메뉴 건너뛰기




Volumn 9, Issue 6, 2007, Pages 1314-1324

Flexible access control to JPEG 2000 image code-streams

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; IMAGE COMMUNICATION SYSTEMS; IMAGE COMPRESSION; IMAGE QUALITY; NETWORK SECURITY;

EID: 34648841043     PISSN: 15209210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMM.2007.902865     Document Type: Article
Times cited : (9)

References (25)
  • 2
    • 0036132948 scopus 로고    scopus 로고
    • An overview of the JPEG 2000 still image compression standard
    • M. Rabbani and R. Joshi, "An overview of the JPEG 2000 still image compression standard," Signal Process.: image Commun., vol. 17, pp. 3-48, 2002.
    • (2002) Signal Process.: Image Commun , vol.17 , pp. 3-48
    • Rabbani, M.1    Joshi, R.2
  • 3
    • 34648834174 scopus 로고    scopus 로고
    • Online, Available
    • ITU-T Rec. T.800, ISO 154447 [Online]. Available: http://www.jpeg.org
    • , vol.ISO 154447 , Issue.T.800
    • Rec, I.T.U.-T.1
  • 5
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R. S. Sandhu, "Cryptographic implementation of a tree hierarchy for access control," Inform. Process. Lett., vol. 27, no. 2, pp. 95-98, 1988.
    • (1988) Inform. Process. Lett , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 6
    • 0038223809 scopus 로고
    • Access controls in object-oriented database systems - Some approaches and issues
    • E. Bertino, S. Jajodia, and P. Samarati, "Access controls in object-oriented database systems - Some approaches and issues," Adv. Database Syst., vol. 759, pp. 17-44, 1993.
    • (1993) Adv. Database Syst , vol.759 , pp. 17-44
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 7
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • R. S. Sandhu and P. Samarati, "Access control: Principle and practice," IEEE Commun. Mag., vol. 32, no. 9, pp. 40-48, 1994.
    • (1994) IEEE Commun. Mag , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 8
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 239-248, 1983.
    • (1983) ACM Trans. Comput. Syst , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 9
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Proc. Advances in Cryptology-Crypto'89
    • G. C. Chick and S. E. Tavares, "Flexible access control with master keys," in Proc. Advances in Cryptology-Crypto'89, 1990, vol. 435, LNCS, pp. 316-322.
    • (1990) LNCS , vol.435 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 10
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multi-level data security
    • L. Harn and H. Y. Lin, "A cryptographic key generation scheme for multi-level data security," J. Comput. Secur., vol. 9, no. 6, pp. 539-546, 1990.
    • (1990) J. Comput. Secur , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 11
    • 0022115074 scopus 로고
    • An optimal algorithm, for assigning cryptographic keys to access control in a hierarchy
    • S.J. MacKinnon, P. D. Taylor, H. Meijer, and S. G. Akl, "An optimal algorithm, for assigning cryptographic keys to access control in a hierarchy," IEEE Trans. Comput., vol. C-34, no. 9, pp. 797-802, 1985.
    • (1985) IEEE Trans. Comput , vol.C-34 , Issue.9 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 12
    • 0242697685 scopus 로고
    • Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme
    • K. Ohta, T. Okamoto, and K. Koyama, "Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme," in. Proc. Advances in Cryptology-Eurpcrypt'90, 1991, vol. 473, pp. 316-322.
    • (1991) Proc. Advances in Cryptology-Eurpcrypt'90 , vol.473 , pp. 316-322
    • Ohta, K.1    Okamoto, T.2    Koyama, K.3
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 637-647, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 637-647
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 0344666670 scopus 로고    scopus 로고
    • Secure scalable streaming and secure transcoding with JPEG-2000
    • S. Wee and J. Apostolopoulos, "Secure scalable streaming and secure transcoding with JPEG-2000," in Proc. IEEE Int. Conf. Image. Process., 2003, vol. 1, pp. 14-17.
    • (2003) Proc. IEEE Int. Conf. Image. Process , vol.1 , pp. 14-17
    • Wee, S.1    Apostolopoulos, J.2
  • 18
    • 33749053820 scopus 로고    scopus 로고
    • An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations
    • Jan
    • B. B. Zhu, Y. Yang, and S. Li, "An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations," in Proc. IEEE Consumer Communications and Networking Conference (CCNC), Jan. 2006, vol. 2, pp. 1124-1128.
    • (2006) Proc. IEEE Consumer Communications and Networking Conference (CCNC) , vol.2 , pp. 1124-1128
    • Zhu, B.B.1    Yang, Y.2    Li, S.3
  • 19
    • 33745406613 scopus 로고    scopus 로고
    • Information Technology-JPEG 2000 Image Coding System - Part 9: Interactivity Tools, APIs and Protocols
    • ISO/IEC FDIS 15444-9: Jul. 1
    • ISO/IEC FDIS 15444-9: Information Technology-JPEG 2000 Image Coding System - Part 9: Interactivity Tools, APIs and Protocols Jul. 1, 2004.
    • (2004)
  • 20
    • 0000675337 scopus 로고
    • Superdistribution: The concept and the architecture
    • Jul, Online, Available
    • R. Mori and M. Kawahara, "Superdistribution: The concept and the architecture," Trans. IEIEC vol. E73, no. 7, Jul. 1990 [Online]. Available: http://www.virtualschool.edu/mon/ElectronicProperty/MoriSuperdist. html
    • (1990) Trans. IEIEC , vol.E73 , Issue.7
    • Mori, R.1    Kawahara, M.2
  • 21
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • R. S. Sandhu, "Lattice-based access control models," IEEE Computer, vol. 26, no. 11, pp. 9-19, 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 23
    • 0003629991 scopus 로고
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology, Secure Hash Standard (SHS) FIPS Publ. 180-1, 1995.
    • (1995) Secure Hash Standard (SHS) FIPS Publ , pp. 180-181
  • 25
    • 34648816306 scopus 로고    scopus 로고
    • R. L. Rivest, RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992.
    • R. L. Rivest, RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.