메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 1107-1111

Image confidentiality using progressive JPEG

Author keywords

Image encryption; Layered security; Progressive JPEG

Indexed keywords

DATA REDUCTION; IMAGE PROCESSING; SCALABILITY; SCANNING; SECURITY OF DATA;

EID: 33750256609     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 34147191751 scopus 로고    scopus 로고
    • Image and Video Encryption, From Digital Rights Management to Secured Personal Communication, 15 of Advances in Information Security. Springer-Verlag, 2005
    • A. Util and A. Pommer, Image and Video Encryption, From Digital Rights Management to Secured Personal Communication, vol. 15 of Advances in Information Security. Springer-Verlag, 2005.
    • Util, A.1    Pommer, A.2
  • 2
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • June
    • B. M. Macq and J.-J. Quisquater, "Cryptology for digital TV broadcasting," Proceedings of the IEEE, vol. 83, pp. 944-957, June 1995.
    • (1995) Proceedings of the IEEE , vol.83 , pp. 944-957
    • Macq, B.M.1    Quisquater, J.-J.2
  • 5
    • 85056396217 scopus 로고    scopus 로고
    • An empirical study of secure MPEG video transmissions
    • San Diego, California, pp
    • I. Agi and L. Gong, "An empirical study of secure MPEG video transmissions," in ISOC Symposium on Network and Distributed Systems Security, (San Diego, California), pp. 137-144, 1996.
    • (1996) ISOC Symposium on Network and Distributed Systems Security , pp. 137-144
    • Agi, I.1    Gong, L.2
  • 8
    • 2342457357 scopus 로고    scopus 로고
    • A secrecy scheme for MPEG video data using the joint of compression and encryption
    • Proceedings of the 1999 Information Security Workshop ISW'99, of, Kuala Lumpur, pp, Springer-Verlag. Nov
    • S. Shin, K. Sim, and K. Rhee, "A secrecy scheme for MPEG video data using the joint of compression and encryption," in Proceedings of the 1999 Information Security Workshop (ISW'99), vol. 1729 of Lecture Notes on Computer Science, (Kuala Lumpur), pp. 191-201, Springer-Verlag. Nov. 1999.
    • (1999) Lecture Notes on Computer Science , vol.1729 , pp. 191-201
    • Shin, S.1    Sim, K.2    Rhee, K.3
  • 9
    • 0030419062 scopus 로고    scopus 로고
    • Methods for encrypting and decrypting MPEG video data efficiently
    • Boston, USA, pp, Nov
    • L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proceedings of the ACM Multimedia 1996, (Boston, USA), pp. 219-229, Nov. 1996.
    • (1996) Proceedings of the ACM Multimedia 1996 , pp. 219-229
    • Tang, L.1
  • 10
    • 2642538533 scopus 로고    scopus 로고
    • Application scenarios for selective encryption of visual data
    • J. Dittmann, J. Fridrich, and P. Wohlmacher, eds, Juan-les-Pins, France, pp, Dec
    • A. Pommer and A. Uhl, "Application scenarios for selective encryption of visual data," in Multimedia and Security Workshop, ACM Multimedia (J. Dittmann, J. Fridrich, and P. Wohlmacher, eds.), (Juan-les-Pins, France), pp. 71-74, Dec. 2002.
    • (2002) Multimedia and Security Workshop, ACM Multimedia , pp. 71-74
    • Pommer, A.1    Uhl, A.2
  • 20
    • 20444496548 scopus 로고    scopus 로고
    • Security evaluation for communication-friendly encryption of multimedia
    • Singapore, IEEE Signal Processing Society, Oct
    • Y. Mao and M. Wu, "Security evaluation for communication-friendly encryption of multimedia," in Proceedings of the IEEE International Conference on Image Processing (ICIP'04), (Singapore), IEEE Signal Processing Society, Oct. 2004.
    • (2004) Proceedings of the IEEE International Conference on Image Processing (ICIP'04)
    • Mao, Y.1    Wu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.