-
1
-
-
0034249821
-
Partial Encryption of Compressed Images and Videos
-
August
-
Cheng, H., and Li, X. "Partial Encryption of Compressed Images and Videos." IEEE Transactions on Signal Processing, Vol. 48, No. 8, pp. 2439-2451, August 2000.
-
(2000)
IEEE Transactions on Signal Processing
, vol.48
, Issue.8
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.2
-
2
-
-
0003993602
-
Partial Encryption for Image and Video Communication
-
M.S. Thesis, University of Alberta, Edmonton, Canada
-
Cheng, H. "Partial Encryption for Image and Video Communication." M.S. Thesis, University of Alberta, Edmonton, Canada, 1998.
-
(1998)
-
-
Cheng, H.1
-
3
-
-
2342467011
-
On the Application of Image Decomposition to Image Compression and Encryption
-
Essen, Germany, September
-
Cheng, H., and Li, X. "On the Application of Image Decomposition to Image Compression and Encryption." Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security, pp. 116-127, Essen, Germany, September 1996.
-
(1996)
Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security
, pp. 116-127
-
-
Cheng, H.1
Li, X.2
-
4
-
-
0034245407
-
Image Encryption for Secure Internet Multimedia Applications
-
August
-
Dang, P.P., and Chau, P.M. "Image Encryption for Secure Internet Multimedia Applications." IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 395-403, August 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.3
, pp. 395-403
-
-
Dang, P.P.1
Chau, P.M.2
-
5
-
-
51349102340
-
Scramble All, EncryptSmall
-
visited in December
-
Jakobsson, M., Stern, J.P., and Yung, M. "Scramble All, EncryptSmall." http://www.julienstern.org/files/scramble/scra mble.html, visited in December 2002.
-
(2002)
-
-
Jakobsson, M.1
Stern, J.P.2
Yung, M.3
-
6
-
-
0022128610
-
Data Structures for Quadtree Approximation and Compression
-
September
-
Samet, H. "Data Structures for Quadtree Approximation and Compression." Communications of the ACM, Vol. 28, No. 9, pp. 973-993, September 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.9
, pp. 973-993
-
-
Samet, H.1
-
8
-
-
0020249952
-
An Effective Way to Represent Quadtrees
-
December
-
Gargantini, I. "An Effective Way to Represent Quadtrees." Communications of the ACM, Vol. 25, No. 12, pp. 905-910, December 1982.
-
(1982)
Communications of the ACM
, vol.25
, Issue.12
, pp. 905-910
-
-
Gargantini, I.1
-
9
-
-
20544447363
-
Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure
-
Beijing, China, April
-
Chan, Y.K., and Chang, C.C. "Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure." Proceedings of the Third International Symposium on Cooperative Database Systems for Advanced Applications (codas), pp. 194-199, Beijing, China, April 2001.
-
(2001)
Proceedings of the Third International Symposium on Cooperative Database Systems for Advanced Applications (codas)
, pp. 194-199
-
-
Chan, Y.K.1
Chang, C.C.2
-
10
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
February
-
Rivest, R., Shamir, A., and Adleman, L. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems." Communications of the ACM, Vol. 21, No. 2, pp. 120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|