Security analysis of multimedia encryption schemes based on multiple Huffman table

J Zhou, Z Liang, Y Chen, OC Au - IEEE Signal Processing …, 2007 - ieeexplore.ieee.org
This letter addresses the security issues of the multimedia encryption schemes using
multiple Huffman table (MHT). A known-plaintext attack is presented to show that the MHTs …

An overview of multimedia technologies in current era of internet of things (IoT)

MP Nath, SBB Priyadarshini, M Ray, DS Das - Multimedia Technologies in …, 2022 - Springer
Throughout the digital era of internet of things, various forms of media such as email, audio,
picture, and video have been able to reach the network arena. Reasons behind this include …

3D face recognition founded on the structural diversity of human faces

S Gupta, JK Aggarwal, MK Markey… - 2007 IEEE Conference …, 2007 - ieeexplore.ieee.org
We present a systematic procedure for selecting facial fiducial points associated with diverse
structural characteristics of a human face. We identify such characteristics from the existing …

[图书][B] Embedded multimedia security systems: algorithms and architectures

A Pande, J Zambreno - 2012 - books.google.com
Embedded multimedia systems have been widely deployed in a multitude of applications,
yet their use has lead to increasing concern over the security of the resultant multimedia …

[PDF][PDF] Security Systems

A Pande, J Zambreno - ece.iastate.edu
Welcome to the first edition of the book “Embedded Multimedia Security Systems: Algorithms
and Architectures”. The main objective behind this book is NOT to serve as a textbook or a …

[PDF][PDF] Algorithm and hardware design of encryption scheme for H. 264/AVC

Y Fan - 2009 - waseda.repo.nii.ac.jp
H. 264, which is also known as MPEG-4 part 10 or AVC (for Advanced Video Coding), is the
latest international video coding standard proposed in 2003. Currently, there is few …

On the security of multimedia encryption schemes based on multiple huffman table (mht)

J Zhou, Z Liang, Y Chen, O Au - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
This paper addresses the security issues of the multimedia encryption schemes based on
multiple Huffman table (MHT). A detailed analysis of known-plaintext attack is presented to …

Chaotic Arithmetic Coding

A Pande, J Zambreno, A Pande, J Zambreno - … Systems: Algorithms and …, 2013 - Springer
Arithmetic Coding (AC) is widely used for the entropy coding of text and multimedia data. It
involves recursive partitioning of the range [0, 1) in accordance with the relative probabilities …

[图书][B] Multimedia lightweight encryption via randomized entropy coding

J Zhou - 2009 - search.proquest.com
With the widespread use of multimedia content, the multimedia security and digital rights
management (DRM) issues have become increasingly important. A straightforward way to …