{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T06:29:38Z","timestamp":1722580178189},"reference-count":30,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"

The authors propose a framework to encrypt Baseline JPEG files directly at bitstream level, i.e., without the need to recompress them. The authors\u2019 approach enables encrypting more than 25 pictures per second in VGA resolution, allowing real-time operation in typical video surveillance applications. In addition, their approach preserves the length of the bitstream while being completely format-compliant. Furthermore, the authors show that an attack on the encryption process, which partly relies on AES, is practically infeasible.<\/p>","DOI":"10.4018\/jdcf.2013070101","type":"journal-article","created":{"date-parts":[[2013,9,9]],"date-time":"2013-09-09T12:59:46Z","timestamp":1378731586000},"page":"1-14","source":"Crossref","is-referenced-by-count":30,"title":["Bitstream-Based JPEG Encryption in Real-time"],"prefix":"10.4018","volume":"5","author":[{"given":"Stefan","family":"Auer","sequence":"first","affiliation":[{"name":"Salzburg University of Applied Sciences, Salzburg, Austria"}]},{"given":"Alexander","family":"Bliem","sequence":"additional","affiliation":[{"name":"Salzburg University of Applied Sciences, Salzburg, Austria"}]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[{"name":"Salzburg University of Applied Sciences, Salzburg, Austria"}]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Salzburg, Salzburg, Austria"}]},{"given":"Andreas","family":"Unterweger","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Salzburg, Salzburg, Austria"}]}],"member":"2432","reference":[{"key":"jdcf.2013070101-0","unstructured":"Barrett, S. (2013). stbi-1.33 - public domain JPEG\/PNG reader. Retrieved February 6, 2013, from http:\/\/nothings.org\/stb_image.c"},{"key":"jdcf.2013070101-1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MTAP.0000033983.62130.00"},{"key":"jdcf.2013070101-2","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011). Biclique cryptanalysis of the full AES. In D. Lee, & X. Wang (Eds.), Advances in cryptology (ASIACRYPT 2011): Vol. 7073 of Lecture Notes in Computer Science (pp. 344-371). Berlin \/ Heidelberg, Germany: Springer.","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"jdcf.2013070101-3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"jdcf.2013070101-4","unstructured":"Fiedler, M. (2013). NanoJPEG: A compact JPEG decoder. Retrieved February 6, 2013, from http:\/\/keyj.emphy.de\/nanojpeg\/"},{"key":"jdcf.2013070101-5","unstructured":"ImageMagick Studio. (2013). Convert, edit, and compose images. Retrieved February 9, 2013, from http:\/\/www.imagemagick.org\/script\/index.php"},{"key":"jdcf.2013070101-6","year":"1992","journal-title":"ITU-T T.81. Digital compression and coding of continuous-tone still images | Requirements and guidelines"},{"key":"jdcf.2013070101-7","doi-asserted-by":"crossref","unstructured":"Kailasanathan, C. (2002). Compression performance of JPEG encryption scheme. In A. N. Skodrus, & A. G. Constuntinides (Eds.), Proceedings of the 14th International IEEE Conference on Digital Signal Processing (DSP '02). IEEE.","DOI":"10.1109\/ICDSP.2002.1028339"},{"key":"jdcf.2013070101-8","unstructured":"Kerr, D. A. (2013). Chrominance subsampling in digital images. Retrieved February 2, 2013, from http:\/\/dougkerr.net\/pumpkin\/articles\/Subsampling.pdf"},{"key":"jdcf.2013070101-9","doi-asserted-by":"crossref","unstructured":"Khan, M., Jeoti, V., & Khan, M. (2010). Perceptual encryption of JPEG compressed images using DCT coefficients and splitting of DC coefficients into bitplanes. In Proceedings of the 2010 International Conference on Intelligent and Advanced Systems (ICIAS) (pp. 1-6). IEEE.","DOI":"10.1109\/ICIAS.2010.5716133"},{"key":"jdcf.2013070101-10","unstructured":"Laghaee, A. (2013). BEHAVE interactions test case scenarios. Retrieved February 9, 2013, from http:\/\/groups.inf.ed.ac.uk\/vision\/BEHAVEDATA\/INTERACTIONS\/"},{"key":"jdcf.2013070101-11","doi-asserted-by":"crossref","unstructured":"Lian, S., Sun, J., & Wang, Z. (2004). A novel image encryption scheme based-on JPEG encoding. In Proceedings of the Eighth International Conference on Information Visualisation 2004 (IV 2004) (pp. 217-220). IEEE.","DOI":"10.1109\/IV.2004.1320147"},{"key":"jdcf.2013070101-12","unstructured":"Microsoft. (2013a). Calling native functions from managed code. Retrieved February 6, 2013, from http:\/\/msdn.microsoft.com\/en-us\/library\/ms235282.aspx"},{"key":"jdcf.2013070101-13","unstructured":"Microsoft. (2013b). QueryPerformanceCounter function (Windows). Retrieved February 9, 2013, from http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms644904%28v=vs.85%29.aspx"},{"key":"jdcf.2013070101-14","unstructured":"Microsoft. (2013c). Game timing and multicore processors (Windows). Retrieved February 9, 2013, from http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ee417693%28v=vs.85%29.aspx"},{"key":"jdcf.2013070101-15","year":"2001","journal-title":"FIPS-197 \u2013 Advanced encryption standard (AES)"},{"key":"jdcf.2013070101-16","doi-asserted-by":"crossref","unstructured":"Niu, X., Zhou, C., Ding, J., & Yang, B. (2008). JPEG encryption with file size preservation. In J.-S. Pan, X. M. Niu, H.-C. Huang, & L. C. Jain (Eds.), International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2008 (IIHMSP '08) (pp. 308-311). IEEE.","DOI":"10.1109\/IIH-MSP.2008.207"},{"key":"jdcf.2013070101-17","author":"W.Pennebaker","year":"1993","journal-title":"JPEG \u2013 Still image compression standard"},{"key":"jdcf.2013070101-18","doi-asserted-by":"crossref","unstructured":"Potdar, U., Talele, K. T., & Gandhe, S. T. (2009). Comparison of MPEG video encryption algorithms. In Proceedings of the International Conference on Advances in Computing, Communication and Control (pp. 289-294) (ICAC3 '09). New York, NY: ACM.","DOI":"10.1145\/1523103.1523163"},{"key":"jdcf.2013070101-19","unstructured":"Puech, W., & Rodrigues, J. M. (2005). Crypto-compression of medical images by selective encryption of DCT. In Proceedings of the European Signal Processing Conference 2005 (EUSIPCO'05). EURASIP."},{"key":"jdcf.2013070101-20","doi-asserted-by":"crossref","unstructured":"Puech, W., & Rodrigues, J. M. (2007). Analysis and cryptanalysis of a selective encryption method for JPEG images. In L. O\u2019Conner (Ed.) Proceedings of the Eight International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07). Los Alamitos, CA: IEEE Computer Society.","DOI":"10.1109\/WIAMIS.2007.21"},{"key":"jdcf.2013070101-21","unstructured":"SCIEN. (2013). Test images and videos. Retrieved February 9, 2013, from http:\/\/scien.stanford.edu\/index.php\/test-images-and-videos\/"},{"key":"jdcf.2013070101-22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2042111"},{"key":"jdcf.2013070101-23","unstructured":"Sevilla, R. R. (2013). rijndael - An implementation of the Rijndael cipher. Retrieved February 6, 2013, from http:\/\/www.opensource.apple.com\/source\/CPANInternal\/CPANInternal-62\/Crypt-Rijndael\/rijndael.h"},{"key":"jdcf.2013070101-24","doi-asserted-by":"crossref","unstructured":"Tang, L. (1996). Methods for encrypting and decrypting MPEG video data efficiently. In P. Aigrain, W. Hall, T. D. C. Little, & V. M. Bove Jr. (Eds.) Proceedings of the ACM Multimedia 1996 (pp. 219-229). ACM Press.","DOI":"10.1145\/244130.244209"},{"key":"jdcf.2013070101-25","doi-asserted-by":"crossref","unstructured":"Unterweger, A., & Uhl, A. (2012) Length-preserving bit-stream-based JPEG encryption. In Proceedings of the 14th ACM Multimedia and Security Workshop (pp. 85-89) (MM&Sec'12). New York, New York: ACM.","DOI":"10.1145\/2361407.2361421"},{"key":"jdcf.2013070101-26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2002.800321"},{"key":"jdcf.2013070101-27","doi-asserted-by":"crossref","unstructured":"Wu, C.-P., & Kuo, C.-C. J. (2000). Fast encryption methods for audiovisual data confidentiality. In SPIE International Symposium on Voice, Video, and Data Communications, Vol. 4209 (pp. 284-295). SPIE.","DOI":"10.1117\/12.420829"},{"key":"jdcf.2013070101-28","unstructured":"Yang, B., Zhou, C.-Q., Busch, C., & Niu, X.-M. (2009). Transparent and perceptually enhanced JPEG image encryption. In Proceedings of the 16th International Conference on Digital Signal Processing (pp. 1-6). IEEE."},{"key":"jdcf.2013070101-29","unstructured":"Ye, Y., Zhengquan, X., & Wei, L. (2006). A compressed video encryption approach based on spatial shuffling. In Proceedings of the 8th International Conference on Signal Processing, Vol. 4 (pp. 16-20). IEEE."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=84133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:08:22Z","timestamp":1654103302000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2013070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2013070101","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}