-
1
-
-
34547311950
-
The emerging JPEG2000 security (JPSEC) standard
-
IEEE, May 2006
-
Apostolopoulos, J., Wee, S., Dufaux, F., Ebrahimi, T., Sun, Q., Zhang, Z.: The emerging JPEG2000 security (JPSEC) standard. In: Proceedings of International Symposium on Circuits and Systems, ISCAS'06. IEEE, May 2006
-
Proceedings of International Symposium on Circuits and Systems, ISCAS'06
-
-
Apostolopoulos, J.1
Wee, S.2
Dufaux, F.3
Ebrahimi, T.4
Sun, Q.5
Zhang, Z.6
-
3
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
L. Blum M. Blum M. Shub 1986 A simple unpredictable pseudo-random number generator SIAM J. Comput. 15 2 364 383
-
(1986)
SIAM J. Comput.
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
4
-
-
85075820251
-
The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression
-
Orlando, FL, USA, April
-
Bradley, J.N., Brislawn, C.M., Hopper, T.: The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression. In: SPIE Proceedings, Visual Information Processing II, vol. 1961, pp. 293-304, Orlando, FL, USA, April (1993)
-
(1993)
SPIE Proceedings, Visual Information Processing II
, vol.1961
, pp. 293-304
-
-
Bradley, J.N.1
Brislawn, C.M.2
Hopper, T.3
-
5
-
-
30644462635
-
Study and validation of tools interoperability in JPSEC
-
Tescher, A.G. (ed.) SPIE
-
Conan, V., Sadourny, Y., Jean-Marie, K., Chan, C., Wee, S., Apostolopoulos, J.: Study and validation of tools interoperability in JPSEC. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVIII, vol. 5909, p. 59090H. SPIE (2005)
-
(2005)
Applications of Digital Image Processing XXVIII
, vol.5909
-
-
Conan, V.1
Sadourny, Y.2
Jean-Marie, K.3
Chan, C.4
Wee, S.5
Apostolopoulos, J.6
-
6
-
-
68949220078
-
Symmetric block cipher based protection: Contribution to JPSEC
-
Conan, V., Sadourny, Y., Thomann, S.: Symmetric block cipher based protection: Contribution to JPSEC. ISO/IEC JTC 1/SC 29/WG 1 N 2771 (2003)
-
(2003)
ISO/IEC JTC 1/SC 29/WG 1
, Issue.N 2771
-
-
Conan, V.1
Sadourny, Y.2
Thomann, S.3
-
7
-
-
68949219428
-
-
Springer Berlin
-
Daemen J., Rijmen V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Berlin (2002)
-
(2002)
-
-
Daemen, J.1
Rijmen, V.2
-
8
-
-
68949197256
-
-
Digital Cinema Initiatives, LLC (DCI) online presentation, March
-
Digital Cinema Initiatives, LLC (DCI). Digital cinema system specification v1.2. online presentation, March (2008)
-
(2008)
Digital Cinema System Specification v1.2.
-
-
-
11
-
-
33747369216
-
Privacy enabling technology for video surveillance
-
SPIE
-
Dufaux, F., Ouaret, M., Abdeljaoued, Y., Navarro, A., Vergnenegre, F., Ebrahimi, T.: Privacy enabling technology for video surveillance. In: Proceedings of SPIE, Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6250. SPIE (2006)
-
(2006)
Proceedings of SPIE, Mobile Multimedia/Image Processing for Military and Security Applications
, vol.6250
-
-
Dufaux, F.1
Ouaret, M.2
Abdeljaoued, Y.3
Navarro, A.4
Vergnenegre, F.5
Ebrahimi, T.6
-
12
-
-
14944364243
-
JPSEC for secure imaging in JPEG2000
-
Tescher, A.G. (ed.) SPIE
-
Dufaux, F., Wee, S., Apostolopoulos J., Ebrahimi T.: JPSEC for secure imaging in JPEG2000. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVII, vol. 5558, pp. 319-330. SPIE (2004)
-
(2004)
Applications of Digital Image Processing XXVII
, vol.5558
, pp. 319-330
-
-
Dufaux, F.1
Wee, S.2
Apostolopoulos, J.3
Ebrahimi, T.4
-
13
-
-
2342534423
-
Securing JPEG2000 compressed images
-
Tescher, A.G. (ed.) SPIE
-
Dufaux, F., Ebrahimi, T.: Securing JPEG2000 compressed images. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVI, vol. 5203, pp. 397-406. SPIE (2003)
-
(2003)
Applications of Digital Image Processing XXVI
, vol.5203
, pp. 397-406
-
-
Dufaux, F.1
Ebrahimi, T.2
-
14
-
-
33750898499
-
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization
-
Geneva, Switzerland, September
-
Engel, D., Kutil, R., Uhl, A.: A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. In: Proceedings of ACM Multimedia and Security Workshop, MM-SEC '06, pp. 202-207, Geneva, Switzerland, September (2006)
-
(2006)
Proceedings of ACM Multimedia and Security Workshop, MM-SEC '06
, pp. 202-207
-
-
Engel, D.1
Kutil, R.2
Uhl, A.3
-
15
-
-
41149167137
-
Format-compliant JPEG2000 encryption in JPSEC: Security, applicability and the impact of compression parameters
-
(Article ID 94565) 10.1155/2007/94565
-
Engel, D., Stütz, T., Uhl, A.: Format-compliant JPEG2000 encryption in JPSEC: Security, applicability and the impact of compression parameters. EURASIP J. Inform. Secur. (Article ID 94565), 20 (2007). doi: 10.1155/2007/94565
-
(2007)
EURASIP J. Inform. Secur.
, vol.20
-
-
Engel, D.1
Stütz, T.2
Uhl, A.3
-
16
-
-
68949214292
-
Efficient transparent JPEG2000 encryption
-
Li, C.-T. (ed.) IGI Global, Hershey, PA1yUSA
-
Engel, D., Stütz, T., Uhl, A.: Efficient transparent JPEG2000 encryption. In: Li, C.-T. (ed.) Multimedia Forensics and Security, pp. 336-359. IGI Global, Hershey, PA, USA (2008)
-
(2008)
Multimedia Forensics and Security
, pp. 336-359
-
-
Engel, D.1
Stütz, T.2
Uhl, A.3
-
17
-
-
33748088518
-
Parameterized biorthogonal wavelet lifting for lightweight JPEG2000 transparent encryption
-
New York, NY, USA August
-
Engel, D., Uhl, A.: Parameterized biorthogonal wavelet lifting for lightweight JPEG2000 transparent encryption. In: Proceedings of ACM Multimedia and Security Workshop, MM-SEC '05, pp. 63-70, New York, NY, USA, August (2005)
-
(2005)
Proceedings of ACM Multimedia and Security Workshop, MM-SEC '05
, pp. 63-70
-
-
Engel, D.1
Uhl, A.2
-
18
-
-
33750914428
-
Security enhancement for lightweight JPEG2000 transparent encryption
-
Bangkok, Thailand, December
-
Engel, D., Uhl, A.: Security enhancement for lightweight JPEG2000 transparent encryption. In: Proceedings of Fifth International Conference on Information, Communication and Signal Processing, ICICS '05, pp. 1102-1106, Bangkok, Thailand, December (2005)
-
(2005)
Proceedings of Fifth International Conference on Information, Communication and Signal Processing, ICICS '05
, pp. 1102-1106
-
-
Engel, D.1
Uhl, A.2
-
19
-
-
34247627425
-
Lightweight JPEG2000 encryption with anisotropic wavelet packets
-
DOI 10.1109/ICME.2006.262687, 4037065, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
-
Engel, D., Uhl, A.: Lightweight JPEG2000 encryption with anisotropic wavelet packets. In: Proceedings of International Conference on Multimedia and Expo, ICME '06, pp. 2177-2180, Toronto, Canada, July 2006. IEEE (2006) (Pubitemid 46680181)
-
(2006)
2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
, vol.2006
, pp. 2177-2180
-
-
Engel, D.1
Uhl, A.2
-
20
-
-
33947689789
-
Secret wavelet packet decompositions for JPEG2000 lightweight encryption
-
Toulouse, France, May 2006. IEEE
-
Engel, D., Uhl, A.: Secret wavelet packet decompositions for JPEG2000 lightweight encryption. In: Proceedings of 31st International Conference on Acoustics, Speech, and Signal Processing, ICASSP '06, vol. V, pp. 465-468, Toulouse, France, May 2006. IEEE (2006)
-
(2006)
Proceedings of 31st International Conference on Acoustics, Speech, and Signal Processing, ICASSP '06
, vol.5
, pp. 465-468
-
-
Engel, D.1
Uhl, A.2
-
21
-
-
34548240630
-
An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packets
-
Delp, E.J., Wong, P.W. (eds.) San Jose, CA, USA, January 2007. SPIE
-
Engel, D., Uhl, A.: An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packets. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX. Proceedings of SPIE, pp. 65051S1-65051S10, San Jose, CA, USA, January 2007. SPIE (2007)
-
(2007)
Security, Steganography, and Watermarking of Multimedia Contents IX. Proceedings of SPIE
-
-
Engel, D.1
Uhl, A.2
-
22
-
-
33847658271
-
Compliant encryption scheme for JPEG2000 image code streams
-
Fang, J., Sun, J.: Compliant encryption scheme for JPEG2000 image code streams. J. Electron. Imaging 15(4) (2006)
-
(2006)
J. Electron. Imaging
, vol.15
, Issue.4
-
-
Fang, J.1
Sun, J.2
-
23
-
-
17644382747
-
-
Furht B. Kirovski D. (eds.) CRC Press, Boca Raton
-
Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton, (2005)
-
(2005)
Multimedia Security Handbook
-
-
-
24
-
-
33749506982
-
Multimedia selective encryption by means of randomized arithmetic coding
-
M. Grangetto E. Magli G. Olmo 2006 Multimedia selective encryption by means of randomized arithmetic coding IEEE Trans. Multimed. 8 5 905 917
-
(2006)
IEEE Trans. Multimed.
, vol.8
, Issue.5
, pp. 905-917
-
-
Grangetto, M.1
Magli, E.2
Olmo, G.3
-
25
-
-
0035765561
-
Authentication and access control in the JPEG2000 compressed domain.
-
Tescher, A.G. (ed.) San Diego, CA, USA, July
-
Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG2000 compressed domain. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXIV. Proceedings of SPIE, vol. 4472, pp. 95-104, San Diego, CA, USA, July (2001)
-
(2001)
Applications of Digital Image Processing XXIV. Proceedings of SPIE
, vol.4472
, pp. 95-104
-
-
Grosbois, R.1
Gerbelot, P.2
Ebrahimi, T.3
-
27
-
-
33749592767
-
Generalized hierarchical encryption of JPEG2000 codestreams for access control
-
IEEE, September
-
Imaizumi, S., Watanabe, O., Fujiyoshi, M., Kiya, H.: Generalized hierarchical encryption of JPEG2000 codestreams for access control. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'05), vol. 2. IEEE, September (2005)
-
(2005)
Proceedings of the IEEE International Conference on Image Processing (ICIP'05)
, vol.2
-
-
Imaizumi, S.1
Watanabe, O.2
Fujiyoshi, M.3
Kiya, H.4
-
28
-
-
48149093649
-
Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control
-
Image Processing, 2007. ICIP 2007 September
-
Imaizumi, S., Fujiyoshi, M., Abe, Y., Kiya, H.: Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control. In: Image Processing, 2007. ICIP 2007. IEEE International Conference on, vol. 2, pp. 137-140, September (2007)
-
(2007)
IEEE International Conference on
, vol.2
, pp. 137-140
-
-
Imaizumi, S.1
Fujiyoshi, M.2
Abe, Y.3
Kiya, H.4
-
35
-
-
0345565739
-
Partial-scrambling of image encoded using JPEG2000 without generating marker codes
-
Barcelona, Spain, September
-
Kiya, H., Imaizumi, D., Watanabe O.: Partial-scrambling of image encoded using JPEG2000 without generating marker codes. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'03), vol. III, pp. 205-208, Barcelona, Spain, September (2003)
-
(2003)
Proceedings of the IEEE International Conference on Image Processing (ICIP'03)
, vol.3
, pp. 205-208
-
-
Kiya, H.1
Imaizumi, D.2
Watanabe, O.3
-
36
-
-
11244304413
-
Lightweight JPEG2000 confidentiality for mobile nvironments
-
Taipei, Taiwan, June
-
Köckerbauer, T., Kumar, M., Uhl, A.: Lightweight JPEG2000 confidentiality for mobile environments. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME '04, Taipei, Taiwan, June (2004)
-
(2004)
Proceedings of the IEEE International Conference on Multimedia and Expo, ICME '04
-
-
Köckerbauer, T.1
Kumar, M.2
Uhl, A.3
-
37
-
-
9744233680
-
Perceptual cryptography on JPEG2000 compressed images or videos
-
Wuhan, China, September 2004. IEEE
-
Lian, S., Sun, J., Wang, Z.: Perceptual cryptography on JPEG2000 compressed images or videos. In: 4th International Conference on Computer and Information Technology, Wuhan, China, September 2004. IEEE (2004)
-
(2004)
4th International Conference on Computer and Information Technology
-
-
Lian, S.1
Sun, J.2
Wang, Z.3
-
38
-
-
34447252956
-
A selective image encryption scheme based on JPEG2000 codec
-
Lian, S., Sun, J., Zhang, D., Wang, Z.: A selective image encryption scheme based on JPEG2000 codec. In: Nakamura, Y., Aizawa, K., Satoh, S. (eds.) Proceedings of the 5th Pacific Rim Conference on Multimedia. Lecture Notes in Computer Science, vol. 3332, pp. 65-72. Springer, Berlin (2004) (Pubitemid 39746030)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3332
, pp. 65-72
-
-
Lian, S.1
Sun, J.2
Zhang, D.3
Wang, Z.4
-
39
-
-
33747702849
-
Efficient selective encryption for jpeg 2000 images using private initial table
-
J.-L. Liu 2006 Efficient selective encryption for jpeg 2000 images using private initial table Pattern Recognit. 39 8 1509 1517
-
(2006)
Pattern Recognit.
, vol.39
, Issue.8
, pp. 1509-1517
-
-
Liu, J.-L.1
-
40
-
-
0141794457
-
Optimization of wavelet decomposition for image compression and feature preservation
-
S.-C.B. Lo H. Li M.T. Freedman 2003 Optimization of wavelet decomposition for image compression and feature preservation IEEE Trans. Med. Imaging 22 9 1141 1151
-
(2003)
IEEE Trans. Med. Imaging
, vol.22
, Issue.9
, pp. 1141-1151
-
-
Lo, S.-C.B.1
Li, H.2
Freedman, M.T.3
-
41
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
B.M. Macq J.-J. Quisquater 1995 Cryptology for digital TV broadcasting Proc. IEEE 83 6 944 957
-
(1995)
Proc. IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
MacQ, B.M.1
Quisquater, J.-J.2
-
42
-
-
20444496548
-
Security evaluation for communication-friendly encryption of multimedia
-
Singapore, October 2004. IEEE Signal Processing Society
-
Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'04), Singapore, October 2004. IEEE Signal Processing Society (2004)
-
(2004)
Proceedings of the IEEE International Conference on Image Processing (ICIP'04)
-
-
Mao, Y.1
Wu, M.2
-
44
-
-
32544435085
-
Performance analysis of block-based permutations in securing JPEG2000 and SPIHT compression
-
Li, S., Pereira, F., Shum,H.-Y., Tescher, A.G. (eds.) Viutiual Communications and Image Processing 2005 (VCIP'05) Beijing, China, July 2005. SPIE
-
Norcen, R., Uhl, A.: Performance analysis of block-based permutations in securing JPEG2000 and SPIHT compression. In: Li, S., Pereira, F., Shum,H.-Y., Tescher, A.G. (eds.) Visual Communications and Image Processing 2005 (VCIP'05). SPIE Proceedings, vol. 5960, pp. 944-952, Beijing, China, July 2005. SPIE (2005)
-
(2005)
SPIE Proceedings
, vol.5960
, pp. 944-952
-
-
Norcen, R.1
Uhl, A.2
-
45
-
-
35248871615
-
Selective encryption of the JPEG2000 bitstream
-
Lioy, A., Mazzocchi, D. (eds.)Communications and Multimedia Security. Turin, Italy, October 2003. Springer, Berlin
-
Norcen, R., Uhl, A.: Selective encryption of the JPEG2000 bitstream. In: Lioy, A., Mazzocchi, D. (eds.) Communications and Multimedia Security. Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '03. Lecture Notes on Computer Science, vol. 2828, pp. 194-204, Turin, Italy, October 2003. Springer, Berlin (2003)
-
(2003)
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS '03. Lecture Notes on Computer Science
, vol.2828
, pp. 194-204
-
-
Norcen, R.1
Uhl, A.2
-
46
-
-
2642538533
-
Application scenarios for selective encryption of visual data
-
Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Juan-les-Pins, France, December
-
Pommer, A., Uhl, A.: Application scenarios for selective encryption of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Multimedia and Security Workshop, ACM Multimedia, pp. 71-74, Juan-les-Pins, France, December (2002)
-
(2002)
Multimedia and Security Workshop, ACM Multimedia
, pp. 71-74
-
-
Pommer, A.1
Uhl, A.2
-
47
-
-
2642552369
-
Selective encryption of wavelet packet subband structures for secure transmission of visual data
-
Dittmann, J., Fridrich, J., Wohlmacher, P. (eds) Juan-les-Pins, France, December
-
Pommer, A., Uhl, A.: Selective encryption of wavelet packet subband structures for secure transmission of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds) Multimedia and Security Workshop, ACM Multimedia. pp. 67-70, Juan-les-Pins, France, December (2002)
-
(2002)
Multimedia and Security Workshop, ACM Multimedia
, pp. 67-70
-
-
Pommer, A.1
Uhl, A.2
-
48
-
-
1442284159
-
Selective encryption of wavelet-packet encoded image data-efficiency and security
-
A. Pommer A. Uhl 2003 Selective encryption of wavelet-packet encoded image data-efficiency and security ACM Multimed. Syst. (Special Issue Multimed. Secur.) 9 3 279 287
-
(2003)
ACM Multimed. Syst. (Special Issue Multimed. Secur.)
, vol.9
, Issue.3
, pp. 279-287
-
-
Pommer, A.1
Uhl, A.2
-
50
-
-
0000009613
-
On the parametrization of the coefficients of dilation equations for compactly supported wavelets
-
J. Schneid S. Pittner 1993 On the parametrization of the coefficients of dilation equations for compactly supported wavelets Computing 51 165 173
-
(1993)
Computing
, vol.51
, pp. 165-173
-
-
Schneid, J.1
Pittner, S.2
-
51
-
-
68949197253
-
-
2 Wiley New York
-
Schneier B.: Applied cryptography: protocols, algorithms and source code in C, 2nd edn. Wiley, New York (1996)
-
(1996)
-
-
Schneier, B.1
-
52
-
-
38849088809
-
On format-compliant iterative encryption of JPEG2000
-
San Diego, CA, USA, December 2006. IEEE Computer Society
-
Stütz, T., Uhl, A.: On format-compliant iterative encryption of JPEG2000. In: Proceedings of the Eighth IEEE International Symposium on Multimedia (ISM'06), pp. 985-990, San Diego, CA, USA, December 2006. IEEE Computer Society (2006)
-
(2006)
Proceedings of the Eighth IEEE International Symposium on Multimedia (ISM'06)
, pp. 985-990
-
-
Stütz, T.1
Uhl, A.2
-
53
-
-
38849092513
-
On efficient transparent JPEG2000 encryption
-
New York, NY, USA, September 2007. ACM Press
-
Stütz, T., Uhl, A.: On efficient transparent JPEG2000 encryption. In Proceedings of ACM Multimedia and Security Workshop, MM-SEC '07, pp. 97-108, New York, NY, USA, September 2007. ACM Press
-
Proceedings of ACM Multimedia and Security Workshop, MM-SEC '07
, pp. 97-108
-
-
Stütz, T.1
Uhl, A.2
-
54
-
-
60149088985
-
On JPEG2000 error concealment attacks
-
Lecture Notes in Computer Science, Tokyo, Japan, January 2009. Springer, Berlin (2009, to appear)
-
Stütz, T., Uhl, A.: On JPEG2000 error concealment attacks. In: Proceedings of the 3rd Pacific-Rim Symposium on Image and Video Technology, PSIVT '09, Lecture Notes in Computer Science, Tokyo, Japan, January 2009. Springer, Berlin (2009, to appear)
-
Proceedings of the 3rd Pacific-Rim Symposium on Image and Video Technology, PSIVT '09
-
-
Stütz, T.1
Uhl, A.2
-
55
-
-
0034229499
-
High performance scalable image compression with EBCOT
-
D. Taubman 2000 High performance scalable image compression with EBCOT IEEE Trans. Image Process. 9 7 1158 1170
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.7
, pp. 1158-1170
-
-
Taubman, D.1
-
57
-
-
0346724454
-
Wavelet packet compression of medical images
-
A.S. Tolba 2002 Wavelet packet compression of medical images Digit. Signal Process. 12 4 441 470
-
(2002)
Digit. Signal Process.
, vol.12
, Issue.4
, pp. 441-470
-
-
Tolba, A.S.1
-
58
-
-
0030168305
-
Image compression using non-stationary and inhomogeneous multiresolution analyses
-
A. Uhl 1996 Image compression using non-stationary and inhomogeneous multiresolution analyses Image Vis. Comput. 14 5 365 371 (Pubitemid 126374677)
-
(1996)
Image and Vision Computing
, vol.14
, Issue.5
, pp. 365-371
-
-
Uhl, A.1
-
59
-
-
33750252928
-
Transparent encryption of JPEG2000 bitstreams
-
Podhradsky, P. et al. (eds.) Smolenice, Slovak Republic
-
Uhl, A., Obermair, Ch.: Transparent encryption of JPEG2000 bitstreams. In: Podhradsky, P. et al. (eds.) Proceedings EC-SIP-M 2005 (5th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services), pp 322-327, Smolenice, Slovak Republic (2005)
-
(2005)
Proceedings EC-SIP-M 2005 (5th EURASIP Conference Focused on Speech and Image Processing, Multimedia Communications and Services)
, pp. 322-327
-
-
Uhl, A.1
Obermair, C.H.2
-
60
-
-
33745126084
-
Image and Video Encryption. from Digital Rights Management to Secured Personal Communication
-
Springer, Berlin
-
Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Berlin (2005)
-
(2005)
Advances in Information Security
, vol.15
-
-
Uhl, A.1
Pommer, A.2
-
61
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4) (2004)
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.4
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
62
-
-
20444454284
-
Secure transcoding with JPSEC confidentiality and authentication
-
Singapore, Singapore, October
-
Wee, S., Apostolopoulos, J.: Secure transcoding with JPSEC confidentiality and authentication. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'04), Singapore, Singapore, October (2004)
-
(2004)
Proceedings of the IEEE International Conference on Image Processing (ICIP'04)
-
-
Wee, S.1
Apostolopoulos, J.2
-
63
-
-
0344666670
-
Secure scalable streaming and secure transcoding with JPEG2000
-
Barcelona, Spain, September
-
Wee, S.J., Apostolopoulos, J.G.: Secure scalable streaming and secure transcoding with JPEG2000. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'03), vol. I, pp. 547-551, Barcelona, Spain, September (2003)
-
(2003)
Proceedings of the IEEE International Conference on Image Processing (ICIP'03)
, vol.1
, pp. 547-551
-
-
Wee, S.J.1
Apostolopoulos, J.G.2
-
64
-
-
68949197982
-
-
A.K. Peters Wellesley
-
Wickerhauser M.V.: Adapted Wavelet Analysis from Theory to Software. A.K. Peters, Wellesley (1994)
-
(1994)
-
-
Wickerhauser, M.V.1
-
65
-
-
4544260390
-
Efficient and secure encryption schemes for JPEG2000
-
May
-
Wu, H., Ma, D.: Efficient and secure encryption schemes for JPEG2000. In: Proceedings of the 2004 International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004), pp. 869-872, May (2004)
-
(2004)
Proceedings of the 2004 International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004)
, pp. 869-872
-
-
Wu, H.1
Ma, D.2
-
66
-
-
84942242681
-
Communication-friendly encryption of multimedia
-
St. Thomas, Virgin Islands, USA, December
-
Wu, M., Mao, V.: Communication-friendly encryption of multimedia. In: Proceedings of the IEEE Multimedia Signal Processing Workshop, MMSP '02, St. Thomas, Virgin Islands, USA, December (2002)
-
(2002)
Proceedings of the IEEE Multimedia Signal Processing Workshop, MMSP '02
-
-
Wu, M.1
Mao, V.2
-
67
-
-
84891426827
-
Securing JPEG2000 code-streams
-
Lee, D., Shieh, S., Tygar, J., (eds.)
-
Wu, Y., Deng, R., Ma, D.: Securing JPEG2000 code-streams. In: Lee, D., Shieh, S., Tygar, J., (eds.) Computer Security in the 21st Century, pp. 229-254 (2005)
-
(2005)
Computer Security in the 21st Century
, pp. 229-254
-
-
Wu, Y.1
Deng, R.2
Ma, D.3
-
69
-
-
1242263471
-
Anisotropic 2-D wavelet packets and rectangular tiling: Theory and algorithms
-
Unser, M.A., Aldroubi, A., Laine, A.F. (eds.) San Diego, CA, USA, August 2003. SPIE
-
Xu, D., Do, M.N.: Anisotropic 2-D wavelet packets and rectangular tiling: theory and algorithms. In: Unser, M.A., Aldroubi, A., Laine, A.F. (eds.) Proceedings of SPIE Conference on Wavelet Applications in Signal and Image Processing X. SPIE Proceedings, vol. 5207, pp. 619-630, San Diego, CA, USA, August 2003. SPIE (2003)
-
(2003)
Proceedings of SPIE Conference on Wavelet Applications in Signal and Image Processing X. SPIE Proceedings
, vol.5207
, pp. 619-630
-
-
Xu, D.1
Do, M.N.2
-
70
-
-
41149114125
-
Efficient and syntax-compliant JPEG2000 encryption preserving original fine granularity of scalability
-
Yang, Y., Zhu, B.B., Yang, Y., Li, S., Yu N.: Efficient and syntax-compliant JPEG2000 encryption preserving original fine granularity of scalability. EURASIP J. Inform. Secur. (2007)
-
(2007)
EURASIP J. Inform. Secur.
-
-
Yang, Y.1
Zhu, B.B.2
Yang, Y.3
Li, S.4
Yu, N.5
-
71
-
-
0035167298
-
A simple 9/7-tap wavelet filter based on lifting scheme
-
October
-
Zhong, G., Cheng, L., Chen, H.: A simple 9/7-tap wavelet filter based on lifting scheme. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'01), pp. 249-252, October (2001)
-
(2001)
Proceedings of the IEEE International Conference on Image Processing (ICIP'01)
, pp. 249-252
-
-
Zhong, G.1
Cheng, L.2
Chen, H.3
-
72
-
-
33749259243
-
JPEG2000 syntax-compliant encryption preserving full scalability
-
September
-
Zhu, B., Yang, Y., Li, S.: JPEG2000 syntax-compliant encryption preserving full scalability. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'05), vol. 3, September (2005)
-
(2005)
Proceedings of the IEEE International Conference on Image Processing (ICIP'05)
, vol.3
-
-
Zhu, B.1
Yang, Y.2
Li, S.3
|