JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Parametrization of Discrete Finite Biorthogonal Wavelets with Linear Phase
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97)-Volume 3 - Volume 3
Protection of wavelet-based watermarking systems using filter parametrization
Signal Processing - Special section: Security of data hiding technologies
Are parameterised biorthogonal wavelet filters suited (better) for selective encryption?
Proceedings of the 2004 workshop on Multimedia and security
Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security)
Robustness and security of a wavelet-based CBIR hashing algorithm
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
EURASIP Journal on Information Security
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
Journal of Real-Time Image Processing
A Comparative Survey on Cryptology-Based Methodologies
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Lightweight encryption offers a cogent alternative to full encryption of visual content in application settings with clients of low processing power, e.g. mobile applications, as it counterbalances security demands and computational demands. We present a lightweight transparent encryption scheme for JPEG 2000 that is based on and integrated into the wavelet lifting scheme. Keys are constructed from parameterized biorthogonal filters. The proposed method comes at extremely low computational cost and provides natural support for transparent encryption. We discuss the advantages and disadvantages of this encryption scheme with respect to keyspace, computational demands, compression performance, and security.