中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文
题名:
entropy codec based on evolutionary mht and its application in video encryption
作者: Cao Yun ; Zhao Xianfeng ; Feng Dengguo
会议文集: MMandSec09 - Proceedings of the 11th ACM Multimedia Security Workshop
会议名称: 11th ACM Multimedia and Security Workshop
会议日期: SEP 07-08,
出版日期: 2009
会议地点: Princeton, NJ
关键词: Multimedia ; encryption ; entropy codec ; Huffman coding
出版者: MM&SEC09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP
出版地: 1515 BROADWAY, NEW YORK, NY 10036-9998 USA
ISBN: 978-1-60558-492-8
部门归属: Cao, Yun; Zhao, Xianfeng; Feng, Dengguo Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China.
主办者: ACM SIGMM
英文摘要: Intending to achieve both efficiency and security, researchers have proposed various approaches which integrate encryption with multimedia compression, systems. Among these, we have found that, by turning entropy coder into cryptographic cipher, the MHT (multiple Huffman tables) scheme has many desirable advantages as fewer crypto-operations are needed. However, because multiple Huffman tables are kept secret, the key management of MHT turns out to be impractical. In this paper, a novel multimedia encryption scheme called evolutionary MHT (EMHT) is proposed to make an improvement. Using only the seed of a pseudorandom bit generator (PRBG) as the key, minimum data is transmitted in key negotiation, and the storage memory is minimized. Analysis shows that EMHT can withstand the known/chosen plaintext attacks capable of breaking MHT. Moreover, the compression ratio and the data format-compliance are unaffected with a minor computational and implementation overhead.
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/8324
Appears in Collections:信息安全国家重点实验室_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Cao Yun,Zhao Xianfeng,Feng Dengguo. entropy codec based on evolutionary mht and its application in video encryption[C]. 见:11th ACM Multimedia and Security Workshop. Princeton, NJ. SEP 07-08,.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Cao Yun]'s Articles
[Zhao Xianfeng]'s Articles
[Feng Dengguo]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Cao Yun]‘s Articles
[Zhao Xianfeng]‘s Articles
[Feng Dengguo]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace