Design of integrated multimedia compression and encryption systems

CP Wu, CCJ Kuo - IEEE Transactions on Multimedia, 2005 - ieeexplore.ieee.org
Two approaches for integrating encryption with multimedia compression systems are
studied in this research, ie, selective encryption and modified entropy coders with multiple …

Efficient multimedia encryption via entropy codec design

CP Wu, CCJ Kuo - Security and Watermarking of Multimedia …, 2001 - spiedigitallibrary.org
Efficient encryption algorithms are essential to multimedia data security, since the data size
is large and real-time processing is often required. After discussing limitations of previous …

Fast encryption methods for audiovisual data confidentiality

CP Wu, CCJ Kuo - Multimedia Systems and Applications III, 2001 - spiedigitallibrary.org
Two methodologies for efficient audiovisual data encryption are studied in this research, ie
selective encryption and MHT (multiple-Huffman-table). We first discuss benefits and …

[PDF][PDF] On pseudo-random and orthogonal binary spreading sequences

A Mitra - … Journal of Electronics and Communication Engineering, 2008 - Citeseer
Different pseudo-random or pseudo-noise (PN) as well as orthogonal sequences that can
be used as spreading codes for code division multiple access (CDMA) cellular networks or …

[PDF][PDF] A review of analog audio scrambling methods for residual intelligibility

ASPA Selvan - Innovative Systems Design and Engineering, 2012 - core.ac.uk
In this paper, a review of the techniques available in different categories of audio scrambling
schemes is done with respect to Residual Intelligibility. According to Shannon's secure …

A new cryptography system and its VLSI realization

HC Chen, JC Yen - Journal of Systems Architecture, 2003 - Elsevier
In this paper, a new cryptography system (CS) is proposed and its VLSI architecture is
designed and verified. The new system performs both random position permutation and …

Progressive audio scrambling in compressed domain

WQ Yan, WG Fu, MS Kankanhalli - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Audio scrambling can be employed to ensure confidentiality in audio distribution. We first
describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then …

New voice over Internet protocol technique with hierarchical data security protection

JI Guo, JC Yen, HF Pai - IEE Proceedings-Vision, Image and Signal Processing, 2002 - IET
The authors propose a voice over Internet protocol (VoIP) technique with a new hierarchical
data security protection (HDSP) scheme. The proposed HDSP scheme can maintain the …

[PDF][PDF] On the effectivity of different pseudo-noise and orthogonal sequences for speech encryption from correlation properties

VA Kumar, A Mitra, SRM Prasanna - International Journal of Electronics …, 2008 - Citeseer
We analyze the effectivity of different pseudo noise (PN) and orthogonal sequences for
encrypting speech signals in terms of perceptual intelligence. Speech signal can be viewed …

Design of a new cryptography system

C Hun-Chen, Y Jui-Cheng, G Jiun-In - … PCM 2002: Third IEEE Pacific Rim …, 2002 - Springer
In this paper, a new cryptography system is proposed. According to a generation scheme, a
binary sequence is generated from a chaotic system. Then, the sequence is used to …