Secure transcoding with JPSEC confidentiality and authentication.
Susie J. WeeJohn G. ApostolopoulosPublished in: ICIP (2004)
Keyphrases
- data encryption
- data confidentiality
- authentication mechanism
- identity management
- user authentication
- authentication scheme
- access control
- security properties
- security mechanisms
- security requirements
- security analysis
- password authentication
- authentication protocol
- factor authentication
- integrity verification
- key distribution
- information security
- secure manner
- data quality
- key agreement
- data security
- secure communication
- information leakage
- security services
- security protocols
- transform domain
- smart card
- security issues
- mutual authentication
- rights management
- user privacy
- electronic payment
- public key encryption
- sensitive data
- key management
- video streams
- encryption decryption
- bitstream
- public key infrastructure
- digital signature
- video quality
- public key
- key exchange protocol
- data integrity
- private key
- confidential data
- key agreement protocol
- cloud computing
- bit rate
- public key cryptography
- trusted platform module
- cryptographic protocols
- trusted computing
- trusted third party