{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T03:41:21Z","timestamp":1654141281094},"reference-count":32,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>Most of the high definition video content are still produced in a single-layer MPEG-2 format. Multiple-layers Scalable Video Coding (SVC) offers a minor penalty in rate-distortion efficiency when compared to single-layer coding MPEG-2. A scaled version of the original SVC bitstream can easily be extracted by dropping layers from the bitstream. This paper proposes a parallel transcoder from MPEG-2 to SVC video with Graphics Processing Unit (GPU), named PTSVC. The objective of the transcoder is to migrate MPEG-2 format video to SVC format video such that clients with different network bandwidth and terminal devices can seamlessly access video content. Meanwhile, the transcoded SVC videos are encrypted such that only authorized users can access corresponding SVC layers. Using various scalabilities SVC test sequences, experimental results on TM5 and JSVM indicate that PTSVC is a higher efficient transcoding system compared with previous systems and only causes little quality loss.<\/p>","DOI":"10.4018\/ijdcf.2014040104","type":"journal-article","created":{"date-parts":[[2014,12,9]],"date-time":"2014-12-09T13:43:30Z","timestamp":1418132610000},"page":"52-69","source":"Crossref","is-referenced-by-count":0,"title":["GPU-Based MPEG-2 to Secure Scalable Video Transcoding"],"prefix":"10.4018","volume":"6","author":[{"given":"Yueyun","family":"Shang","sequence":"first","affiliation":[{"name":"South Central University for Nationalities, Wuhan, China"}]},{"given":"Dengpan","family":"Ye","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Zhuo","family":"Wei","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Yajuan","family":"Xie","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"2432","reference":[{"key":"ijdcf.2014040104-0","doi-asserted-by":"crossref","unstructured":"J. A. Akinyele, C. U. Lehmanny, M. D. Green, M. W. Pagano, Z. N. J. Petersonz & A. D. Rubin (2010). Self-Protecting electronic medical records using attribute-based encryption. Cryptology ePrint Archive, Report.","DOI":"10.1145\/2046614.2046628"},{"key":"ijdcf.2014040104-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2011.02.005"},{"key":"ijdcf.2014040104-2","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"ijdcf.2014040104-3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ijdcf.2014040104-4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.5735508"},{"key":"ijdcf.2014040104-5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03700-9_6"},{"key":"ijdcf.2014040104-6","doi-asserted-by":"crossref","unstructured":"V. Goyal, O. Pandey, A. Sahai & B. Waters (2006). Attribute based encryption for fine-grained access control of encrypted data. ACM conference on Computer and Communications Security, 89 - 98.","DOI":"10.1145\/1180405.1180418"},{"key":"ijdcf.2014040104-7","first-page":"34","article-title":"Outsourcing the decryption of ABE ciphertexts.","author":"M.Green","year":"2011","journal-title":"Proceedings of the 20th USENIX conference on Security"},{"issue":"9","key":"ijdcf.2014040104-8","first-page":"740","article-title":"Efficient in-network adaptation of encrypted H.264\/SVC content.","volume":"24","author":"H.Hellwagner","year":"2009","journal-title":"Image Communication"},{"key":"ijdcf.2014040104-9","unstructured":"ISO\/IEC 14496-2 (2009). Coding of audio-visual objects-part 2: Visual."},{"key":"ijdcf.2014040104-10","unstructured":"ITU-T (2009). Recommendation H.262 and iso\/iec 13818-2 (MPEG-2 video), Journal of Foo."},{"key":"ijdcf.2014040104-11","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966970"},{"key":"ijdcf.2014040104-12","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2006.262549"},{"key":"ijdcf.2014040104-13","doi-asserted-by":"crossref","unstructured":"Li, C., Zhou, X., & Zhong, Y. (2008). NAL level encryption for scalable video coding,\u201d Pacific-Rim Conference on Multimedia. Lecture Notes in Computer Science, 5353, 496 - 505.","DOI":"10.1007\/978-3-540-89796-5_51"},{"key":"ijdcf.2014040104-14","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9233-2"},{"key":"ijdcf.2014040104-15","first-page":"87","article-title":"Motion vector re-estimation for fast video transcoding from MPEG-2 to MPEG-4.","author":"J.Nakajima","year":"2001","journal-title":"Proceedings of Workshop and Exhibition on"},{"key":"ijdcf.2014040104-16","author":"A.Obukhov","year":"2008","journal-title":"Discrete cosine transform for 8x8blocks with cuda"},{"key":"ijdcf.2014040104-17","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2008.259"},{"key":"ijdcf.2014040104-18","first-page":"99","article-title":"Secure attribute based systems.","author":"M.Pirretti","year":"2006","journal-title":"ACM Conference on Computer and Communications Security (CCS)"},{"key":"ijdcf.2014040104-19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"ijdcf.2014040104-20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"ijdcf.2014040104-21","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2007.902895"},{"key":"ijdcf.2014040104-22","first-page":"1234","article-title":"Efficient MPEG-2 to H. 264\/AVC intra transcoding in transform-doma","author":"Y.Su","year":"2005","journal-title":"IEEE International Symposium on Circuits and Systems"},{"key":"ijdcf.2014040104-23","first-page":"515","article-title":"Complexity-quality analysis of MPEG-2 to MPEG-4 transcoding architectures. Digest of Technical Papers.","author":"A.Vetro","year":"2002","journal-title":"International Conference on Consumer Electronics"},{"key":"ijdcf.2014040104-24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.959047"},{"key":"ijdcf.2014040104-25","doi-asserted-by":"publisher","DOI":"10.1007\/11922841_33"},{"key":"ijdcf.2014040104-26","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2007.902865"},{"key":"ijdcf.2014040104-27","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2238910"},{"key":"ijdcf.2014040104-28","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2010.2058124"},{"key":"ijdcf.2014040104-29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ijdcf.2014040104-30","doi-asserted-by":"publisher","DOI":"10.1145\/1330295.1330298"},{"key":"ijdcf.2014040104-31","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.843340"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=120221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T03:12:54Z","timestamp":1654139574000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijdcf.2014040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2014040104","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}