{"id":"https://openalex.org/W2043929886","doi":"https://doi.org/10.1109/espa.2012.6152430","title":"A partial encryption scheme for AVC video","display_name":"A partial encryption scheme for AVC video","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2043929886","doi":"https://doi.org/10.1109/espa.2012.6152430","mag":"2043929886"},"language":"en","primary_location":{"id":"doi:10.1109/espa.2012.6152430","is_oa":false,"landing_page_url":"https://doi.org/10.1109/espa.2012.6152430","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Emerging Signal Processing Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022934605","display_name":"Viswanathan Swaminathan","orcid":"https://orcid.org/0000-0002-1357-1502"},"institutions":[{"id":"https://openalex.org/I1306409833","display_name":"Adobe Systems (United States)","ror":"https://ror.org/059tvcg64","country_code":"US","type":"company","lineage":["https://openalex.org/I1306409833"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Viswanathan Swaminathan","raw_affiliation_strings":["Advanced Technology Laboratories, Adobe Systems, Inc., San Jose, CA, USA","Advanced Technology Labs, Adobe Systems Incorporated 345 Park Ave, San Jose, CA 95134, USA"],"affiliations":[{"raw_affiliation_string":"Advanced Technology Laboratories, Adobe Systems, Inc., San Jose, CA, USA","institution_ids":["https://openalex.org/I1306409833"]},{"raw_affiliation_string":"Advanced Technology Labs, Adobe Systems Incorporated 345 Park Ave, San Jose, CA 95134, USA","institution_ids":["https://openalex.org/I1306409833"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003506066","display_name":"Saayan Mitra","orcid":"https://orcid.org/0000-0002-4048-2142"},"institutions":[{"id":"https://openalex.org/I1306409833","display_name":"Adobe Systems (United States)","ror":"https://ror.org/059tvcg64","country_code":"US","type":"company","lineage":["https://openalex.org/I1306409833"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saayan Mitra","raw_affiliation_strings":["Advanced Technology Laboratories, Adobe Systems, Inc., San Jose, CA, USA","Advanced Technology Labs, Adobe Systems Incorporated 345 Park Ave, San Jose, CA 95134, USA"],"affiliations":[{"raw_affiliation_string":"Advanced Technology Laboratories, Adobe Systems, Inc., San Jose, CA, USA","institution_ids":["https://openalex.org/I1306409833"]},{"raw_affiliation_string":"Advanced Technology Labs, Adobe Systems Incorporated 345 Park Ave, San Jose, CA 95134, USA","institution_ids":["https://openalex.org/I1306409833"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022934605"],"corresponding_institution_ids":["https://openalex.org/I1306409833"],"apc_list":null,"apc_paid":null,"fwci":1.3727,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.82934393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8710857629776001},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7872713804244995},{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.6005974411964417},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4532400965690613},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.4470345079898834},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.41527026891708374},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33051952719688416},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.31215211749076843},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.26509013772010803},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23028337955474854}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8710857629776001},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7872713804244995},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.6005974411964417},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4532400965690613},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.4470345079898834},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.41527026891708374},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33051952719688416},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.31215211749076843},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.26509013772010803},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23028337955474854},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/espa.2012.6152430","is_oa":false,"landing_page_url":"https://doi.org/10.1109/espa.2012.6152430","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Emerging Signal Processing Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1999485067","https://openalex.org/W2012221452","https://openalex.org/W2098827397","https://openalex.org/W2104605771","https://openalex.org/W2106219841","https://openalex.org/W2113972033","https://openalex.org/W2133598069","https://openalex.org/W2135993981","https://openalex.org/W2141288453","https://openalex.org/W2155655364","https://openalex.org/W6682847941"],"related_works":["https://openalex.org/W4205607586","https://openalex.org/W2980252933","https://openalex.org/W1994767227","https://openalex.org/W2054991208","https://openalex.org/W4206534210","https://openalex.org/W2610181890","https://openalex.org/W2359242134","https://openalex.org/W3033908301","https://openalex.org/W2915067502","https://openalex.org/W2624912447"],"abstract_inverted_index":{"In":[0,139],"this":[1,133,202],"paper,":[2],"we":[3,77,181,196],"present":[4,197],"a":[5,44,48,79,98,103,108,186,205],"scheme":[6,80,136,203],"to":[7,26,36,124,131,168,184],"partially":[8],"encrypt":[9],"Advanced":[10],"Video":[11],"Codec":[12],"(AVC)":[13],"encoded":[14],"video.":[15,194],"Content":[16],"owners":[17],"and":[18,100,153],"distributors":[19],"rely":[20],"on":[21,150],"Digital":[22],"Rights":[23],"Management":[24],"(DRM)":[25],"protect":[27],"the":[28,34,37,41,121,125,129,140,151,154,157,173,193,198],"content":[29,35,42],"against":[30],"piracy":[31],"while":[32],"delivering":[33],"end":[38],"user.":[39],"Encrypting":[40],"with":[43],"symmetric":[45],"key":[46],"is":[47,95,110,115,137,179],"core":[49],"technical":[50],"protection":[51],"mechanism":[52],"used":[53],"by":[54],"DRM":[55],"systems.":[56],"Decrypting":[57],"video":[58,84],"takes":[59],"up":[60],"precious":[61],"computing":[62],"cycles":[63],"in":[64,71,117,128],"devices.":[65,73],"This":[66,93],"may":[67],"hamper":[68],"smooth":[69],"playback":[70],"constrained":[72],"To":[74],"address":[75],"this,":[76],"outline":[78],"where":[81,172],"samples":[82,145,164,178],"(e.g.,":[83],"or":[85],"audio":[86],"frames)":[87],"are":[88,146],"selectively":[89],"chosen":[90,111],"for":[91,112,143,170,189],"encryption.":[92],"selection":[94,141],"made":[96],"at":[97,102],"sample":[99,109],"not":[101],"sub-sample":[104],"level,":[105],"i.e.,":[106],"when":[107],"encryption":[113,135,188],"it":[114],"encrypted":[116],"its":[118],"entirety.":[119],"Therefore,":[120],"required":[122],"changes":[123],"decryption":[126],"process":[127,142],"player":[130],"implement":[132],"partial":[134],"minimal.":[138],"encryption,":[144],"weighted":[147],"heavily":[148],"based":[149],"entropy":[152,163,177],"sensitivity":[155],"of":[156,161,175,207],"sample.":[158],"The":[159],"distribution":[160],"high":[162,176],"vary":[165],"considerably.":[166],"Moreover,":[167],"cover":[169],"cases":[171],"frequency":[174],"low,":[180],"introduce":[182],"checks":[183],"ensure":[185],"baseline":[187],"any":[190],"sequence":[191],"within":[192],"Lastly,":[195],"results":[199],"after":[200],"running":[201],"through":[204],"set":[206],"test":[208],"AVC":[209],"content.":[210]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
