{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T19:31:12Z","timestamp":1720985472780},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,6,9]],"date-time":"2013-06-09T00:00:00Z","timestamp":1370736000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s00530-013-0326-0","type":"journal-article","created":{"date-parts":[[2013,6,8]],"date-time":"2013-06-08T02:45:54Z","timestamp":1370659554000},"page":"165-178","source":"Crossref","is-referenced-by-count":10,"title":["Efficient block-based transparent encryption for H.264\/SVC bitstreams"],"prefix":"10.1007","volume":"20","author":[{"given":"Robert Huijie","family":"Deng","sequence":"first","affiliation":[]},{"given":"Xuhua","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yongdong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,9]]},"reference":[{"issue":"9","key":"326_CR1","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1109\/TCSVT.2007.905532","volume":"17","author":"H. Schwarz","year":"2007","unstructured":"Schwarz, H., Marpe, D., Wiegand, T.: Overview of the scalable video coding extension of the h.264\/avc standard. IEEE Trans Circuits Syst Video Technol 17(9), 1103\u20131120 (2007)","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"326_CR2","unstructured":"Apostolopoulos, J.G., Wee, S.J.: Secure scalable streaming enabling transcoding without decryption. In: Proceedings of the IEEE International Conference on Image Processing, pp. 437\u2013440 (2001)"},{"key":"326_CR3","doi-asserted-by":"crossref","unstructured":"Gergely, V., Feh\u00e9r, G.: Enhancing progressive encryption for scalable video streams. In: Conference on Information and Communications Technologies, pp. 51\u201358 (2009)","DOI":"10.1007\/978-3-642-03700-9_6"},{"key":"326_CR4","doi-asserted-by":"crossref","unstructured":"Sohn, H., Neve, W.D., Ro, Y.M.: Region-of-interest scrambling for scalable surveillance video using jpeg xr. ACM Multimedia, Barcelona, pp. 861\u2013864 (2009)","DOI":"10.1145\/1631272.1631433"},{"issue":"2","key":"326_CR5","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/TCSVT.2011.2106250","volume":"21","author":"H. Sohn","year":"2011","unstructured":"Sohn, H., Neve, W.D., Ro, Y.M.: Privacy protection in video surveillance systems: Analysis of subband-adaptive scrambling in jpeg xr. IEEE Trans Circuits Syst Video Technol 21(2), 170\u2013177 (2011)","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"326_CR6","first-page":"620","volume":"2","author":"C. Yuan","year":"2003","unstructured":"Yuan, C., Zhu, B.B., Wang, Y., Li, S., Zhong, Y.: Efficient and fully scalable encryption for mpeg-4 fgs. IEEE Int Symp Circuits Syst 2, 620\u2013623 (2003)","journal-title":"IEEE Int Symp Circuits Syst"},{"key":"326_CR7","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TMM.2005.843340","volume":"7","author":"C. Yuan","year":"2005","unstructured":"Yuan, C., Zhu, B.B., Wang, Y., Li, S., Zhong, Y.: Scalable protection for mpeg-4 fine granularity scalability. IEEE Trans Multimed 7, 222\u2013233 (2005)","journal-title":"IEEE Trans Multimed"},{"key":"326_CR8","doi-asserted-by":"crossref","unstructured":"Shahid, Z., Chaumont, M., Puech, W.: Selective and scalable encryption of enhancement layers for dyadic scalable H.264\/AVC by scrambling of scan patterns. In: Proceedings of the International Conference on Image Processing, pp. 1273\u20131276 (2009)","DOI":"10.1109\/ICIP.2009.5413605"},{"issue":"3","key":"326_CR9","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/TCSVT.2011.2162290","volume":"22","author":"Thomas St\u00fctz","year":"2012","unstructured":"St\u00fctz, Thomas, Uhl, Andreas: A survey of h.264 avc\/svc encryption. IEEE Transactions on Circuits and System for Video Technology 22(3), 325\u2013339 (2012)","journal-title":"IEEE Transactions on Circuits and System for Video Technology"},{"key":"326_CR10","unstructured":"Norcen R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing, pp. 3431\u20133434 (2004)"},{"issue":"1","key":"326_CR11","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TMM.2003.808817","volume":"5","author":"W. Zeng","year":"2003","unstructured":"Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimed 5(1), 118\u2013129 (2003)","journal-title":"IEEE Trans Multimed"},{"key":"326_CR12","unstructured":"Reichel, J., Schwarz, H., Wien, M.: Joint Scalable Video Model JSVM-19, doc. Joint Video Team (JVT) of ISO\/IEC MPEG & ITU-T VCEG (2011)"},{"key":"326_CR13","doi-asserted-by":"crossref","unstructured":"Won, Y.G., Bae, T.M., Ro, Y.M.: Scalable protection and access control in full scalable video coding. In: Proceedings of the International Workshop on Digital Watermarking, pp. 407\u2013421 (2006)","DOI":"10.1007\/11922841_33"},{"issue":"4","key":"326_CR14","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.jvcir.2011.02.005","volume":"22","author":"G.B. Algin","year":"2011","unstructured":"Algin, G.B., Tunali, E.T.: Scalable video encryption of h.264 svc codec. J Visual Commun Image Represent 22(4), 353\u2013364 (2011)","journal-title":"J Visual Commun Image Represent"},{"key":"326_CR15","doi-asserted-by":"crossref","unstructured":"Park, S.W., Shin, S.U.: Efficient selective encryption scheme for the h.264\/scalable video coding(svc). In: Proceedings of the 4th International Conference on Networked Computing and Advanced Information Management, pp. 371\u2013376 (2008)","DOI":"10.1109\/NCM.2008.259"},{"key":"326_CR16","doi-asserted-by":"crossref","unstructured":"Li, C.H., Zhou, X.X., Zhong, Y.Z.: Nal level encryption for scalable video coding. In: Proceedings of the Pacific-Rim Conference on Multimedia, pp. 496\u2013505 (2008)","DOI":"10.1007\/978-3-540-89796-5_51"},{"key":"326_CR17","doi-asserted-by":"crossref","unstructured":"Li, C.H., Yuan, C., Zhong, Y.Z.: Layered encryption for scalable video coding,\u201d In: Proceedings of the 2nd International Congress on Image and Signal Processing, pp. 1\u20134 (2009)","DOI":"10.1109\/CISP.2009.5302934"},{"key":"326_CR18","doi-asserted-by":"crossref","unstructured":"Wu, C.P., Kuo, C.C.J.: Fast encryption methods for audiovisual data confidentiality. In: Proceedings of SPIE in Multimedia Systems and Applications III, pp. 284\u2013295 (2000)","DOI":"10.1117\/12.420829"},{"issue":"1","key":"326_CR19","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11235-009-9233-2","volume":"45","author":"S.G. Lian","year":"2010","unstructured":"Lian, S.G.: Secure service convergence based on scalable media coding. Telecommun Syst 45(1), 21\u201335 (2010)","journal-title":"Telecommun Syst"},{"issue":"5","key":"326_CR20","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1016\/j.sigpro.2010.10.012","volume":"91","author":"E. Magli","year":"2011","unstructured":"Magli, E., Grangetto, M., Olmo, G.: Transparent encryption techniques for h.264\/avc and h.264\/svc compressed video. Signal Process 91(5), 1103\u20131114 (2011)","journal-title":"Signal Process"},{"issue":"9","key":"326_CR21","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1016\/j.image.2009.07.002","volume":"24","author":"H. Hellwagner","year":"2009","unstructured":"Hellwagner, H., St\u00fctz, T., Kuschnig, R., Uhl, A.: Efficient in-network adaptation of encrypted h.264\/svc content. Signal Process Image Commun 24(9), 740\u2013758 (2009)","journal-title":"Signal Process Image Commun"},{"issue":"6","key":"326_CR22","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1016\/j.image.2009.02.004","volume":"24","author":"H.K. Arachchi","year":"2009","unstructured":"Arachchi, H.K., Perramon, X., Dogan, S., Kondoz, A.M.: Adaptation-aware encryption of scalable h.264\/avc video for content security. Signal Process Image Commun 24(6), 468\u2013483 (2009)","journal-title":"Signal Process Image Commun"},{"key":"326_CR23","doi-asserted-by":"crossref","unstructured":"Thomas, N., Bull, D., Redmill, D.: A novel h.264 svc encryption scheme for secure bit-rate transcoding. In: Proceedings of the Picture Coding Symposium, pp. 1\u20134 (2009)","DOI":"10.1109\/PCS.2009.5167429"},{"key":"326_CR24","unstructured":"ITU-T Recommendation H.264 & ISO\/IEC 14496 AVC. Advanced video coding for generic audio-visual services. ITU-T and ISO\/IEC JTC 1 Recommendation H.264 and ISO\/IEC 14 496-10 (MPEG-4) AVC (2003)"},{"key":"326_CR25","volume-title":"Introduction to Modern Cryptography","author":"J. Katz","year":"2008","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall\/CRC, London (2008)"},{"key":"326_CR26","doi-asserted-by":"crossref","unstructured":"Hofbauer, H., Uhl, A.: An effective and efficient visual quality index based on local edge gradients.In: Proceedings of the 3rd European Workshop on Visual Information Processing (EUVIP), pp. 162\u2013167 (2011)","DOI":"10.1109\/EuVIP.2011.6045514"},{"issue":"4","key":"326_CR27","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.: Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans Image Process"},{"key":"326_CR28","unstructured":"Mao Y., Wu M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing, pp. 1522\u20134880 (2004)"},{"key":"326_CR29","doi-asserted-by":"crossref","unstructured":"Yao, Y., Xu, Z., Li, W.: Visual security evaluation for video encryption.In: Proceedings of the 3rd International Conference on Communications and Networking in China, pp. 1317\u20131322 (2008)","DOI":"10.1109\/CHINACOM.2008.4685269"},{"key":"326_CR30","doi-asserted-by":"crossref","unstructured":"Tong, L., Dai, F., Zhang, Y., Li, J.: Visual security evaluation for video encryption. ACM Multimedia, Barcelona, pp. 835\u2013838 (2010)","DOI":"10.1145\/1873951.1874091"},{"key":"326_CR31","unstructured":"Hemami, S.S., Rouse, D.: Natural image utility assessment using image contours. In: Proceedings of the IEEE International Conference on Image Processing, pp. 2217\u20132220 (2009)"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-013-0326-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00530-013-0326-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-013-0326-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T19:50:24Z","timestamp":1563133824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00530-013-0326-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,9]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["326"],"URL":"https:\/\/doi.org\/10.1007\/s00530-013-0326-0","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,9]]}}}