dc.contributor.author |
Dua, Amit |
|
dc.date.accessioned |
2025-04-23T04:20:05Z |
|
dc.date.available |
2025-04-23T04:20:05Z |
|
dc.date.issued |
2018 |
|
dc.identifier.uri |
https://www.taylorfrancis.com/chapters/edit/10.1201/9780429435461-7/security-cryptography-images-video-using-elliptic-curve-cryptography-ecc-piyush-raghav-amit-dua |
|
dc.identifier.uri |
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/18731 |
|
dc.description.abstract |
This chapter presents the analysis and evaluation of scalable video coding (SVC). It describes encryption and authentication schemes for SVC, respectively. An SVC bitstream consists of a low-quality video sub-bitstream as well as one or more supplement sub-bitstreams. Scalable video streaming techniques are widely used in real time content distribution due to their adaptability to a variety of heterogeneous network and platform settings. Partial encryption is to preserve multimedia property by treating different data in a multimedia stream differently according to their importance. The chapter investigates whether partial encryption in H.264/SVC can protect data confidentiality. Most video coding standards including MPEG-2, MPEG-4, and H.264 achieve compression by identifying similarities in the spatial and the temporal dimensions. The common flaw of existing transform-domain content-based authentication (CBA) schemes is that the feature extracted is insufficient to truly represent the video semantic. The chapter demonstrates transform-domain attack examples that can be applied on each category of CBA schemes. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
CRC Press |
en_US |
dc.subject |
Computer Science |
en_US |
dc.subject |
Scalable video coding (SVC) |
en_US |
dc.subject |
Video streaming |
en_US |
dc.subject |
Encryption schemes for SVC |
en_US |
dc.title |
Security and cryptography in images and video using elliptic curve cryptography (ECC) |
en_US |
dc.type |
Book chapter |
en_US |