Documente Academic
Documente Profesional
Documente Cultură
lectiveencryptionaremoresignalprocessingthancryptog-
Abstract | Encryption is one of the fundamental technolo- vide faster encryption by encrypting only a small portion
whoseencryptionwillguaranteethattheadversarycan-
gies that is used in digital rights management. Unlike ordi-
notrecoverusefulinformationabouttheoriginalimageor
nary computer applications, multimedia applications gener- video.
secondapproach.Thatis,thecompressionandencryption
approach.
ofthedataisdoneinasinglestep.TheencryptioninMHT
Keywords | multimedia encryption, cryptanalysis, multi-
[30]isachievedbyusingdierentHumantablesfordier-
ple Human tables, arithmetic coding, key-based interval
entinputsymbols.Thetablesaswellastheorderinwhich
splitting, randomized arithmetic coding
theyareappliedarekeptsecret.KSAC[31]isdesignedto
plications generate large amounts of data that has to be Our analysis shows that both MHT and KSAC are vul-
processed in real time. Hence, a number of techniques for nerable to known plaintext attacks. We do not provide any
real-time encryption of multimedia data have been pro- attacks on RAC. However, we point out that the scheme
posed in the past years. Two common approaches to real- is expected to be less ecient than the standard approach
time multimedia data encryption are selective encryption since a generation of one pseudorandom bit per input bi-
[5{19] and entropy coding that provides encryption [20{28]. nary symbol is required.
The authors are with the Department of Electrical and Computer overview of the schemes that are analyzed here. Known-
tion under the grant NSF 0627688. Section IV. The paper ends with concluding remarks.
2
II. Preliminaries
A. Overview of MHT 0 n 1
1. 9
n is 128.
If the program works for you, please click "Buy Now" to register it.
word lengths for each symbol encoded with the four basic
trees mutated from dierent basic trees are used. This fact
3
3