期刊文献+

基于CAC的数字视频安全编码研究

Study of CAC-based Secure Coding of Digital Video
下载PDF
导出
摘要 对于视频压缩领域,基于上下文的自适应编码(CAC)是一类新出现的高效熵编码方法。为了对数字视频进行实时安全编码,提出了一种基于CAC的数字视频安全编码方案,并首先建立了以CAC安全编码器为核心的安全编码链,然后给出了基于上下文的自适应二进制算术安全编码(CABASC)和基于上下文的自适应变长安全编码(CAVLSC)两种安全编码操作。实验结果表明,该方案具有较好的安全性、实时性和软件易实现性,可作为进一步研究CAC安全编码的基础。 Context-based adaptive coding (CAC) is a class of new high-efficient entropy coding techniques for video compression. In this paper, a CAC-based scheme is presented to achieve realtime secure coding for digital video, and a secure coding chain is built based on CAC secure coder. Two kinds of secure coding operations, including context-based adaptive binary arithmetic secure coding (CABASC) and context-based adaptive variable length secure coding (CAVLSC) , are given. The experimental results show that this scheme has significant improvement on security, real-time performance and flexibility of software implementation. These properties make it a sound foundation for further research on CAC secure coding.
出处 《中国图象图形学报》 CSCD 北大核心 2010年第1期1-6,共6页 Journal of Image and Graphics
基金 国家自然科学基金项目(60474035) 安徽省自然科学基金项目(070412035)
关键词 安全编码 视频加密 基于上下文的自适应二进制算术安全编码 基于上下文的自适应变长安全编码 secure coding, video encryption, context-based adaptive binary arithmetic secure coding(CABASC) , contextbased adaptive variable length secure coding(CAVLSC)
  • 相关文献

参考文献15

  • 1Johnson M, Ishwar P, Prabhakaran V M, et al. On compressing encrypted data [ J ]. IEEE Transactions on Signal Processing, 2004,52(10): 2992-3006. 被引量:1
  • 2Schonberg D, Draper S C, Ramchandran K. On Blind Compression of Encrypted Data Approaching the Source Entropy Rate [EB/OL]. www. eecs. berkeley, edu/- dschonbe/pubs/eusipco2k5, pdf, 2005. 被引量:1
  • 3袁春,钟玉琢,贺玉文.基于混沌的视频流选择加密算法[J].计算机学报,2004,27(2):257-263. 被引量:42
  • 4Wang Ci, Yu Hong-bin, Zheng Meng. A DCT-based MPEG-2 transparent scrambling algorithm [J]. IEEE Transactions on Consumer Electronics, 2003,49 (4) : 1208-1213. 被引量:1
  • 5Li Yuan, Liang Li-wei, Su Zhao-pin, et al. A new video encryption algorithm for H. 264 [ C]//Proceedings of IEEE International Conference on Information, Communications, and Signal Processing. Bangkok, Thailand:IEEE Press,2005: 1121-1124. 被引量:1
  • 6Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video [J].IEEE Transactions on Multimedia, 2003,5 (1): 118-129. 被引量:1
  • 7Ahn J, Shim H J, Jeon B, et al. Digital video scrambling method using intra prediction mode [ C]//Proceedings of the 5th Pacific- Rim Conference on Multimedia. Tokyo, Japan, 2004: 386-393. 被引量:1
  • 8Spinsante S, Chiaraluce F, Gambi E. Masking Video Information by Partial Encryption of H. 264/AVC Coding Parameters [ EB/ OL]. www. epf. ch/hsftp/EUSIPCO2005/defevent/papers/cr1338. pdf, 2005. 被引量:1
  • 9Mao Y, Wu M. A joint signal processing and cryptographic approach to multimedia encryption [ J ]. IEEE Transactions on Image Processing, 2006,15 ( 7 ) : 2061 - 2075. 被引量:1
  • 10Wu C, Kuo C J. Design of integrated multimedia compression and eneryption systems [ J]. IEEE Transactions on Multimedia, 2005, 7(5): 828-839. 被引量:1

二级参考文献23

  • 1包先雨,蒋建国,李援.一种适合于H·264实时视频传输的新型加密方案[J].电子学报,2006,34(11):2099-2102. 被引量:6
  • 2Tang L.. Methods for encrypting an decrypting mpeg video data efficiently. In: Proceedings of ACM Multimedia'96, Boston United States, 1996, 219~229 被引量:1
  • 3Shi C.,Bhargava B.. An efficient MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Multimedia Conference, Bristol, United Kingdom, 1998, 9: 381~386 被引量:1
  • 4Alattar A.M., Al-Regib G.I.. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceeding of ICIP, 1999, 4: 256~260 被引量:1
  • 5Wu Xiao-Ling, Moo Peter W.. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficient. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999, 2: 908~912 被引量:1
  • 6Romeo, Romolotti G., Mattavelli M., Mlynek D.. Cryptosystem architectures for very high throughput multimedia encryption: The RPK solution. In: Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, Pafos, Cyprus, 1999, 261~264 被引量:1
  • 7Silva C.P.,Young A.M.. Introduction to chaos-based communications and signal processing. IEEE Proceedings of Aerospace, 2000, 1: 279~299 被引量:1
  • 8Robert Matthews. On the derivation of a "chaotic" encryption algorithm.Cryptologia. 1989, 8(1):29~41 被引量:1
  • 9Wheeler D.D., Matthews R.A.J. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia, 1991, 15(2): 140~152 被引量:1
  • 10钟玉琢 乔秉新 祁卫.[D].北京:清华大学,1997. 被引量:1

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部