文件名称:2CryptanalysisofVideoEncryption
介绍说明--下载内容均来自于网络,请自行研究使用
Content security is an important issue in multimedia applications. In
this paper we perform a cryptanalysis of several encryption algorithms
that have been proposed to protect the privacy of MPEG video streams.
In particular, we analyze the encryption based on permuting the Hu® man
codeword list, and two selective encryption algorithms - VEA and MVEA.
For the convenience of the reader, we provide a simple overview of MPEG
encoding, and we include all analyzed algorithms and their characteristics.-Content security is an important issue in multimedia applications. In
this paper we perform a cryptanalysis of several encryption algorithms
that have been proposed to protect the privacy of MPEG video streams.
In particular, we analyze the encryption based on permuting the Hu® man
codeword list, and two selective encryption algorithms- VEA and MVEA.
For the convenience of the reader, we provide a simple overview of MPEG
encoding, and we include all analyzed algorithms and their characteristics.
this paper we perform a cryptanalysis of several encryption algorithms
that have been proposed to protect the privacy of MPEG video streams.
In particular, we analyze the encryption based on permuting the Hu® man
codeword list, and two selective encryption algorithms - VEA and MVEA.
For the convenience of the reader, we provide a simple overview of MPEG
encoding, and we include all analyzed algorithms and their characteristics.-Content security is an important issue in multimedia applications. In
this paper we perform a cryptanalysis of several encryption algorithms
that have been proposed to protect the privacy of MPEG video streams.
In particular, we analyze the encryption based on permuting the Hu® man
codeword list, and two selective encryption algorithms- VEA and MVEA.
For the convenience of the reader, we provide a simple overview of MPEG
encoding, and we include all analyzed algorithms and their characteristics.
相关搜索: cryptanalysis
(系统自动生成,下载前可以参看下载内容)
下载文件列表
Cryptanalysis of Video Encryption Algorithms.pdf