Joint SPIHT compression and selective encryption
暂无分享,去创建一个
[1] Martin Boesgaard,et al. Rabbit: A New High-Performance Stream Cipher , 2003, FSE.
[2] Ranjan Bose,et al. A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[3] Vania Conan,et al. A proposal for supporting selective encryption in JPSEC , 2003, IEEE Trans. Consumer Electron..
[4] Safya Belghith,et al. Joint compression and encryption using chaotically mutated Huffman trees , 2010 .
[5] Jerome M. Shapiro,et al. Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..
[6] Hyungjin Kim,et al. Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.
[7] Mostafa Kaveh,et al. Blind image restoration by anisotropic regularization , 1999, IEEE Trans. Image Process..
[8] Xingyuan Wang,et al. Chaos-based partial encryption of SPIHT coded color images , 2013, Signal Process..
[9] Min Wu,et al. Security evaluation for communication-friendly encryption of multimedia , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[10] Shiguo Lian,et al. Perceptual cryptography on SPIHT compressed images or videos , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[11] Scott Hauck,et al. SPIHT Image Compression , 2008 .
[12] Joachim Weickert,et al. Beating the Quality of JPEG 2000 with Anisotropic Diffusion , 2009, DAGM-Symposium.
[13] Kwok-Wo Wong,et al. SPIHT-based joint image compression and encryption , 2012 .
[14] Jitendra Malik,et al. Scale-Space and Edge Detection Using Anisotropic Diffusion , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[15] Xi Chen,et al. On the design of partial encryption scheme for multimedia content , 2013, Math. Comput. Model..
[16] Rob Fergus,et al. Blind deconvolution using a normalized sparsity measure , 2011, CVPR 2011.
[17] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[18] Andreas Uhl,et al. Selective Image Encryption Using JBIG , 2005, Communications and Multimedia Security.
[19] Rastislav Lukac,et al. Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..
[20] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[21] Balasubramanian Raman,et al. Partial Encryption on SPIHT Compressed Images , 2009, PReMI.
[22] William A. Pearlman,et al. A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..
[23] Kah Phooi Seng,et al. Survey of image compression algorithms in wireless sensor networks , 2008 .
[24] Tao Xiang,et al. Degradative encryption: An efficient way to protect SPIHT compressed images , 2012 .
[25] Zhiquan Wang,et al. Chaotic secure image coding based on SPIHT , 2008, ICC 2008.
[26] Kwok-Wo Wong,et al. Chaos-based joint compression and encryption algorithm for generating variable length ciphertext , 2012, Appl. Soft Comput..
[27] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[28] Hengjian Li,et al. A flexible and secure image compression coding algorithm , 2010, 2010 International Conference on Future Information Technology and Management Engineering.
[29] Deepa Kundur,et al. Blind Image Deconvolution , 2001 .
[30] Kwok-Wo Wong,et al. A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..
[31] Kwok-Wo Wong,et al. Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.
[32] L. Rudin,et al. Nonlinear total variation based noise removal algorithms , 1992 .
[33] Andreas Uhl,et al. SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .
[34] Hengjian Li,et al. A secure and efficient entropy coding based on arithmetic coding , 2009 .
[35] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[36] Shiguo Lian,et al. A secure 3D-SPIHT codec , 2004, 2004 12th European Signal Processing Conference.
[37] Hyungjin Kim,et al. Binary arithmetic coding with key-based interval splitting , 2006, IEEE Signal Processing Letters.
[38] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[39] Henry Ker-Chang Chang,et al. A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..
[40] K. Plataniotis,et al. Privacy Protected Surveillance Using Secure Visual Object Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[41] Peyman Milanfar,et al. Robust Multichannel Blind Deconvolution via Fast Alternating Minimization , 2012, IEEE Transactions on Image Processing.
[42] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.