{"id":"https://openalex.org/W2092698843","doi":"https://doi.org/10.1109/wcsp.2012.6543022","title":"A content-based encryption scheme for wireless H.264 compressed videos","display_name":"A content-based encryption scheme for wireless H.264 compressed videos","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2092698843","doi":"https://doi.org/10.1109/wcsp.2012.6543022","mag":"2092698843"},"language":"en","primary_location":{"id":"doi:10.1109/wcsp.2012.6543022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcsp.2012.6543022","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on Wireless Communications and Signal Processing (WCSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044250853","display_name":"Yingdi Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingdi Zhao","raw_affiliation_strings":["Beijing Signal and Information Processing Lab, Beijing University of Technology, Beijing, China","Beijing Signal & Inf. Process. Lab., Beijing Univ. of Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Signal and Information Processing Lab, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Beijing Signal & Inf. Process. Lab., Beijing Univ. of Technol., Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100448036","display_name":"Zhuo Li","orcid":"https://orcid.org/0000-0002-9937-2669"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Zhuo","raw_affiliation_strings":["Beijing Signal and Information Processing Lab, Beijing University of Technology, Beijing, China","Beijing Signal & Inf. Process. Lab., Beijing Univ. of Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Signal and Information Processing Lab, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Beijing Signal & Inf. Process. Lab., Beijing Univ. of Technol., Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044250853"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":1.0982,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.80413061,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8166359663009644},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8034235239028931},{"id":"https://openalex.org/keywords/motion-vector","display_name":"Motion vector","score":0.6225330829620361},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.5248477458953857},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5133370757102966},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.494686096906662},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4795072674751282},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4352380037307739},{"id":"https://openalex.org/keywords/group-of-pictures","display_name":"Group of pictures","score":0.4143866300582886},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.41101711988449097},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3484058976173401},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.17500415444374084},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17218366265296936}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8166359663009644},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8034235239028931},{"id":"https://openalex.org/C2779020251","wikidata":"https://www.wikidata.org/wiki/Q3555171","display_name":"Motion vector","level":3,"score":0.6225330829620361},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.5248477458953857},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5133370757102966},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.494686096906662},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4795072674751282},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4352380037307739},{"id":"https://openalex.org/C196496179","wikidata":"https://www.wikidata.org/wiki/Q860741","display_name":"Group of pictures","level":3,"score":0.4143866300582886},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.41101711988449097},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3484058976173401},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.17500415444374084},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17218366265296936}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcsp.2012.6543022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcsp.2012.6543022","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on Wireless Communications and Signal Processing (WCSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2030411764","https://openalex.org/W2103461668","https://openalex.org/W2106892689","https://openalex.org/W2108709789","https://openalex.org/W2113972033","https://openalex.org/W2123657394","https://openalex.org/W2124735649","https://openalex.org/W2130214166","https://openalex.org/W2133951791","https://openalex.org/W2142888436","https://openalex.org/W2167113943","https://openalex.org/W2171126197","https://openalex.org/W2330139586","https://openalex.org/W2537167688","https://openalex.org/W2595534831","https://openalex.org/W6675538016"],"related_works":["https://openalex.org/W2119626116","https://openalex.org/W4393107225","https://openalex.org/W2005006301","https://openalex.org/W2031767824","https://openalex.org/W2366826709","https://openalex.org/W2921544326","https://openalex.org/W3182771625","https://openalex.org/W2182036503","https://openalex.org/W2020857147","https://openalex.org/W2094550755"],"abstract_inverted_index":{"In":[0,83],"this":[1],"paper,":[2],"a":[3],"content-based":[4,175],"encryption":[5,70,177,196],"scheme":[6,178,197],"for":[7,105,123,142],"wireless":[8],"H.264":[9,32,209],"video":[10,47,176],"in":[11,49,71,74,101,132,137,151,156,183,201],"the":[12,18,43,46,58,75,84,94,102,112,134,138,157,168,173,194,202,208,214],"compressed":[13,203],"domain":[14,204],"is":[15,29,198],"proposed.":[16],"First,":[17],"information":[19],"of":[20,45,51,77,81,86,88,107,114,125,144,153,171,186],"prediction":[21,26,96],"mode,":[22],"motion":[23,127],"vector":[24],"and":[25,34,53,98,205],"residual":[27],"energy":[28],"extracted":[30],"from":[31],"bitstream":[33,210],"then":[35],"jointly":[36],"utilized":[37],"to":[38,41,57,117,160,167],"compute":[39],"measures":[40],"classify":[42],"complexity":[44],"content":[48,64],"terms":[50],"texture":[52],"motion.":[54],"Then":[55],"according":[56],"classification":[59],"results,":[60],"videos":[61,87,106,124],"with":[62,68,207],"different":[63,72],"features":[65],"are":[66,159],"encrypted":[67],"selective":[69],"ways":[73],"unit":[76],"GOP":[78,158],"(GOP,":[79],"Group":[80],"Pictures).":[82],"case":[85],"complex":[89],"texture,":[90,111],"we":[91,129],"encrypt":[92,118,130],"all":[93,133],"intra":[95],"modes":[97],"DCT":[99],"coefficients":[100,116],"GOP;":[103,139],"as":[104,141,188,190],"not":[108],"that":[109,165],"much":[110],"number":[113],"high-band":[115],"will":[119],"be":[120],"reduced.":[121],"As":[122],"high":[126],"intensity,":[128,148],"MVDs":[131,150],"P":[135,154],"frames":[136,155],"while":[140],"those":[143],"medium":[145],"or":[146],"low":[147],"only":[149],"parts":[152],"encrypt.":[161],"Experiments":[162],"have":[163],"shown":[164],"compared":[166],"existing":[169],"algorithm":[170],"SEH264,":[172],"proposed":[174,195],"can":[179],"provide":[180],"good":[181],"performance":[182],"both":[184],"aspects":[185],"security":[187],"well":[189],"computational":[191],"complexity.":[192],"Moreover,":[193],"implemented":[199],"entirely":[200],"format-compliant":[206],"without":[211],"influence":[212],"on":[213],"compression":[215],"ratio.":[216]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
