{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T05:15:52Z","timestamp":1776834952814,"version":"3.51.2"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/tcsvt.2011.2129090","type":"journal-article","created":{"date-parts":[[2011,3,17]],"date-time":"2011-03-17T20:06:12Z","timestamp":1300392372000},"page":"565-576","source":"Crossref","is-referenced-by-count":133,"title":["Fast Protection of H.264\/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames"],"prefix":"10.1109","volume":"21","author":[{"given":"Z","family":"Shahid","sequence":"first","affiliation":[]},{"given":"M","family":"Chaumont","sequence":"additional","affiliation":[]},{"given":"W","family":"Puech","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2007","journal-title":"Method and system for fast context based adaptive binary arithmetic coding"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.808817"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/244130.244209"},{"key":"ref31","author":"stinson","year":"2005","journal-title":"Cryptography Theory and Practice (Discrete Mathematics and Its Applications)"},{"key":"ref30","first-page":"2201","article-title":"Fast protection of H.264\/AVC by selective encryption of CABAC for I&#38;P frames","author":"shahid","year":"2009","journal-title":"Proc 15th EUSIPCO"},{"key":"ref37","first-page":"831","article-title":"A new concept of security camera monitoring with privacy protection by masking moving objects","volume":"1","author":"yabuta","year":"2005","journal-title":"Proc Adv Multimedia Inf Process"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.854469"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815168"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2002.800321"},{"key":"ref10","first-page":"821","article-title":"Layered encryption techniques for DCT-coded visual data","author":"fisch","year":"2004","journal-title":"Proc 12th EUSIPCO"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.879919"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.917355"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.861589"},{"key":"ref14","first-page":"496","article-title":"NAL level encryption for scalable video coding","author":"li","year":"2008","journal-title":"Proc PCM"},{"key":"ref15","first-page":"281","article-title":"Selective video encryption based on advanced video coding","author":"lian","year":"2005","journal-title":"Proc PCM"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.896635"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.839623"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1299355"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.11.010"},{"key":"ref28","author":"schneier","year":"1995","journal-title":"Applied Cryptography"},{"key":"ref4","author":"bjontegaard","year":"2002","journal-title":"Context-Adaptive VLC Coding of Coefficients"},{"key":"ref27","first-page":"1126","article-title":"Measuring the strength of partial encryption scheme","volume":"2","author":"said","year":"2005","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/978-3-642-05445-7_19","article-title":"Format-preserving encryption","author":"bellare","year":"2009","journal-title":"Proc 16th Annu Int Workshop Selected Areas Cryptography"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/78.852023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1142\/9789814277563_0002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/429581"},{"key":"ref8","first-page":"90","article-title":"Techniques for a selective encryption of uncompressed and compressed images","author":"droogenbroeck","year":"2002","journal-title":"Proc ACIVS"},{"key":"ref7","author":"daemen","year":"2002","journal-title":"AES proposal The Rijndael clock cipher"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2010.V2.141"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"key":"ref1","year":"2003","journal-title":"Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec H 264\/ISO\/IEC 14496-10 AVC)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815173"},{"key":"ref22","author":"moccagatta","year":"2002","journal-title":"A Performance Comparison of CABAC and VCL-Based Entropy Coders for SD and HD Sequences"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.002"},{"key":"ref24","first-page":"1481","article-title":"A new crypto-watermarking method for medical images safe transfer","author":"puech","year":"2004","journal-title":"Proc 12th EUSIPCO"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-006-5117-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312886"},{"key":"ref25","first-page":"34","article-title":"A selective encryption for heterogenous color JPEG images based on VLC and AES stream cipher","author":"rodrigues","year":"2006","journal-title":"Proc Eur Conf CGIV"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/76\/5762411\/05733402.pdf?arnumber=5733402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:48:01Z","timestamp":1633909681000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5733402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":39,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2011.2129090","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5]]}}}