
Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/18731
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dua, Amit | - |
dc.date.accessioned | 2025-04-23T04:20:05Z | - |
dc.date.available | 2025-04-23T04:20:05Z | - |
dc.date.issued | 2018 | - |
dc.identifier.uri | https://www.taylorfrancis.com/chapters/edit/10.1201/9780429435461-7/security-cryptography-images-video-using-elliptic-curve-cryptography-ecc-piyush-raghav-amit-dua | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/18731 | - |
dc.description.abstract | This chapter presents the analysis and evaluation of scalable video coding (SVC). It describes encryption and authentication schemes for SVC, respectively. An SVC bitstream consists of a low-quality video sub-bitstream as well as one or more supplement sub-bitstreams. Scalable video streaming techniques are widely used in real time content distribution due to their adaptability to a variety of heterogeneous network and platform settings. Partial encryption is to preserve multimedia property by treating different data in a multimedia stream differently according to their importance. The chapter investigates whether partial encryption in H.264/SVC can protect data confidentiality. Most video coding standards including MPEG-2, MPEG-4, and H.264 achieve compression by identifying similarities in the spatial and the temporal dimensions. The common flaw of existing transform-domain content-based authentication (CBA) schemes is that the feature extracted is insufficient to truly represent the video semantic. The chapter demonstrates transform-domain attack examples that can be applied on each category of CBA schemes. | en_US |
dc.language.iso | en | en_US |
dc.publisher | CRC Press | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Scalable video coding (SVC) | en_US |
dc.subject | Video streaming | en_US |
dc.subject | Encryption schemes for SVC | en_US |
dc.title | Security and cryptography in images and video using elliptic curve cryptography (ECC) | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.