{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:07:22Z","timestamp":1771038442274,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T00:00:00Z","timestamp":1599955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T00:00:00Z","timestamp":1599955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09654-3","type":"journal-article","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T00:02:16Z","timestamp":1599955336000},"page":"2319-2338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A selective encryption for H.264\/AVC videos based on scrambling"],"prefix":"10.1007","volume":"80","author":[{"given":"Neda","family":"Dolati","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9603-5117","authenticated-orcid":false,"given":"Ali","family":"Beheshti","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Azadegan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,13]]},"reference":[{"key":"9654_CR1","first-page":"1793","volume":"2","author":"M Abomhara","year":"2010","unstructured":"Abomhara M, Zakaria O, Khalifa et al (2010) Enhancing selective encryption for H.264\/AVC using advanced encryption standard. Int Comput Theory Eng 2:1793\u20138201","journal-title":"Int Comput Theory Eng"},{"key":"9654_CR2","first-page":"386","volume":"3333","author":"J Ahn","year":"2004","unstructured":"Ahn J, Shim HJ et al (2004) Digital video scrambling method using intra prediction mode. In: Proceedings of PCM 2004 LNCS 3333:386\u2013393","journal-title":"In: Proceedings of PCM 2004 LNCS"},{"key":"9654_CR3","doi-asserted-by":"publisher","first-page":"27981","DOI":"10.1007\/s11042-018-6022-5","volume":"77","author":"M Altaf","year":"2018","unstructured":"Altaf M, Ahmad A, Khan FA, Uddin Z, Yang X (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimed Tools Appl 77:27981\u201327995","journal-title":"Multimed Tools Appl"},{"key":"9654_CR4","doi-asserted-by":"publisher","first-page":"332","DOI":"10.3390\/sym12030332","volume":"12","author":"S Cheng","year":"2020","unstructured":"Cheng S, Wang L, Ao N, Han Q (2020) A selective video encryption scheme based on coding characteristics. Symmetry 12:332","journal-title":"Symmetry"},{"key":"9654_CR5","doi-asserted-by":"publisher","first-page":"7953","DOI":"10.3390\/s150407953","volume":"15","author":"Y Chung","year":"2015","unstructured":"Chung Y, Lee S, Jeon T, Park D (2015) Fast video encryption using the H.264 error propagation property for smart Mobile devices. Sensors 15:7953\u20137968","journal-title":"Sensors"},{"key":"9654_CR6","doi-asserted-by":"crossref","unstructured":"Ding X, Deng Y, Yang G et al (2016) Design of new scan orders for perceptual encryption of H.264\/AVC videos. IET Information Security","DOI":"10.1049\/iet-ifs.2015.0492"},{"issue":"1","key":"9654_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJIPT.2020.105046","volume":"13","author":"Q Han","year":"2020","unstructured":"Han Q, Wang L et al (2020) Video encryption scheme using hybrid encryption technology. International Journal of Internet Protocol Technology 13(1):1\u20138","journal-title":"International Journal of Internet Protocol Technology"},{"key":"9654_CR8","doi-asserted-by":"crossref","unstructured":"Iyer SC, Sedamkar RR, Gupta S (2016) A novel idea of video encryption using hybrid cryptographic techniques. International Conference on Inventive Computation Technologies (ICICT), Coimbatore, 2016.","DOI":"10.1109\/INVENTIVE.2016.7830094"},{"key":"9654_CR9","doi-asserted-by":"crossref","unstructured":"Jianguo Jiang, Yang Liu, et al (October 2010) An improved selective encryption for H.264 Video based on Intra Prediction Mode Scrambling. Journal of Multimedia, VOL. 5, NO. 5.","DOI":"10.4304\/jmm.5.5.464-472"},{"key":"9654_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/785126","volume":"2013","author":"JH Kong","year":"2013","unstructured":"Kong JH, Ang L-M, Seng KP (2013) A very compact AES-SPIHT selective encryption computer architecture design with improved S-box. J Eng 2013:1\u201326","journal-title":"J Eng"},{"key":"9654_CR11","unstructured":"Lei T (1997) Methods for encrypting and decrypting MPEG video data efficiently. Proceedings of the fourth ACM international conference on Multimedia. ACM"},{"key":"9654_CR12","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/TCSVT.2006.888840","volume":"17","author":"S Li","year":"2007","unstructured":"Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual MPEG video encryption algorithm. IEEE Trans Circuits Syst Video Technol 17:214\u2013223","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"9654_CR13","doi-asserted-by":"crossref","unstructured":"Massoudi A, Lefebvre F, De Vleeschouwer C, et al (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP Journal on Information Security","DOI":"10.1155\/2008\/179290"},{"key":"9654_CR14","first-page":"4","volume-title":"Proceedings of the 5th IEEE Nordic signal processing symposium (NORSIG2002)","author":"M Podesser","year":"2002","unstructured":"Podesser M, Schmidt H, Uhl A (2002) Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th IEEE Nordic signal processing symposium (NORSIG2002). Tromso-Trondheim, Norway, pp 4\u20136"},{"key":"9654_CR15","doi-asserted-by":"crossref","unstructured":"Preishuber M, H\u00fctter T, Katzenbeisser S, Uhl A (Sept. 2018) Depreciating motivation and empirical security analysis of Chaos-based image and video encryption. in IEEE Transactions on Information Forensics and Security 13(9):2137\u20132150","DOI":"10.1109\/TIFS.2018.2812080"},{"key":"9654_CR16","doi-asserted-by":"crossref","unstructured":"Richardson IE (Aug 2010) The H.264 advanced video compression standard, 2nd Edition,ISBN: 978-0-470-51692-8","DOI":"10.1002\/9780470989418"},{"key":"9654_CR17","doi-asserted-by":"crossref","unstructured":"F. Sbiaa, S. Kotel, M. Zeghid, R. Tourki, et al \u201cA selective encryption scheme with multiple security levels for the H.264\/AVC video coding standard\u201d, 2016 IEEE international conference on computer and information technology (CIT), Nadi, 2016, pp. 391\u2013398.","DOI":"10.1109\/CIT.2016.53"},{"key":"9654_CR18","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TCSVT.2011.2129090","volume":"21","author":"Z Shahid","year":"2011","unstructured":"Shahid Z, Chaumont M, Puech W (2011) Fast protection of H.264\/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans Circuits Syst Video Technol 21:565\u2013576","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"9654_CR19","doi-asserted-by":"publisher","first-page":"18967","DOI":"10.1007\/s11042-019-7253-9","volume":"78","author":"Y Song","year":"2019","unstructured":"Song Y, Zhu Z, Zhang W, Yu H (2019) Efficient protection using chaos for context-adaptive binary arithmetic coding in H.264\/advanced video coding. Multimed Tools Appl 78:18967\u201318994","journal-title":"Multimed Tools Appl"},{"key":"9654_CR20","doi-asserted-by":"publisher","unstructured":"Sze V, Detlev M (2014) \u201cEntropy coding in HEVC.\u201d High Efficiency Video Coding (HEVC). 209\u2013274. https:\/\/doi.org\/10.1007\/978-3-319-06895-4_8","DOI":"10.1007\/978-3-319-06895-4_8"},{"issue":"9","key":"9654_CR21","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TCSVT.2013.2248588","volume":"23","author":"Y Wang","year":"2013","unstructured":"Wang Y, O'Neill M, Kurugollu F (2013) A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264\/AVC. IEEE Trans. Circuits Syst. Video Technol 23(9):1476\u20131490","journal-title":"IEEE Trans. Circuits Syst. Video Technol"},{"key":"9654_CR22","doi-asserted-by":"publisher","unstructured":"Xu D (2020) Data hiding in partially encrypted HEVC video. ETRI Journal.First published:04 March 2020. https:\/\/doi.org\/10.4218\/etrij.2018-0484.","DOI":"10.4218\/etrij.2018-0484"},{"key":"9654_CR23","doi-asserted-by":"crossref","unstructured":"Yeung Siu-Kei Au, Zhu S, Zeng B (September 2011) esign of New Unitary Transforms for Perceptual Video Encryption. IEEE transactions on circuits and systems for video technology, vol. 21, NO. 9.","DOI":"10.1109\/TCSVT.2011.2125630"},{"key":"9654_CR24","doi-asserted-by":"crossref","unstructured":"Zhang X.Y., Deng H.C., Chen L.W. (August 2013) The video encryption scheme based on perceptual encryption algorithm in h.264 standards\u201d, Int. Conf. Systems Engineering and Modeling, Shah Alam, Malaysia, , pp. 148\u2013152","DOI":"10.2991\/icsem.2013.29"},{"key":"9654_CR25","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TCE.2006.273147","volume":"52","author":"Y Zou","year":"2006","unstructured":"Zou Y, Huang T, Gao W, Huo L (2006) H.264 video encryption scheme adaptive to DRM. IEEE Trans Consum Electron 52:1289\u20131297","journal-title":"IEEE Trans Consum Electron"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09654-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09654-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09654-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,12]],"date-time":"2021-09-12T23:16:30Z","timestamp":1631488590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09654-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,13]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9654"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09654-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,13]]},"assertion":[{"value":"14 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}