Image compression and encryption using tree structures
Pattern Recognition Letters - special issue on pattern recognition in practice V
Enabling Technology for the Trading of MPEG-encoded Video
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Multimedia Security Handbook
MPEG Video Encryption Algorithms
Multimedia Tools and Applications
Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security)
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Selective encryption for consumer applications
IEEE Communications Magazine
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
Partial encryption of digital contents using face detection algorithm
PRICAI'06 Proceedings of the 9th Pacific Rim international conference on Artificial intelligence
A new chaos-based image-encryption and compression algorithm
Journal of Electrical and Computer Engineering
Fast encryption of JPEG 2000 images in wireless multimedia sensor networks
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Hi-index | 0.00 |
Selective encryption techniques of JBIG encoded visual data are discussed. We are able to show attack resistance against common image processing attacks and replacement attacks even in case of restricting the amount of encryption to 1% – 2% of the data. The low encryption effort required is due to the exploitation of the interdependencies among resolution layers in the JBIG hierarchical progressive coding mode.