메뉴 건너뛰기




Volumn 3677 LNCS, Issue , 2005, Pages 98-107

Selective image encryption using JBIG

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; IMAGE CODING; IMAGE PROCESSING; SECURITY OF DATA;

EID: 33646133882     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11552055_10     Document Type: Conference Paper
Times cited : (23)

References (25)
  • 2
    • 32544451472 scopus 로고    scopus 로고
    • Limitations of existing MPEG-1 ciphers for streaming video
    • Swinburne University, Australia, April
    • Jason But. Limitations of existing MPEG-1 ciphers for streaming video. Technical Report CAIA 040429A, Swinburne University, Australia, April 2004.
    • (2004) Technical Report , vol.CAIA 040429A
    • But, J.1
  • 3
    • 0032187555 scopus 로고    scopus 로고
    • Virtual image cryptosystem based upon vector quantization
    • October
    • T. S. Chen, C. C. Chang, and M. S. Hwang. Virtual image cryptosystem based upon vector quantization. IEEE Transactions on Image Processing, 7(10): 1485-1488, October 1998.
    • (1998) IEEE Transactions on Image Processing , vol.7 , Issue.10 , pp. 1485-1488
    • Chen, T.S.1    Chang, C.C.2    Hwang, M.S.3
  • 4
    • 0034249821 scopus 로고    scopus 로고
    • Partial encryption of compressed images and videos
    • H. Cheng and X. Li. Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8):2439-2451, 2000.
    • (2000) IEEE Transactions on Signal Processing , vol.48 , Issue.8 , pp. 2439-2451
    • Cheng, H.1    Li, X.2
  • 9
    • 17644382747 scopus 로고    scopus 로고
    • B. Furht and D. Kirovski, editors. CRC Press, Boca Raton, Florida
    • B. Furht and D. Kirovski, editors. Multimedia Security Handbook. CRC Press, Boca Raton, Florida, 2005.
    • (2005) Multimedia Security Handbook
  • 10
    • 0035765561 scopus 로고    scopus 로고
    • Authentication and access control in the JPEG 2000 compressed domain
    • A.G. Tescher, editor, Applications of Digital Image Processing XXIV, San Diego, CA, USA, July
    • Raphaël Grosbois, Pierre Gerbelot, and Touradj Ebrahimi. Authentication and access control in the JPEG 2000 compressed domain. In A.G. Tescher, editor, Applications of Digital Image Processing XXIV, volume 4472 of Proceedings of SPIE, pages 95-104, San Diego, CA, USA, July 2001.
    • (2001) Proceedings of SPIE , vol.4472 , pp. 95-104
    • Grosbois, R.1    Gerbelot, P.2    Ebrahimi, T.3
  • 13
    • 0031273788 scopus 로고    scopus 로고
    • Image compression and encryption using tree structure
    • X. Li, J. Knipe, and H. Cheng. Image compression and encryption using tree structure. Pattern Recognition Letters, 18:1253-1259, 1997.
    • (1997) Pattern Recognition Letters , vol.18 , pp. 1253-1259
    • Li, X.1    Knipe, J.2    Cheng, H.3
  • 14
    • 2542595488 scopus 로고    scopus 로고
    • Selective encryption for consumer applications
    • T. D. Lookabaugh and D. C. Sicker. Selective encryption for consumer applications. IEEE Communications Magazine, 42(5): 124-129, 2004.
    • (2004) IEEE Communications Magazine , vol.42 , Issue.5 , pp. 124-129
    • Lookabaugh, T.D.1    Sicker, D.C.2
  • 15
    • 2342614127 scopus 로고    scopus 로고
    • Security analysis of selectively encrypted MPEG-2 streams
    • Multimedia Systems and Applications VI, September
    • T. D. Lookabaugh, D. C. Sicker, D. M. Keaton, W. Y. Guo, and I. Vedula. Security analysis of selectively encrypted MPEG-2 streams. In Multimedia Systems and Applications VI, volume 5241 of Proceedings of SPIE, pages 10-21, September 2003.
    • (2003) Proceedings of SPIE , vol.5241 , pp. 10-21
    • Lookabaugh, T.D.1    Sicker, D.C.2    Keaton, D.M.3    Guo, W.Y.4    Vedula, I.5
  • 17
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • June
    • Benoit M. Macq and Jean-Jacques Quisquater. Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6):944-957, June 1995.
    • (1995) Proceedings of the IEEE , vol.83 , Issue.6 , pp. 944-957
    • Macq, B.M.1    Quisquater, J.-J.2
  • 18
    • 35248871615 scopus 로고    scopus 로고
    • Selective encryption of the JPEG2000 bitstream
    • A. Lioy and D. Mazzocchi, editors, Communications and Multimedia Security. Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '03, Turin, Italy, October. Springer-Verlag
    • Roland Norcen and Andreas Uhl. Selective encryption of the JPEG2000 bitstream. In A. Lioy and D. Mazzocchi, editors, Communications and Multimedia Security. Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '03, volume 2828 of Lecture Notes on Computer Science, pages 194 - 204, Turin, Italy, October 2003. Springer-Verlag.
    • (2003) Lecture Notes on Computer Science , vol.2828 , pp. 194-204
    • Norcen, R.1    Uhl, A.2
  • 19
    • 33646144108 scopus 로고    scopus 로고
    • Selective bitplane encryption for secure transmission of image data in mobile environments
    • Tromso-Trondheim, Norway, October. IEEE Norway Section, file cr1037.pdf
    • M. Podesser, H.-P. Schmidt, and A. Uhl. Selective bitplane encryption for secure transmission of image data in mobile environments. In CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002. IEEE Norway Section, file cr1037.pdf.
    • (2002) CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002)
    • Podesser, M.1    Schmidt, H.-P.2    Uhl, A.3
  • 20
    • 2642538533 scopus 로고    scopus 로고
    • Application scenarios for selective encryption of visual data
    • J. Dittmann, J. Pridrich, and P. Wohlmacher, editors, Juan-les-Pins, Prance, December
    • A. Pommer and A. Uhl. Application scenarios for selective encryption of visual data. In J. Dittmann, J. Pridrich, and P. Wohlmacher, editors, Multimedia and Security Workshop, ACM Multimedia, pages 71-74, Juan-les-Pins, Prance, December 2002.
    • (2002) Multimedia and Security Workshop, ACM Multimedia , pp. 71-74
    • Pommer, A.1    Uhl, A.2
  • 21
    • 1442284159 scopus 로고    scopus 로고
    • Selective encryption of wavelet-packet encoded image data - Efficiency and security
    • A. Pommer and A. Uhl. Selective encryption of wavelet-packet encoded image data - efficiency and security. A CM Multimedia Systems (Special issue on Multimedia Security), 9(3):279-287, 2003.
    • (2003) ACM Multimedia Systems (Special Issue on Multimedia Security) , vol.9 , Issue.3 , pp. 279-287
    • Pommer, A.1    Uhl, A.2
  • 23
    • 0030409661 scopus 로고    scopus 로고
    • Multi-resolution access control algorithm based on fractal coding
    • Lausanne, Switzerland, September. IEEE Signal Processing Society
    • Stephane Roche, Jean-Luc Dugelay, and R. Molva. Multi-resolution access control algorithm based on fractal coding. In Proceedings of the IEEE International Conference on Image Processing (ICIP'96), pages 235-238, Lausanne, Switzerland, September 1996. IEEE Signal Processing Society.
    • (1996) Proceedings of the IEEE International Conference on Image Processing (ICIP'96) , pp. 235-238
    • Roche, S.1    Dugelay, J.-L.2    Molva, R.3
  • 24
    • 84882624922 scopus 로고    scopus 로고
    • Image and Video Encryption. From Digital Rights Management to Secured Personal Communication, Springer-Verlag
    • A. Uhl and A. Pommer. Image and Video Encryption. From Digital Rights Management to Secured Personal Communication, volume 15 of Advances in Information Security. Springer-Verlag, 2005.
    • (2005) Advances in Information Security , vol.15
    • Uhl, A.1    Pommer, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.