Design of integrated multimedia compression and encryption systems
CP Wu, CCJ Kuo - IEEE Transactions on Multimedia, 2005 - ieeexplore.ieee.org
Two approaches for integrating encryption with multimedia compression systems are
studied in this research, ie, selective encryption and modified entropy coders with multiple …
studied in this research, ie, selective encryption and modified entropy coders with multiple …
Efficient multimedia encryption via entropy codec design
CP Wu, CCJ Kuo - Security and Watermarking of Multimedia …, 2001 - spiedigitallibrary.org
Efficient encryption algorithms are essential to multimedia data security, since the data size
is large and real-time processing is often required. After discussing limitations of previous …
is large and real-time processing is often required. After discussing limitations of previous …
Fast encryption methods for audiovisual data confidentiality
CP Wu, CCJ Kuo - Multimedia Systems and Applications III, 2001 - spiedigitallibrary.org
Two methodologies for efficient audiovisual data encryption are studied in this research, ie
selective encryption and MHT (multiple-Huffman-table). We first discuss benefits and …
selective encryption and MHT (multiple-Huffman-table). We first discuss benefits and …
[PDF][PDF] On pseudo-random and orthogonal binary spreading sequences
A Mitra - … Journal of Electronics and Communication Engineering, 2008 - Citeseer
Different pseudo-random or pseudo-noise (PN) as well as orthogonal sequences that can
be used as spreading codes for code division multiple access (CDMA) cellular networks or …
be used as spreading codes for code division multiple access (CDMA) cellular networks or …
[PDF][PDF] A review of analog audio scrambling methods for residual intelligibility
ASPA Selvan - Innovative Systems Design and Engineering, 2012 - core.ac.uk
In this paper, a review of the techniques available in different categories of audio scrambling
schemes is done with respect to Residual Intelligibility. According to Shannon's secure …
schemes is done with respect to Residual Intelligibility. According to Shannon's secure …
A new cryptography system and its VLSI realization
HC Chen, JC Yen - Journal of Systems Architecture, 2003 - Elsevier
In this paper, a new cryptography system (CS) is proposed and its VLSI architecture is
designed and verified. The new system performs both random position permutation and …
designed and verified. The new system performs both random position permutation and …
Progressive audio scrambling in compressed domain
WQ Yan, WG Fu, MS Kankanhalli - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Audio scrambling can be employed to ensure confidentiality in audio distribution. We first
describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then …
describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then …
New voice over Internet protocol technique with hierarchical data security protection
JI Guo, JC Yen, HF Pai - IEE Proceedings-Vision, Image and Signal Processing, 2002 - IET
The authors propose a voice over Internet protocol (VoIP) technique with a new hierarchical
data security protection (HDSP) scheme. The proposed HDSP scheme can maintain the …
data security protection (HDSP) scheme. The proposed HDSP scheme can maintain the …
[PDF][PDF] On the effectivity of different pseudo-noise and orthogonal sequences for speech encryption from correlation properties
We analyze the effectivity of different pseudo noise (PN) and orthogonal sequences for
encrypting speech signals in terms of perceptual intelligence. Speech signal can be viewed …
encrypting speech signals in terms of perceptual intelligence. Speech signal can be viewed …
Design of a new cryptography system
C Hun-Chen, Y Jui-Cheng, G Jiun-In - … PCM 2002: Third IEEE Pacific Rim …, 2002 - Springer
In this paper, a new cryptography system is proposed. According to a generation scheme, a
binary sequence is generated from a chaotic system. Then, the sequence is used to …
binary sequence is generated from a chaotic system. Then, the sequence is used to …