Region of interest signalling for encrypted JPEG images
暂无分享,去创建一个
[1] Itu-T and Iso Iec Jtc. Advanced video coding for generic audiovisual services , 2010 .
[2] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[3] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[4] Heiko Schwarz,et al. Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[5] Aamir Saeed Malik,et al. On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images , 2010, FGIT-SIP/MulGraB.
[6] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[7] Ian H. Witten,et al. Arithmetic coding for data compression , 1987, CACM.
[8] Lih-Chyau Wuu,et al. High Embedding Reversible Data Hiding Scheme for JPEG , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[9] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[10] Andreas Uhl,et al. Length-preserving bit-stream-based JPEG encryption , 2012, MM&Sec '12.
[11] Michael D. Adams. The JPEG-2000 Still Image Compression Standard � ( Last Revised : June 30 , 2001 ) , 2001 .
[12] Ping-Sing Tsai,et al. JPEG: Still Image Compression Standard , 2005 .
[13] Touradj Ebrahimi,et al. The JPEG 2000 still image compression standard , 2001, IEEE Signal Process. Mag..
[14] Dominik Engel,et al. Methods for the anisotropic wavelet packet transform , 2008 .
[15] C. Kailasanathan,et al. Compression performance of JPEG encryption scheme , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).
[16] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[17] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[18] Gregory K. Wallace,et al. The JPEG Still Image Compression Standard , 1991 .
[19] Dominik Engel. Conditional access smart meter privacy based on multi-resolution wavelet analysis , 2011, ISABEL '11.
[20] Chia-Chen Lin,et al. DCT-based Reversible Data Hiding Scheme , 2010 .
[21] Hari Kalva,et al. Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..
[22] Alan C. Bovik,et al. A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms , 2006, IEEE Transactions on Image Processing.
[23] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[24] T.E. Boult,et al. PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).