Simultaneous Encryption/Compression of Images Using Alpha Rooting
暂无分享,去创建一个
[1] Borko Furht,et al. Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[2] Xiaobo Li,et al. Image compression and encryption using tree structures , 1997, Pattern Recognit. Lett..
[3] Henrique S. Malvar. Adaptive run-length/Golomb-Rice encoding of quantized generalized Gaussian sources with unknown statistics , 2006, Data Compression Conference (DCC'06).
[4] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[5] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[6] Sos S. Agaian,et al. Visualization using rational morphology and zonal magnitude reduction , 1998, Electronic Imaging.
[7] Sos S. Agaian,et al. Scalable encryption using alpha rooting , 2008, SPIE Defense + Commercial Sensing.
[8] Guanrong Chen,et al. Cryptanalysis of a multistage encryption system , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[9] Chuohao Yeo,et al. On Compression of Encrypted Video , 2007, 2007 Data Compression Conference (DCC'07).
[10] Robert M. Gray,et al. Video residual coding using SPIHT and dependent optimization , 2001, Proceedings DCC 2001. Data Compression Conference.
[11] Okan K. Ersoy,et al. Transform image enhancement , 1992, Optical Society of America Annual Meeting.
[12] Aparna Gurijala,et al. On encryption-compression tradeoff of pre/post-filtered images , 2005, SPIE Optics + Photonics.
[13] Gregory L. Mayhew,et al. A low cost, high speed encryption system and method , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Shiguo Lian,et al. A novel image encryption scheme based-on JPEG encoding , 2004, Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004..
[15] Andreas Uhl,et al. Layered encryption techniques for DCT-coded visual data , 2004, 2004 12th European Signal Processing Conference.
[16] Guanrong Chen,et al. Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[17] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[18] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[19] Giovanni Motta,et al. Adaptive linear prediction lossless image coding , 1999, Proceedings DCC'99 Data Compression Conference (Cat. No. PR00096).
[20] Khalid Sayood,et al. Lossless hyperspectral image compression using context-based conditional averages , 2005, Data Compression Conference.
[21] Stefano Lonardi,et al. A compression-boosting transform for 2D data , 2005, Data Compression Conference.
[22] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[23] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[24] Amir Akhavan,et al. A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps , 2006, 2006 International Conference on Image Processing.
[25] Dragan C. Curcija,et al. Appendix A; Appendix B , 2006 .