{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T02:26:42Z","timestamp":1751077602589},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772545"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77255-2_27","type":"book-chapter","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T22:10:54Z","timestamp":1196460654000},"page":"246-255","source":"Crossref","is-referenced-by-count":8,"title":["A New Video Encryption Scheme for H.264\/AVC"],"prefix":"10.1007","author":[{"given":"Yibo","family":"Fan","sequence":"first","affiliation":[]},{"given":"Jidong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Ikenaga","sequence":"additional","affiliation":[]},{"given":"Yukiyasu","family":"Tsunoo","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Goto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"27_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MCAS.2004.1286980","volume":"4","author":"J. Ostermann","year":"2004","unstructured":"Ostermann, J., Bormans, J., List, P., Marpe, D., Narroschke, M., Pereira, F., Stockhammer, T., Wedi, T.: Video coding with H.264\/AVC: tools, performance, and complexity. IEEE Circuits and Systems Magazine\u00a04(1), 7\u201328 (2004)","journal-title":"IEEE Circuits and Systems Magazine"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Furht, B., Socek, D.: Multimedia Security: Encryption Techniques, IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL (2003)","DOI":"10.1201\/9781420038262-3"},{"key":"27_CR3","unstructured":"Liu, X., Eskicioglu, A.M.: Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions. In: CIIT 2003. IASTED International Conference on Communications, Internet and Information Technology, Scottsdale, AZ, (November 17-19, 2003) pp. 17\u201319 (2003)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Lookabaugh, T., Sicker, D.C., Keaton, D.M., Guo, W.Y., Vedula, I.: Security Analysis of Selectively Encrypted MPEG-2 Streams. In: Multimedia Systems and Applications VI Conference, Orlando, FL (September 7-11, 2003)","DOI":"10.1117\/12.512635"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Qiao, L., Nahrstedt, K.: Comparison of MPEG Encryption Algorithms, International Journal on Computer and Graphics. Special Issue on Data Security in Image Communication and Network\u00a022(3) (1998)","DOI":"10.1016\/S0097-8493(98)00033-8"},{"key":"27_CR6","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1201\/9781420038262","volume-title":"Multimedia Security Handbook","author":"B. Furht","year":"2004","unstructured":"Furht, B., Socek, D., Eskicioglu, A.M.: Fundamentals of multimedia encryption techniques. In: Multimedia Security Handbook, ch.\u00a03, pp. 93\u2013131. CRC Press, Boca Raton (2004)"},{"key":"27_CR7","volume-title":"Proceedings of the Symposium on Network and Distributed Systems Security","author":"I. Agi","year":"1996","unstructured":"Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmission. In: Proceedings of the Symposium on Network and Distributed Systems Security, IEEE, Los Alamitos (1996)"},{"key":"27_CR8","unstructured":"Qiao, L., Nahrstedt, K., Tam, I.: Is MPEG Encryption by Using Random List Instead of Zigzag Order Secure? In: IEEE International Symposium on Consumer Electronics, Singapore (December 1997)"},{"key":"27_CR9","unstructured":"Bhargava, B., Shi, C., Wang, Y.: MEPG: Video Encryption Algorithms (August 2002), available at http:\/\/raidlab.cs.purdue.edu\/papers\/mm.ps"},{"key":"27_CR10","unstructured":"Seidel, T., Socek, D., Sramka, M.: Cryptanalysis of Video Encryption Algorithms. In: TATRACRYPT 2003. Proceedings of The 3rd Central European Conference on Cryptology, Bratislava, Slovak Republic (2003)"},{"key":"27_CR11","unstructured":"Alattar, A., Al-Regib, G.: Evaluation of selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceedings of the IEEE International Symposium on Circuits and Systems, vol.\u00a04, pp IV-340-IV-343, (1999)"},{"key":"27_CR12","unstructured":"Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: CISST 1997. Proceedings of the 1st International Conference on Imaging Science, Systems and Technology, Las Vegas, NV, pp. 21\u201329 (July 1997)"},{"key":"27_CR13","unstructured":"National Institute of Standards and Technology (U.S.). Advanced Encryption Standards (AES). FIPS Publication 197 (2001)"},{"key":"27_CR14","unstructured":"Biryukov, A.: A New 128-bit Stream Cipher LEX, ECRYPT Stream Cipher Project Report, 2005, Available at http:\/\/www.ecrypt.eu.org\/stream\/lex.html"},{"key":"27_CR15","unstructured":"Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1Video, Project Description of SECMPEG, Technical University of Berlin, Germany (May 1995)"},{"key":"27_CR16","unstructured":"Maples, T.B., Spanos, G.A.: Performance study of selective encryption scheme for the security f networked real-time video. In: Proceedings of the 4th International Conference on Computer and Communications, Las Vegas, NV (1995)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Spanos, G.A., Maples, T.B.: Security for Real-Time MPEG Compressed Video in Distributed Multimedia Applications. In: Conference on Computers and Communications, pp. 72\u201378 (1996)","DOI":"10.1109\/PCCC.1996.493615"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Shi, C., Bhargava, B.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the 6th International Multimedia Conference, Bristol, UK (September 12-16, 1998)","DOI":"10.1145\/290747.290758"},{"key":"27_CR19","unstructured":"Shi, C., Wang, S.-Y., Bhargava, B.: MPEG Video Encryption in Real-Time Using Secret key Cryptography. In: PDPTA 1999. 1999 International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV (June 28 - July 1, 1999)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Alattar, A.M., Al-Regib, G.I., Al-Semari, S.A.: Improved Selective Encryption techniques for Secure Transmission of MPEG Video Bit-Streams. In: ICIP 1999. Proceedings of the 1999 International Conference on Image Processing, Kobe, Japan (October 24-28, 1999) vol.\u00a04, pp. 256\u2013260 (1999)","DOI":"10.1109\/ICIP.1999.819590"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing \u2013 PCM 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77255-2_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:09:19Z","timestamp":1606165759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77255-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772545"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77255-2_27","relation":{},"subject":[]}}