/HEVC codec in the past two decades. However, the most …
Extended selective encryption of H. 264/AVC (CABAC)-and HEVC-encoded video streams
B Boyadjis, C Bergeron… - … on circuits and …, 2016 - ieeexplore.ieee.org
This paper proposes an extended selective encryption (SE) method for both H.
264/advanced video coding (AVC)(CABAC) and High Efficiency Video Coding (HEVC) …
264/advanced video coding (AVC)(CABAC) and High Efficiency Video Coding (HEVC) …
MuLViS: Multi-level encryption based security system for surveillance videos
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event
detection and autonomous video analytics. Video captured by surveillance cameras in real …
detection and autonomous video analytics. Video captured by surveillance cameras in real …
An efficient chaos pseudo-random number generator applied to video encryption
H Xu, X Tong, X Meng - Optik, 2016 - Elsevier
Traditional cipher systems are not appropriate for video encryption due to the high
computation overhead. Video encryption must take account of the trade-off of both data …
computation overhead. Video encryption must take account of the trade-off of both data …
Cryptography-based secure data storage and sharing using HEVC and public clouds
Mobile devices are widely used for uploading/downloading media files such as audio, video
and images to/from the remote servers. These devices have limited resources and are …
and images to/from the remote servers. These devices have limited resources and are …
An ROI privacy protection scheme for H. 264 video based on FMO and chaos
F Peng, X Zhu, M Long - IEEE transactions on information …, 2013 - ieeexplore.ieee.org
With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely
used on many occasions. However, abuse of surveillance video may result in the leakage of …
used on many occasions. However, abuse of surveillance video may result in the leakage of …
Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams
This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a
method to auto-detect three different confidentiality levels for videos streamed from …
method to auto-detect three different confidentiality levels for videos streamed from …
Lightweight cipher for H. 264 videos in the Internet of multimedia things with encryption space ratio diagnostics
Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such
as that arising from video surveillance, is of heightened concern. This leads to the encryption …
as that arising from video surveillance, is of heightened concern. This leads to the encryption …