An efficient motion reference structure based selective encryption algorithm for H.264 videos (English)
Free access
- New search for: Shen, Haojie
- New search for: Zhuo, Li
- New search for: Zhao, Yingdi
- New search for: Shen, Haojie
- New search for: Zhuo, Li
- New search for: Zhao, Yingdi
In:
IET Information Security
;
8
, 3
;
199-206
;
2014
- Article (Journal) / Electronic Resource
-
Title:An efficient motion reference structure based selective encryption algorithm for H.264 videos
-
Contributors:
-
Published in:IET Information Security ; 8, 3 ; 199-206
-
Publisher:
- New search for: The Institution of Engineering and Technology
-
Publication date:2014-05-01
-
Size:8 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:sign bits , perceptual security , motion reference structure , H.264 bitstream , video codecs , computational complexity , image reconstruction , non-zero coefflcients , H.264 encoder , cryptographic security , intra-prediction mode codewords , MRR , image motion analysis , two-layer selection scheme , motion vector difference codewords , macroblock , interframe dependency , prediction mechanism , MB layer , video quality reconstruction , selective video encryption algorithm , bit-sensitivity , cryptography , data compression , video coding , motion reference ratio , SEH264 algorithm
-
Source:
Metadata by IET is licensed under CC BY 3.0
Table of contents – Volume 8, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 153
-
Intelligent rule-based phishing websites classificationMohammad, Rami M. / Thabtah, Fadi / McCluskey, Lee et al. | 2014
- 161
-
Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanismWang, Xin / Yuan, ChaoWei et al. | 2014
- 171
-
Generalised cheater detection and identificationHarn, Lein et al. | 2014
- 179
-
Chinese remainder Theorem based centralised group key management for secure multicast communicationVijayakumar, Pandi / Bose, Sudan / Kannan, Arputharaj et al. | 2014
- 188
-
Simple power analysis applied to nonlinear feedback shift registersZadeh, Abdulah Abdulah / Heys, Howard M. et al. | 2014
- 199
-
An efficient motion reference structure based selective encryption algorithm for H.264 videosShen, Haojie / Zhuo, Li / Zhao, Yingdi et al. | 2014
- 207
-
Biclique-based cryptanalysis of the block cipher SQUAREMala, Hamid et al. | 2014
- 213
-
New chaotic encryption algorithm based on chaotic sequence and plain textWang, Xing-Yuan / Gu, Sheng-Xian et al. | 2014