The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
본 논문에서는 H.264/SVC의 계층적 접근제어를 위한 새로운 선택적 암호화 기법과 키 관리 기법을 제안한다. 이 방식은 서로 다른 키(인트라 예측 모드, 모션 벡터 차이 값 및 텍스처 데이터의 부호 비트)를 사용하여 계층적 레이어의 세 가지 도메인을 암호화합니다. 제안하는 방식은 H.264/SVC 구조를 활용하여 낮은 계산 복잡도, 낮은 비트 오버헤드 및 형식 준수를 제공합니다. Enhancement-Layer의 각 계층 유형에 따라 도메인을 선택적으로 암호화하여 높은 암호화 효율성을 제공합니다. 또한 암호화를 위해 제안된 키 관리 방식에서 파생된 키를 사용하여 기밀성과 암시적 인증을 제공합니다. 시뮬레이션 결과는 제안된 방식의 효율성을 보여줍니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Su-Wan PARK, Sang Uk SHIN, "An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding" in IEICE TRANSACTIONS on Information,
vol. E92-D, no. 5, pp. 851-858, May 2009, doi: 10.1587/transinf.E92.D.851.
Abstract: This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E92.D.851/_p
부
@ARTICLE{e92-d_5_851,
author={Su-Wan PARK, Sang Uk SHIN, },
journal={IEICE TRANSACTIONS on Information},
title={An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding},
year={2009},
volume={E92-D},
number={5},
pages={851-858},
abstract={This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.},
keywords={},
doi={10.1587/transinf.E92.D.851},
ISSN={1745-1361},
month={May},}
부
TY - JOUR
TI - An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding
T2 - IEICE TRANSACTIONS on Information
SP - 851
EP - 858
AU - Su-Wan PARK
AU - Sang Uk SHIN
PY - 2009
DO - 10.1587/transinf.E92.D.851
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E92-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2009
AB - This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.
ER -