-
1
-
-
0029248912
-
Radiologic image compression - A review
-
Wong S., Zaremba L., Gooden D., Huang H.K. Radiologic image compression - a review. Proc. IEEE. 83(2):1995;194-219.
-
(1995)
Proc. IEEE
, vol.83
, Issue.2
, pp. 194-219
-
-
Wong, S.1
Zaremba, L.2
Gooden, D.3
Huang, H.K.4
-
2
-
-
0028445482
-
Evaluating quality of compressed medical images: SNR, subjective rating, and diagnostic accuracy
-
Cosman P.C., Gray R.M., Olshen R.A. Evaluating quality of compressed medical images. SNR, subjective rating, and diagnostic accuracy Proc. IEEE. 82(6):1994;919-932.
-
(1994)
Proc. IEEE
, vol.82
, Issue.6
, pp. 919-932
-
-
Cosman, P.C.1
Gray, R.M.2
Olshen, R.A.3
-
3
-
-
0034658035
-
Selective medical image compression techniques for telemedical and archiving applications
-
Bruckmann A., Uhl A. Selective medical image compression techniques for telemedical and archiving applications. Comput. Biol. Med. 30(3):2000;153-169.
-
(2000)
Comput. Biol. Med.
, vol.30
, Issue.3
, pp. 153-169
-
-
Bruckmann, A.1
Uhl, A.2
-
4
-
-
0242500811
-
Virtual coronary cineangiography
-
to appear
-
I.L. Bajec, P. Trunk, N. Zimic, D. Oseli, Virtual coronary cineangiography, Comput. Biol. Med. (2003), to appear.
-
(2003)
Comput. Biol. Med.
-
-
Bajec, I.L.1
Trunk, P.2
Zimic, N.3
Oseli, D.4
-
5
-
-
0037408260
-
Topical cardiac cooling - computer simulation of myocardial temperature changes
-
to appear
-
P. Trunk, B. Gersak, R. Trobec, Topical cardiac cooling - computer simulation of myocardial temperature changes, Comput. Biol. Med. (2003), to appear.
-
(2003)
Comput. Biol. Med.
-
-
Trunk, P.1
Gersak, B.2
Trobec, R.3
-
7
-
-
0003855464
-
Protocols, Algorithms and Source Code in C, Wiley Publishers, New York
-
B. Schneier, Applied Cryptography, 2nd Edition: Protocols, Algorithms and Source Code in C, Wiley Publishers, New York, 1996.
-
(1996)
Applied Cryptography, 2nd Edition
-
-
Schneier, B.1
-
9
-
-
85056396217
-
-
I. Agi, L. Gong, An empirical study of secure MPEG video transmissions, in: ISOC Symposium on Network and Distributed Systems Security, San Diego, CA, 1996, pp. 137-144.
-
(1996)
I. Agi, L. Gong, An empirical study of secure MPEG video transmissions, in: ISOC Symposium on Network and Distributed Systems Security, San Diego, CA
, pp. 137-144
-
-
-
10
-
-
0033315375
-
Improved selective encryption techniques for secure transmission of MPEG video bit-streams
-
A.M. Alattar, G.I. Al-Regib, S.A. Al-Semari, Improved selective encryption techniques for secure transmission of MPEG video bit-streams, in: Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP'99), IEEE Signal Processing Society, 1999.
-
(1999)
Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP'99), IEEE Signal Processing Society
-
-
Alattar, A.M.1
Al-Regib, G.I.2
Al-Semari, S.A.3
-
11
-
-
0242641409
-
-
Thomas Kunkelmann, Applying encryption to video communication
-
Thomas Kunkelmann, Applying encryption to video communication, in: Proceedings of the Multimedia and Security Workshop at ACM Multimedia '98, Bristol, England, September 1998, pp. 41-47.
-
(1998)
Proceedings of the Multimedia and Security Workshop at ACM Multimedia '98, Bristol, England, September
, pp. 41-47
-
-
-
12
-
-
0029424437
-
-
T. Maples, G. Spanos, Performance study of a selective encryption scheme for the security of networked real-time video, in: Proceedings of the Fourth International Conference on Computer Communications and Networks (ICCCN'95), Las Vegas, NV
-
T. Maples, G. Spanos, Performance study of a selective encryption scheme for the security of networked real-time video, in: Proceedings of the Fourth International Conference on Computer Communications and Networks (ICCCN'95), Las Vegas, NV, 1995.
-
(1995)
-
-
-
13
-
-
85031189217
-
-
P.A. Schneck, K. Schwan, Authenticast: an adaptive protocol for high-performance, secure network applications, Technical Report, Georgia Institute of Technology, Atlanta, GA, USA, 1997.
-
P.A. Schneck, K. Schwan, Authenticast: an adaptive protocol for high-performance, secure network applications, Technical Report, Georgia Institute of Technology, Atlanta, GA, USA, 1997.
-
-
-
-
14
-
-
84905857886
-
-
C. Shi, B. Bhargava, A fast MPEG video encryption algorithm, in: Proceedings of the ACM Multimedia 1998, Boston, USA, 1998, pp. 81-88.
-
C. Shi, B. Bhargava, A fast MPEG video encryption algorithm, in: Proceedings of the ACM Multimedia 1998, Boston, USA, 1998, pp. 81-88.
-
-
-
-
15
-
-
0030419062
-
-
L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, in: Proceedings of the ACM Multimedia 1996, Boston, USA, November 1996, pp. 219-229.
-
L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, in: Proceedings of the ACM Multimedia 1996, Boston, USA, November 1996, pp. 219-229.
-
-
-
-
16
-
-
85031185200
-
-
Tsung-Li Wu, S. Felix Wu, Selective encryption and watermarking of MPEG video (extended abstract), in: H.R. Arabnia (Ed.), Proceedings of the International Conference on Image Science, Systems, and Technology, CISST '97, Las Vegas, USA, February 1997.
-
Tsung-Li Wu, S. Felix Wu, Selective encryption and watermarking of MPEG video (extended abstract), in: H.R. Arabnia (Ed.), Proceedings of the International Conference on Image Science, Systems, and Technology, CISST '97, Las Vegas, USA, February 1997.
-
-
-
-
17
-
-
0033279372
-
-
Wenjun Zeng, Shawmin Lei, Efficient frequency domain video scrambling for content access control, in: Proceedings of ACM Multimedia, 1999, Orlando, FL, USA, November 1999, pp. 285-293.
-
Wenjun Zeng, Shawmin Lei, Efficient frequency domain video scrambling for content access control, in: Proceedings of ACM Multimedia, 1999, Orlando, FL, USA, November 1999, pp. 285-293.
-
-
-
-
18
-
-
0035765561
-
-
Raphaël Grosbois, Pierre Gerbelot, Touradj Ebrahimi, Authentication and access control in the JPEG 2000 compressed domain, in: A.G. Tescher (Ed.), Applications of Digital Image Processing XXIV, Proceedings of SPIE, Vol. 4472, San Diego, CA, USA, July 2001.
-
Raphaël Grosbois, Pierre Gerbelot, Touradj Ebrahimi, Authentication and access control in the JPEG 2000 compressed domain, in: A.G. Tescher (Ed.), Applications of Digital Image Processing XXIV, Proceedings of SPIE, Vol. 4472, San Diego, CA, USA, July 2001.
-
-
-
-
19
-
-
0034780691
-
-
A. Pommer, A. Uhl, Wavelet packet methods for multimedia compression and encryption, in: Proceedings of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, Canada, August 2001, IEEE Signal Processing Society, 2001, pp. 1-4.
-
A. Pommer, A. Uhl, Wavelet packet methods for multimedia compression and encryption, in: Proceedings of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, Canada, August 2001, IEEE Signal Processing Society, 2001, pp. 1-4.
-
-
-
-
20
-
-
85031180657
-
-
A. Pommer, A. Uhl, Selective encryption of wavelet packet subband structures for obscured transmission of visual data, in: Proceedings of the Third IEEE Benelux Signal Processing Symposium (SPS 2002), Leuven, Belgium, March 2002, IEEE Benelux Signal Processing Chapter, 2002, pp. 25-28.
-
A. Pommer, A. Uhl, Selective encryption of wavelet packet subband structures for obscured transmission of visual data, in: Proceedings of the Third IEEE Benelux Signal Processing Symposium (SPS 2002), Leuven, Belgium, March 2002, IEEE Benelux Signal Processing Chapter, 2002, pp. 25-28.
-
-
-
-
21
-
-
85031179965
-
-
T. Uehara, R. Safavi-Naini, P. Ogunbona, Securing wavelet compression with random permutations, in: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, December 2000, IEEE Signal Processing Society, pp. 332-335.
-
T. Uehara, R. Safavi-Naini, P. Ogunbona, Securing wavelet compression with random permutations, in: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, December 2000, IEEE Signal Processing Society, pp. 332-335.
-
-
-
-
22
-
-
85031191119
-
-
H. Cheng, X. Li, On the application of image decomposition to image compression and encryption, in: P. Horster (Ed.), Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS '96, Essen, Germany, September 1996, Chapman & Hall, London, pp. 116-127.
-
H. Cheng, X. Li, On the application of image decomposition to image compression and encryption, in: P. Horster (Ed.), Communications and Multimedia Security II, IFIP TC6/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS '96, Essen, Germany, September 1996, Chapman & Hall, London, pp. 116-127.
-
-
-
-
23
-
-
0034249821
-
Partial encryption of compressed images and videos
-
Cheng H., Li X. Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8):2000;2439-2451.
-
(2000)
IEEE Trans. Signal Process.
, vol.48
, Issue.8
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.2
-
24
-
-
85031183569
-
-
M. Podesser, H.-P. Schmidt, A. Uhl, Selective bitplane encryption for secure transmission of image data in mobile environments, CD-ROM in: Proceedings of the Fifth IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002, file cr1037.pdf, IEEE Norway Section.
-
M. Podesser, H.-P. Schmidt, A. Uhl, Selective bitplane encryption for secure transmission of image data in mobile environments, CD-ROM in: Proceedings of the Fifth IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002, file cr1037.pdf, IEEE Norway Section.
-
-
-
-
25
-
-
0034789049
-
-
Ali Saman Tosun, Wu Chi Feng, On error preserving encryption algorithms for wireless video transmission, in: ACM Multimedia 2001, Ottawa, Canada, October 2001, pp. 302-307.
-
Ali Saman Tosun, Wu Chi Feng, On error preserving encryption algorithms for wireless video transmission, in: ACM Multimedia 2001, Ottawa, Canada, October 2001, pp. 302-307.
-
-
-
-
26
-
-
0035791314
-
-
J. Wen, M. Severa, W. Zeng, M. Luttrell, W. Jin, A format-compliant configurable encryption framework for access control of multimedia, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, MMSP '01, Cannes, France, October 2001, pp. 435-440.
-
J. Wen, M. Severa, W. Zeng, M. Luttrell, W. Jin, A format-compliant configurable encryption framework for access control of multimedia, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, MMSP '01, Cannes, France, October 2001, pp. 435-440.
-
-
-
-
27
-
-
85031192149
-
-
C.J. Skrepth, A. Uhl, Selective encryption of visual data: classification of application scenarios and comparison of techniques for lossless environments, in: B. Jerman-Blazic, T. Klobucar (Eds.), Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '02, Portoroz, Slovenia, September 2002, Kluwer Academic Publishing, Dordrecht, 2002, pp. 213-226.
-
C.J. Skrepth, A. Uhl, Selective encryption of visual data: classification of application scenarios and comparison of techniques for lossless environments, in: B. Jerman-Blazic, T. Klobucar (Eds.), Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '02, Portoroz, Slovenia, September 2002, Kluwer Academic Publishing, Dordrecht, 2002, pp. 213-226.
-
-
-
-
28
-
-
0030127507
-
A review of wavelets in biomedical applications
-
Unser M., Aldroubi A. A review of wavelets in biomedical applications. Proc. IEEE. 84(4):1996;626-638.
-
(1996)
Proc. IEEE
, vol.84
, Issue.4
, pp. 626-638
-
-
Unser, M.1
Aldroubi, A.2
-
29
-
-
85031183942
-
-
A. Aldroubi, M. Unser (Eds.), Wavelets in Medicine and Biology, CRC, Boca Raton, FL, USA, 1996.
-
A. Aldroubi, M. Unser (Eds.), Wavelets in Medicine and Biology, CRC, Boca Raton, FL, USA, 1996.
-
-
-
-
30
-
-
85031180378
-
-
P.N. Topiwala (Ed.), Wavelet Image and Video Compression, Kluwer Academic Publishers Group, Boston, 1998.
-
P.N. Topiwala (Ed.), Wavelet Image and Video Compression, Kluwer Academic Publishers Group, Boston, 1998.
-
-
-
-
33
-
-
0034229499
-
High performance scalable image compression with EBCOT
-
note
-
Taubman D. High performance scalable image compression with EBCOT. IEEE Trans. Image Process. 9(7):2000;1158-1170 Roland Norcen and Andreas Pommer received their B.S. and M.S. (Computer Science) degrees from the Salzburg University where they are currently enrolled in a Ph.D. program. The submitted work is related to the topics of their respective Ph.D. theses. Martina Podesser and Hans-Peter Schmidt are both graduate students at the Telecommunication & Network Engineering School at Carinthia Tech Institute in Klagenfurt. Their contribution to this work has been done in the context of the system security lab which is part of the curriculum on communication networks. Andreas Uhl received the B.S. and M.S. degrees (both in Mathematics) from Salzburg University and he completed his Ph.D. on Applied Mathematics at the same University. He is currently associate professor with tenure in computer science affiliated with the Department of Scientific Computing and with the Research Institute for Software Technology. He is also part-time lecturer at the Carinthia Tech Institute. His research interests include multimedia signal processing (with emphasis on compression and security issues), parallel and distributed processing, and numbertheoretical methods in numerics.
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.7
, pp. 1158-1170
-
-
Taubman, D.1
|