A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, J. -J. Quisquater, Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Secur.2008:, 5 (2008).
Google Scholar
F. Liu, H. Koenig, A survey of video encryption algorithms. Comput. Secur.29(1), 3–15 (2010).
Article
Google Scholar
S. Jana, A. Pande, A. Chan, P. Mohapatra, Mobile video chat: issues and challenges. IEEE Commun. Mag.51(6), 144–151 (2013).
Article
Google Scholar
C. Xiao, T. Li, N. Yang, L. Wang, S. Ma, in Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE. A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints (IEEE, 2014), pp. 104–109.
P. Deshmukh, V. Kolhe, in Information Communication and Embedded Systems (ICICES), 2014 International Conference On. Modified aes based algorithm for mpeg video encryption (IEEE, 2014), pp. 1–5.
W. Zeng, S. Lei, in Proceedings of the Seventh ACM International Conference on Multimedia (Part 1). Efficient frequency domain video scrambling for content access control (ACM, 1999), pp. 285–294.
Z. Liu, X. Li, in Multimedia Modelling Conference, 2004. Proceedings. 10th International. Motion vector encryption in multimedia streaming (IEEE, 2004), pp. 64–71.
Y. Li, L. Liang, Z. Su, J. Jiang, in 2005 5th International Conference on Information Communications & Signal Processing. A new video encryption algorithm for h. 264 (IEEE, 2005), pp. 1121–1124.
Y. Wang, M. O’Neill, F. Kurugollu, in Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European. The improved sign bit encryption of motion vectors for h. 264/avc (IEEE, 2012), pp. 1752–1756.
M. Pazarci, V. Dipcin, A mpeg2-transparent scrambling technique. IEEE Trans. Consum. Electron.48(2), 345–355 (2002).
Article
Google Scholar
M. Grangetto, E. Magli, G. Olmo, Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans. Multimed.8(5), 905–917 (2006).
Article
Google Scholar
S. Lian, J. Sun, G. Liu, Z. Wang, Efficient video encryption scheme based on advanced video coding. Multimedia Tools Appl.38(1), 75–89 (2008).
Article
Google Scholar
Z. Shahid, M. Chaumont, W. Puech, Fast protection of h. 264/avc by selective encryption of cavlc and cabac for i and p frames. IEEE Trans. Circ. Syst. Video Technol.21(5), 565–576 (2011).
Article
Google Scholar
M. Roy, C. Pradhan, in Electronics Computer Technology (ICECT), 2011 3rd International Conference On, vol. 2. Secured selective encryption algorithm for mpeg-2 video (IEEE, 2011), pp. 420–423.
C. Mansour, D. Chasaki, in 2014 International Wireless Communications and Mobile Computing Conference (IWCMC). Power-aware selective encryption of video transmissions in smart devices (IEEE, 2014), pp. 967–972.
J. Moon, H. So, K. Lee, in Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference On. Configurable privacy management for secure video surveillance in energy-constrained systems (IEEE, 2016), pp. 003800–003805.
X. Di, Y. Wang, J. Li, L. Cong, H. Qi, Y. Zhang, in Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017 10th International Congress On. An optimized video selective encryption algorithm (IEEE, 2017), pp. 1–5.
B. Boyadjis, C. Bergeron, B. Pesquet-Popescu, F. Dufaux, Extended selective encryption of h. 264/avc (cabac)-and hevc-encoded video streams. IEEE Trans. Circ. Syst. Video Technol.27(4), 892–906 (2017).
Article
Google Scholar
E. Magli, M. Mancin, L. Merello, in Multimedia and Expo, 2003. ICME’03. Proceedings. 2003 International Conference On, vol. 3. Low-complexity video compression for wireless sensor networks (IEEE, 2003), p. 585.
S. Mohapatra, R. Cornea, N. Dutt, A. Nicolau, N. Venkatasubramanian, in Proceedings of the Eleventh ACM International Conference on Multimedia. Integrated power management for video streaming to mobile handheld devices (ACM, 2003), pp. 582–591.
S. Mohapatra, R. Cornea, H. Oh, K. Lee, M. Kim, N. Dutt, R. Gupta, A. Nicolau, S. Shukla, N. Venkatasubramanian, in 19th IEEE International Parallel and Distributed Processing Symposium. A cross-layer approach for power-performance optimization in distributed mobile systems (IEEE, 2005), p. 8.
J. Moon, K. Lee, in Proceedings of the 7th ACM International Workshop on Mobile Video. Spatio-temporal visual security metric for secure mobile video applications (ACM, 2015), pp. 9–14.
C. N. Taylor, S. Dey, D. Panigrahi, in Software Radio. Energy/latency/image quality tradeoffs in enabling mobile multimedia communication (SpringerLondon, 2001), pp. 55–66.
Chapter
Google Scholar
C-F. Chiasserini, E. Magli, in Personal, Indoor and Mobile Radio Communications, 2002. The 13th IEEE International Symposium On, vol. 5. Energy consumption and image quality in wireless video-surveillance networks (IEEE, 2002), pp. 2357–2361.
T-H. Lan, A. H. Tewfik, A resource management strategy in wireless multimedia communications-total power saving in mobile terminals with a guaranteed qos. IEEE Trans. Multimed.5(2), 267–281 (2003).
Article
Google Scholar
S. Mohapatra, N. Dutt, A. Nicolau, N. Venkatasubramanian, Dynamo: A cross-layer framework for end-to-end qos and energy optimization in mobile handheld devices. IEEE J. Sel. Areas Commun.25(4), 722–737 (2007).
Article
Google Scholar
K. Lee, M. Kim, N. Dutt, N. Venkatasubramanian, in Distributed Embedded Systems: Design, Middleware and Resources. Error-exploiting video encoder to extend energy/qos tradeoffs for mobile embedded systems (SpringerBoston, 2008), pp. 23–34.
Chapter
Google Scholar
C. Herglotz, R. Rosales, M. Glaß, J. Teich, A. Kaup, in Picture Coding Symposium (PCS), 2016. Multi-objective design space exploration for the optimization of the hevc mode decision process (IEEE, 2016), pp. 1–5.
J. Moon, K. Lee, in Embedded Systems For Real-time Multimedia (ESTIMedia), 2015 13th IEEE Symposium On. Integrated visual security management for video encryption in limited battery devices (IEEE, 2015), pp. 1–8.
P. FIPS, 46-3: Data encryption standard (des). Natl Inst. Stand. Technol.25(10), 1–22 (1999).
Google Scholar
N. F. Pub, 197: Advanced encryption standard (aes). Fed. Inf. Process. Stand. Publ.197:, 441–0311 (2001).
Google Scholar
B. Bhargava, C. Shi, S. -Y. Wang, Mpeg video encryption algorithms. Multimedia Tools Appl.24(1), 57–79 (2004).
Article
Google Scholar
L. Qiao, K. Nahrstedt, Comparison of mpeg encryption algorithms. Comput. Graph.22(4), 437–448 (1998).
Article
Google Scholar
C. N. Raju, G. Umadevi, K. Srinathan, C. Jawahar, in Computer Vision, Graphics & Image Processing, 2008. ICVGIP’08. Sixth Indian Conference On. Fast and secure real-time video encryption (IEEE, 2008), pp. 257–264.
S. Lian, Z. Liu, Z. Ren, H. Wang, Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consum. Electron.52(2), 621–629 (2006).
Article
Google Scholar
D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk, B. Furht, New approaches to encryption and steganography for digital videos. Multimedia Systems. 13(3), 191–204 (2007).
Article
Google Scholar
University of Salzburg, VQI – Visual Quality Iindex Implementations (2018). http://www.wavelab.at/sources/VQI. version 1.x.
Z. Wang, A. C. Bovik, H. R. Sheikh, E. P. Simoncelli, Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process.13(4), 600–612 (2004).
Article
Google Scholar
H. Hofbauer, A. Uhl, in EUVIP. An effective and efficient visual quality index based on local edge gradients (Citeseer, 2011), pp. 162–167.
H. R. Sheikh, A. C. Bovik, in Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP’04). IEEE International Conference On, vol. 3. Image information and visual quality (IEEE, 2004), p. 709.
P. C. Teo, D. J. Heeger, in IS&T/SPIE 1994 International Symposium on Electronic Imaging: Science and Technology. Perceptual image distortion (International Society for Optics and Photonics, 1994), pp. 127–141.
M. P. Eckert, A. P. Bradley, Perceptual quality metrics applied to still image compression. Signal Process.70(3), 177–200 (1998).
Article
Google Scholar
S. Winkler, in Electronic Imaging’99. Perceptual distortion metric for digital color video (International Society for Optics and Photonics, 1999), pp. 175–184.
L. Tong, F. Dai, Y. Zhang, J. Li, in Proceedings of the 18th ACM International Conference on Multimedia. Visual security evaluation for video encryption (ACM, 2010), pp. 835–838.
W. Lin, C. -C. J. Kuo, Perceptual visual quality metrics: A survey. J. Vis. Commun. Image Represent. (2011).
G. -H. Chen, C. -L. Yang, S. -L. Xie, in 2006 International Conference on Image Processing. Gradient-based structural similarity for image quality assessment (IEEE, 2006), pp. 2929–2932.
H. Hofbauer, A. Uhl, Identifying deficits of visual security metrics for images. Signal Process. Image Commun.46:, 60–75 (2016).
Article
Google Scholar
J. Klaue, B. Rathke, A. Wolisz, in International Conference on Modelling Techniques and Tools for Computer Performance Evaluation. Evalvid–a framework for video transmission and quality evaluation (Springer, 2003), pp. 255–272.
K. Pearson, Note on regression and inheritance in the case of two parents. Proc. R. Soc. Lond.58:, 240–242 (1895).
Article
Google Scholar
C. Spearman, The proof and measurement of association between two things. Am. J. Psychol.15(1), 72–101 (1904).
Article
Google Scholar