Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chuntao Wang, J. Ni, Qiong Huang (2015)
A new encryption-then-compression algorithm using the rate-distortion optimizationSignal Process. Image Commun., 39
A. Chaaraoui, José Padilla-López, F. Pastor, M. Nieto-Hidalgo, Francisco Flórez-Revuelta (2014)
A Vision-Based System for Intelligent Monitoring: Human Behaviour Analysis and Privacy by ContextSensors (Basel, Switzerland), 14
M. Saini, P. Atrey, S. Mehrotra, M. Kankanhalli (2012)
W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance videoMultimedia Tools and Applications, 68
Chinchen Chang, M. Hwang, Tung-Shou Chen (2001)
A new encryption algorithm for image cryptosystemsJ. Syst. Softw., 58
Christopher Thorpe, Feng Li, Zijia Li, Zhan Yu, David Saunders, Jingyi Yu (2012)
A Co-Prime Blur Scheme for Data Security in Video SurveillanceIEEE transactions on pattern analysis and machine intelligence, 35 12
Udaya Puvvadi, Kevin Benedetto, Aditya Patil, K. Kang, Youngjoon Park (2015)
Cost-Effective Security Support in Real-Time Video SurveillanceIEEE Transactions on Industrial Informatics, 11
Vassilios Tsakanikas, T. Dagiuklas (2017)
Video surveillance systems-current status and future trendsComput. Electr. Eng., 70
Zheng Xu, Chuanping Hu, Lin Mei (2016)
Video structured description technology based intelligence analysis of surveillance videos for public security applicationsMultimedia Tools and Applications, 75
S. Nandhini, R. Sankararajan (2017)
Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networksComput. Electr. Eng., 60
M. Alsmirat, Islam Obaidat, Y. Jararweh, Mohammed Al-Saleh (2017)
A security framework for cloud-based video surveillance systemMultimedia Tools and Applications, 76
A. El-Semary, M. Abdel-Azim, H. Diab (2017)
SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic MapKSII Trans. Internet Inf. Syst., 11
M. Kerr, R. Schyndel (2014)
Adapting Law Enforcement Frameworks to Address the Ethical Problems of CCTV Product PropagationIEEE Security & Privacy, 12
Xiaojing Ma, L. Yang, Yang Xiang, W. Zeng, Deqing Zou, Hai Jin (2017)
Fully Reversible Privacy Region Protection for Cloud Video SurveillanceIEEE Transactions on Cloud Computing, 5
M. Abdmouleh, Hedi Amri, A. Khalfallah, M. Bouhlel (2016)
A Fast JPEG2000 Based Crypto-Compression Algorithm: Application to the Security for Transmission of Medical Images
Xiaobo Li, Jason Knipe, Howard Cheng (1997)
Image compression and encryption using tree structuresPattern Recognit. Lett., 18
Xing Zhang, Seung-Hyun Seo, Changda Wang (2018)
A Lightweight Encryption Method for Privacy Protection in Surveillance VideosIEEE Access, 6
Xiaojing Ma, W. Zeng, L. Yang, Deqing Zou, Hai Jin (2016)
Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance VideosIEEE Transactions on Emerging Topics in Computing, 4
Kyungroul Lee, Hyeungjun Yeuk, Jaein Kim, Hyungjoon Park, Kangbin Yim (2016)
An efficient key management solution for privacy masking, restoring and user authentication for video surveillance serversComput. Stand. Interfaces, 44
Hao Zeng, Lei Ji (2018)
An Encryption Method for Mobile Video Surveillance System based on ZUC AlgorithmProcedia Computer Science, 131
As the rate of the video is increasing on the internet, the security of video data is considered as a critical issue. In case of video surveillance application, the multimedia video streams require the video to be transmitted in a more secure way to its corresponding monitoring site. The multimedia video security is improved in this paper using a compression based encryption module. 2D Discrete Wavelet Transforms method is used for the compression process. The wavelet transform eliminates the low visual information, and it is scrambled and rotated for the encryption process. The encryption is handled using a series of the permutation–diffusion framework that helps in encrypting each video frame for possible secured transmission. The diffusion is carried out using Logistic chaotic maps, and the permutated blocks are encrypted with block-wise encryption. The experimental results show that the proposed video security framework achieves an improved performance against the existing method in terms of PSNR, SSIM, key size, and compression ratio, error rate.
3D Research – Springer Journals
Published: Apr 24, 2019
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.