Metrika članka

  • citati u SCindeksu: [2]
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[=>]
  • posete u poslednjih 30 dana:6
  • preuzimanja u poslednjih 30 dana:6
članak: 5 od 10  
Back povratak na rezultate
Vojnotehnički glasnik
2010, vol. 58, br. 4, str. 134-154
jezik rada: srpski
vrsta rada: stručni članak
objavljeno: 17/12/2010
doi: 10.5937/vojtehg1004134J
Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi
Generalštab Vojske Srbije, Uprava za telekomunikacije i informatiku, Centar za primenjenu matematiku i elektroniku, Beograd

Sažetak

Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive sadržine. Sve više na značaju dobijaju mehanizmi kriptološke zaštite slika i video sadržaja. Tradicionalni sistemi kriptografske obrade u sistemima za prenos ovih vrsta informacija garantuju visok stepen sigurnosti, ali i imaju svoje nedostatke - visoku cenu implementacije i znatno kašnjenje u prenosu podataka. Pomenuti nedostaci se prevazilaze primenom algoritama selektivnog šifrovanja.

Ključne reči

selektivno šifrovanje; algoritam kompresije; multimedijalni sadržaj; računarske mreže

Reference

Bergeronand, C., Lamy-Bergot, C. (2005) Compliant selective encryption for H. 264/AVC video streams. u: Multimedia Signal Processing (MMSP 05), 7th IEEE Workshop, Shanghai, China, Proceedings, page 1-4
Jiangtao, W., Severa, M., Wenjun, Z., Luttrell, M.H., Weiyin, J. (2002) A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology, 12(6): 545-557
Lookabaugh, T. (2004) Selective encryption, information theory, and compression. u: Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, vol. 1, page 373-376, Calif, USA
Lundin, R., Lindskog, S., Brunstrom, A., Fischer-Hubner, S. (2005) Measuring confidentiality of selectively encrypted messages using guesswork. u: Proceedings of the 3rd Swedish National Computer Networking Workshop (SNCNW 05), Halmstad, Sweden, str. 99-102
Meyer, J., Gadegast, F. (1995) Security mechanisms for multimedia data with the example MPEG-1 video. u: Project Description of SECMPEG, Technical University of Berlin
Norcen, R., Uhl, A. (2003) Selective encryption of the JPEG2000 bitstream. u: Communications and Multimedia Security, Lecture Notes in Computer Science, Berlin: Springer, vol. 2828, page 194-204
Podesser, M., Schmidt, H.P., Uh, I.A. (2002) Selective bitplane encryption for secure transmission of image data in mobile environments. u: Nordic Signal Processing Symposium (NORSIG 02) (V), Tromsø, Norway, Proceedings
Sadourny, Y., Conan, V. (2003) A proposal for supporting selective encryption in JPSEC. IEEE Transactions on Consumer Electronics, 49(4): 846-849
Shannon, C.E. (1949) Communication theory of secrecy systems. Bell System Technical Journal, vol. 28, str. 656-715
Shi, C., Bhargava, B. (1998) A fast MPEG video encryption algorithm. u: ACM International Conference on Multimedia (6), Proceedings, Bristol, str. 81-88
Shi, C., Bhargava, B. (1998) An efficient MPEG video encryption algorithm. u: Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems (SRDS ‘98), West Lafayette, page. 381-386
Shi, C., Wang, S.Y., Bhargava, B. (1999) MPEG video encryption in real-time using secret key cryptography. u: International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 99), Proceedings, Las Vegas, page. 191- 201
Spanos, G.A., Maples, T.B. (1995) Performance study of a selective encryption scheme for the security of networked, realtime video. u: International Conference on Computer Communications and Networks (4) (ICCCN 95), Las Vegas, proceedings, page 2-10
Tang, L. (1996) Methods for encrypting and decrypting MPEG video data effiently. u: A.C.M. International Multimedia Conference and Exhibition (4), Proceedings, Boston, str. 219-229