Text
Multimedia content encryption: techniques and applications
Content list:
Chapter 1 Introduction
1.1 Background
1.2 Definition
1.3 History
1.4 Classification
1.5 Book Organization
Chapter 2 Performance Requirement of Multimedia Content Encryption
2.1 Introduction
2.2 Security Requirement
2.3 Compression Efficiency
2.4 Encryption Efficiency
2.5 Format Compliance
2.6 Application Suitability
Chapter 3 Fundamental Techniques
3.1 Introduction
3.2 Cryptography
3.3 Multimedia Compression
3.4 Multimedia Communication
3.5 Digital Watermarking
3.6 Summary
Chapter 4 Complete Encryption
4.1 Definition of Complete Encryption
4.2 Classification of Complete Encryption
4.3 The Encryption Algorithms for Raw Data or Compressed Data
4.4 Typical Encryption Algorithms
4.5 Security and Efficiency
4.6 Performance Comparison
4.7 Summary
Chapter 5 Partial Encryption
5.1 Definition of Partial Encryption
5.2 Classification of Partial Encryption
5.3 Partial Image Encryption
5.4 Partial Audio Encryption
5.5 Partial Video Encryption
5.6 Performance Comparison
5.7 Summary
Chapter 6 Compression-combined Encryption
6.1 Definition of Compression-combined Encryption
6.2 Secure Huffman Coding Based on Random Huffman-Tree Permutation
6.3 Secure Arithmetic Coding Based on Interval Permutation
6.4 Secure Coding Based on Index Encryption
6.5 Random Coefficient Scanning
6.6 Performance Comparison
6.7 Summary
Chapter 7 Perceptual Encryption
7.1 Definition of Perceptual Encryption
7.2 Perceptual Encryption Based on Bit-plane Selection
7.3 Perceptual Encryption Based on Frequency Band Selection
7.4 Performance Comparison
7.5 Summary
Chapter 8 Scalable Encryption
8.1 Definition of Scalable Encryption
8.2 Scalable Media Coding
8.3 Scalable Encryption Algorithms
8.4 Performance Comparison
8.5 Summary
Chapter 9 Commutative Watermarking and Encryption
9.1 Definition of Commutative Watermarking and Encryption
9.2 The CWE Based on Partial Encryption
9.3 The CWE Based on Homomorphic Operations
9.4 Performance Comparison
9.5 Summary
Chapter 10 Joint Fingerprint Embedding and Decryption
10.1 Definition of Joint Fingerprint Embedding and Decryption
10.2 Typical JFD Schemes
10.3 Performance Comparison
10.4 Summary
Chapter 11 Typical Attacks to Multimedia Encryption
11.1 Security Requirement of Multimedia Encryption
11.2 Cryptographic Attacks
11.3 Flaws in Perceptual Security
11.4 Replacement Attack
11.5 Summary
Chapter 12 Some Principles for Secure Multimedia Encryption
12.1 Shannon's Information Theory of Secrecy System
12.2 Principles for Secure Complete Encryption
12.3 Principles for Secure Partial Encryption
12.4 Principles for Secure Compression-combined Encryption
12.5 Summary
Chapter 13 Multimedia Encryption in Typical Applications
13.1 Secure Media Player
13.2 Secure Media Streaming
13.3 Secure Media Preview
13.4 Secure Media Transcoding
13.5 Secure Media Distribution
13.6 Digital Rights Management
Chapter 14 Open Issues
14.1 Perceptual Security
14.2 Lightweight Implementation
14.3 Contradiction between Format Compliance and Upgrade
14.4 Ability to Support Direct Operations
14.5 Key Management
14.6 Combination between Encryption and Other Means
Chapter 15 Summary
No other version available