Joint image encryption and compression schemes based on 16 × 16 DCT
暂无分享,去创建一个
Kwok-Tung Lo | Peiya Li | K. Lo | Peiya Li
[1] Shuyuan Zhu,et al. Design of New Unitary Transforms for Perceptual Video Encryption , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[2] Osama S. Faragallah. Efficient confusion–diffusion chaotic image cryptosystem using enhanced standard map , 2015, Signal Image Video Process..
[3] Balasubramanian Raman,et al. Combinational domain encryption for still visual data , 2011, Multimedia Tools and Applications.
[4] A. Jantan,et al. An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , 2008 .
[5] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[6] Sen Bai,et al. A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding , 2015, Commun. Nonlinear Sci. Numer. Simul..
[7] Shuyuan Zhu,et al. Partial Video Encryption Based on Alternating Transforms , 2009, IEEE Signal Processing Letters.
[8] Moncef Gabbouj,et al. Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms , 2014, IEEE Transactions on Information Forensics and Security.
[9] Oscar C. Au,et al. Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table , 2007, IEEE Signal Processing Letters.
[10] Kavitha Chandranbabu,et al. Crypt analysis of an image encryption algorithm and an enhanced scheme , 2016 .
[11] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[12] Hang Zhou,et al. Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.
[13] Hitoshi Kiya,et al. On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[14] Yuan Yan Tang,et al. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.
[15] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.
[16] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[17] Hitoshi Kiya,et al. An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).
[18] K. P. Subbalakshmi,et al. Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.
[19] Hitoshi Kiya,et al. An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[20] Z. Guan,et al. Chaos-based image encryption algorithm ✩ , 2005 .
[21] Shiguo Lian,et al. Multimedia Content Encryption: Techniques and Applications , 2008 .
[22] Shuyuan Zhu,et al. Perceptual video encryption using multiple 8×8 transforms in H.264 and MPEG-4 , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Kwok-Tung Lo,et al. A Content-Adaptive Joint Image Compression and Encryption Scheme , 2018, IEEE Transactions on Multimedia.
[24] Abhijit Mitra,et al. A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .
[25] Kiyoshi Tanaka,et al. Beyond format-compliant encryption for JPEG image , 2015, Signal Process. Image Commun..
[26] Weihai Li,et al. A leak and its remedy in JPEG image encryption , 2007, Int. J. Comput. Math..
[27] Kwok-Tung Lo,et al. Joint image compression and encryption based on alternating transforms with quality control , 2015, 2015 Visual Communications and Image Processing (VCIP).
[28] Kwok-Tung Lo,et al. Joint image compression and encryption based on order-8 alternating transforms , 2017, J. Vis. Commun. Image Represent..
[29] Manish Kumar,et al. An RGB image encryption using diffusion process associated with chaotic map , 2015, J. Inf. Secur. Appl..
[30] Nikolaos G. Bourbakis,et al. Image and video encryption using SCAN patterns , 2004, Pattern Recognit..
[31] P. S. Avadhani,et al. Permutation based Image Encryption Technique , 2011 .
[32] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[33] Guanrong Chen,et al. YET ANOTHER CHAOTIC ATTRACTOR , 1999 .
[34] Shaoming Pan,et al. A content security protection scheme in JPEG compressed domain , 2014, J. Vis. Commun. Image Represent..
[35] Di Xiao,et al. GLS coding based security solution to JPEG with the structure of aggregated compression and encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..
[36] Kun He,et al. Robust and Secure Image Encryption Schemes During JPEG Compression Process , 2016, IMAWM.