메뉴 건너뛰기




Volumn 15, Issue 4, 2009, Pages 243-270

A survey on JPEG2000 encryption

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SCENARIO; COMPRESSION PERFORMANCE; ENCRYPTION SCHEMES; JPEG 2000; JPEG2000 COMPRESSION; RUNTIMES; VIDEO ENCRYPTION;

EID: 68949198343     PISSN: 09424962     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00530-008-0150-0     Document Type: Article
Times cited : (47)

References (72)
  • 3
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generator
    • L. Blum M. Blum M. Shub 1986 A simple unpredictable pseudo-random number generator SIAM J. Comput. 15 2 364 383
    • (1986) SIAM J. Comput. , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 4
    • 85075820251 scopus 로고
    • The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression
    • Orlando, FL, USA, April
    • Bradley, J.N., Brislawn, C.M., Hopper, T.: The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression. In: SPIE Proceedings, Visual Information Processing II, vol. 1961, pp. 293-304, Orlando, FL, USA, April (1993)
    • (1993) SPIE Proceedings, Visual Information Processing II , vol.1961 , pp. 293-304
    • Bradley, J.N.1    Brislawn, C.M.2    Hopper, T.3
  • 6
    • 68949220078 scopus 로고    scopus 로고
    • Symmetric block cipher based protection: Contribution to JPSEC
    • Conan, V., Sadourny, Y., Thomann, S.: Symmetric block cipher based protection: Contribution to JPSEC. ISO/IEC JTC 1/SC 29/WG 1 N 2771 (2003)
    • (2003) ISO/IEC JTC 1/SC 29/WG 1 , Issue.N 2771
    • Conan, V.1    Sadourny, Y.2    Thomann, S.3
  • 7
    • 68949219428 scopus 로고    scopus 로고
    • Springer Berlin
    • Daemen J., Rijmen V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Berlin (2002)
    • (2002)
    • Daemen, J.1    Rijmen, V.2
  • 8
    • 68949197256 scopus 로고    scopus 로고
    • Digital Cinema Initiatives, LLC (DCI) online presentation, March
    • Digital Cinema Initiatives, LLC (DCI). Digital cinema system specification v1.2. online presentation, March (2008)
    • (2008) Digital Cinema System Specification v1.2.
  • 13
    • 2342534423 scopus 로고    scopus 로고
    • Securing JPEG2000 compressed images
    • Tescher, A.G. (ed.) SPIE
    • Dufaux, F., Ebrahimi, T.: Securing JPEG2000 compressed images. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVI, vol. 5203, pp. 397-406. SPIE (2003)
    • (2003) Applications of Digital Image Processing XXVI , vol.5203 , pp. 397-406
    • Dufaux, F.1    Ebrahimi, T.2
  • 14
    • 33750898499 scopus 로고    scopus 로고
    • A symbolic transform attack on lightweight encryption based on wavelet filter parameterization
    • Geneva, Switzerland, September
    • Engel, D., Kutil, R., Uhl, A.: A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. In: Proceedings of ACM Multimedia and Security Workshop, MM-SEC '06, pp. 202-207, Geneva, Switzerland, September (2006)
    • (2006) Proceedings of ACM Multimedia and Security Workshop, MM-SEC '06 , pp. 202-207
    • Engel, D.1    Kutil, R.2    Uhl, A.3
  • 15
    • 41149167137 scopus 로고    scopus 로고
    • Format-compliant JPEG2000 encryption in JPSEC: Security, applicability and the impact of compression parameters
    • (Article ID 94565) 10.1155/2007/94565
    • Engel, D., Stütz, T., Uhl, A.: Format-compliant JPEG2000 encryption in JPSEC: Security, applicability and the impact of compression parameters. EURASIP J. Inform. Secur. (Article ID 94565), 20 (2007). doi: 10.1155/2007/94565
    • (2007) EURASIP J. Inform. Secur. , vol.20
    • Engel, D.1    Stütz, T.2    Uhl, A.3
  • 16
    • 68949214292 scopus 로고    scopus 로고
    • Efficient transparent JPEG2000 encryption
    • Li, C.-T. (ed.) IGI Global, Hershey, PA1yUSA
    • Engel, D., Stütz, T., Uhl, A.: Efficient transparent JPEG2000 encryption. In: Li, C.-T. (ed.) Multimedia Forensics and Security, pp. 336-359. IGI Global, Hershey, PA, USA (2008)
    • (2008) Multimedia Forensics and Security , pp. 336-359
    • Engel, D.1    Stütz, T.2    Uhl, A.3
  • 17
    • 33748088518 scopus 로고    scopus 로고
    • Parameterized biorthogonal wavelet lifting for lightweight JPEG2000 transparent encryption
    • New York, NY, USA August
    • Engel, D., Uhl, A.: Parameterized biorthogonal wavelet lifting for lightweight JPEG2000 transparent encryption. In: Proceedings of ACM Multimedia and Security Workshop, MM-SEC '05, pp. 63-70, New York, NY, USA, August (2005)
    • (2005) Proceedings of ACM Multimedia and Security Workshop, MM-SEC '05 , pp. 63-70
    • Engel, D.1    Uhl, A.2
  • 19
    • 34247627425 scopus 로고    scopus 로고
    • Lightweight JPEG2000 encryption with anisotropic wavelet packets
    • DOI 10.1109/ICME.2006.262687, 4037065, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
    • Engel, D., Uhl, A.: Lightweight JPEG2000 encryption with anisotropic wavelet packets. In: Proceedings of International Conference on Multimedia and Expo, ICME '06, pp. 2177-2180, Toronto, Canada, July 2006. IEEE (2006) (Pubitemid 46680181)
    • (2006) 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings , vol.2006 , pp. 2177-2180
    • Engel, D.1    Uhl, A.2
  • 21
    • 34548240630 scopus 로고    scopus 로고
    • An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packets
    • Delp, E.J., Wong, P.W. (eds.) San Jose, CA, USA, January 2007. SPIE
    • Engel, D., Uhl, A.: An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packets. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX. Proceedings of SPIE, pp. 65051S1-65051S10, San Jose, CA, USA, January 2007. SPIE (2007)
    • (2007) Security, Steganography, and Watermarking of Multimedia Contents IX. Proceedings of SPIE
    • Engel, D.1    Uhl, A.2
  • 22
    • 33847658271 scopus 로고    scopus 로고
    • Compliant encryption scheme for JPEG2000 image code streams
    • Fang, J., Sun, J.: Compliant encryption scheme for JPEG2000 image code streams. J. Electron. Imaging 15(4) (2006)
    • (2006) J. Electron. Imaging , vol.15 , Issue.4
    • Fang, J.1    Sun, J.2
  • 23
    • 17644382747 scopus 로고    scopus 로고
    • Furht B. Kirovski D. (eds.) CRC Press, Boca Raton
    • Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton, (2005)
    • (2005) Multimedia Security Handbook
  • 24
    • 33749506982 scopus 로고    scopus 로고
    • Multimedia selective encryption by means of randomized arithmetic coding
    • M. Grangetto E. Magli G. Olmo 2006 Multimedia selective encryption by means of randomized arithmetic coding IEEE Trans. Multimed. 8 5 905 917
    • (2006) IEEE Trans. Multimed. , vol.8 , Issue.5 , pp. 905-917
    • Grangetto, M.1    Magli, E.2    Olmo, G.3
  • 25
    • 0035765561 scopus 로고    scopus 로고
    • Authentication and access control in the JPEG2000 compressed domain.
    • Tescher, A.G. (ed.) San Diego, CA, USA, July
    • Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG2000 compressed domain. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXIV. Proceedings of SPIE, vol. 4472, pp. 95-104, San Diego, CA, USA, July (2001)
    • (2001) Applications of Digital Image Processing XXIV. Proceedings of SPIE , vol.4472 , pp. 95-104
    • Grosbois, R.1    Gerbelot, P.2    Ebrahimi, T.3
  • 28
    • 48149093649 scopus 로고    scopus 로고
    • Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control
    • Image Processing, 2007. ICIP 2007 September
    • Imaizumi, S., Fujiyoshi, M., Abe, Y., Kiya, H.: Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control. In: Image Processing, 2007. ICIP 2007. IEEE International Conference on, vol. 2, pp. 137-140, September (2007)
    • (2007) IEEE International Conference on , vol.2 , pp. 137-140
    • Imaizumi, S.1    Fujiyoshi, M.2    Abe, Y.3    Kiya, H.4
  • 39
    • 33747702849 scopus 로고    scopus 로고
    • Efficient selective encryption for jpeg 2000 images using private initial table
    • J.-L. Liu 2006 Efficient selective encryption for jpeg 2000 images using private initial table Pattern Recognit. 39 8 1509 1517
    • (2006) Pattern Recognit. , vol.39 , Issue.8 , pp. 1509-1517
    • Liu, J.-L.1
  • 40
    • 0141794457 scopus 로고    scopus 로고
    • Optimization of wavelet decomposition for image compression and feature preservation
    • S.-C.B. Lo H. Li M.T. Freedman 2003 Optimization of wavelet decomposition for image compression and feature preservation IEEE Trans. Med. Imaging 22 9 1141 1151
    • (2003) IEEE Trans. Med. Imaging , vol.22 , Issue.9 , pp. 1141-1151
    • Lo, S.-C.B.1    Li, H.2    Freedman, M.T.3
  • 41
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • B.M. Macq J.-J. Quisquater 1995 Cryptology for digital TV broadcasting Proc. IEEE 83 6 944 957
    • (1995) Proc. IEEE , vol.83 , Issue.6 , pp. 944-957
    • MacQ, B.M.1    Quisquater, J.-J.2
  • 42
    • 20444496548 scopus 로고    scopus 로고
    • Security evaluation for communication-friendly encryption of multimedia
    • Singapore, October 2004. IEEE Signal Processing Society
    • Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'04), Singapore, October 2004. IEEE Signal Processing Society (2004)
    • (2004) Proceedings of the IEEE International Conference on Image Processing (ICIP'04)
    • Mao, Y.1    Wu, M.2
  • 44
    • 32544435085 scopus 로고    scopus 로고
    • Performance analysis of block-based permutations in securing JPEG2000 and SPIHT compression
    • Li, S., Pereira, F., Shum,H.-Y., Tescher, A.G. (eds.) Viutiual Communications and Image Processing 2005 (VCIP'05) Beijing, China, July 2005. SPIE
    • Norcen, R., Uhl, A.: Performance analysis of block-based permutations in securing JPEG2000 and SPIHT compression. In: Li, S., Pereira, F., Shum,H.-Y., Tescher, A.G. (eds.) Visual Communications and Image Processing 2005 (VCIP'05). SPIE Proceedings, vol. 5960, pp. 944-952, Beijing, China, July 2005. SPIE (2005)
    • (2005) SPIE Proceedings , vol.5960 , pp. 944-952
    • Norcen, R.1    Uhl, A.2
  • 46
    • 2642538533 scopus 로고    scopus 로고
    • Application scenarios for selective encryption of visual data
    • Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Juan-les-Pins, France, December
    • Pommer, A., Uhl, A.: Application scenarios for selective encryption of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Multimedia and Security Workshop, ACM Multimedia, pp. 71-74, Juan-les-Pins, France, December (2002)
    • (2002) Multimedia and Security Workshop, ACM Multimedia , pp. 71-74
    • Pommer, A.1    Uhl, A.2
  • 47
    • 2642552369 scopus 로고    scopus 로고
    • Selective encryption of wavelet packet subband structures for secure transmission of visual data
    • Dittmann, J., Fridrich, J., Wohlmacher, P. (eds) Juan-les-Pins, France, December
    • Pommer, A., Uhl, A.: Selective encryption of wavelet packet subband structures for secure transmission of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds) Multimedia and Security Workshop, ACM Multimedia. pp. 67-70, Juan-les-Pins, France, December (2002)
    • (2002) Multimedia and Security Workshop, ACM Multimedia , pp. 67-70
    • Pommer, A.1    Uhl, A.2
  • 48
    • 1442284159 scopus 로고    scopus 로고
    • Selective encryption of wavelet-packet encoded image data-efficiency and security
    • A. Pommer A. Uhl 2003 Selective encryption of wavelet-packet encoded image data-efficiency and security ACM Multimed. Syst. (Special Issue Multimed. Secur.) 9 3 279 287
    • (2003) ACM Multimed. Syst. (Special Issue Multimed. Secur.) , vol.9 , Issue.3 , pp. 279-287
    • Pommer, A.1    Uhl, A.2
  • 50
    • 0000009613 scopus 로고
    • On the parametrization of the coefficients of dilation equations for compactly supported wavelets
    • J. Schneid S. Pittner 1993 On the parametrization of the coefficients of dilation equations for compactly supported wavelets Computing 51 165 173
    • (1993) Computing , vol.51 , pp. 165-173
    • Schneid, J.1    Pittner, S.2
  • 51
    • 68949197253 scopus 로고    scopus 로고
    • 2 Wiley New York
    • Schneier B.: Applied cryptography: protocols, algorithms and source code in C, 2nd edn. Wiley, New York (1996)
    • (1996)
    • Schneier, B.1
  • 52
  • 55
    • 0034229499 scopus 로고    scopus 로고
    • High performance scalable image compression with EBCOT
    • D. Taubman 2000 High performance scalable image compression with EBCOT IEEE Trans. Image Process. 9 7 1158 1170
    • (2000) IEEE Trans. Image Process. , vol.9 , Issue.7 , pp. 1158-1170
    • Taubman, D.1
  • 57
    • 0346724454 scopus 로고    scopus 로고
    • Wavelet packet compression of medical images
    • A.S. Tolba 2002 Wavelet packet compression of medical images Digit. Signal Process. 12 4 441 470
    • (2002) Digit. Signal Process. , vol.12 , Issue.4 , pp. 441-470
    • Tolba, A.S.1
  • 58
    • 0030168305 scopus 로고    scopus 로고
    • Image compression using non-stationary and inhomogeneous multiresolution analyses
    • A. Uhl 1996 Image compression using non-stationary and inhomogeneous multiresolution analyses Image Vis. Comput. 14 5 365 371 (Pubitemid 126374677)
    • (1996) Image and Vision Computing , vol.14 , Issue.5 , pp. 365-371
    • Uhl, A.1
  • 60
    • 33745126084 scopus 로고    scopus 로고
    • Image and Video Encryption. from Digital Rights Management to Secured Personal Communication
    • Springer, Berlin
    • Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Berlin (2005)
    • (2005) Advances in Information Security , vol.15
    • Uhl, A.1    Pommer, A.2
  • 64
    • 68949197982 scopus 로고
    • A.K. Peters Wellesley
    • Wickerhauser M.V.: Adapted Wavelet Analysis from Theory to Software. A.K. Peters, Wellesley (1994)
    • (1994)
    • Wickerhauser, M.V.1
  • 67
    • 84891426827 scopus 로고    scopus 로고
    • Securing JPEG2000 code-streams
    • Lee, D., Shieh, S., Tygar, J., (eds.)
    • Wu, Y., Deng, R., Ma, D.: Securing JPEG2000 code-streams. In: Lee, D., Shieh, S., Tygar, J., (eds.) Computer Security in the 21st Century, pp. 229-254 (2005)
    • (2005) Computer Security in the 21st Century , pp. 229-254
    • Wu, Y.1    Deng, R.2    Ma, D.3
  • 69
    • 1242263471 scopus 로고    scopus 로고
    • Anisotropic 2-D wavelet packets and rectangular tiling: Theory and algorithms
    • Unser, M.A., Aldroubi, A., Laine, A.F. (eds.) San Diego, CA, USA, August 2003. SPIE
    • Xu, D., Do, M.N.: Anisotropic 2-D wavelet packets and rectangular tiling: theory and algorithms. In: Unser, M.A., Aldroubi, A., Laine, A.F. (eds.) Proceedings of SPIE Conference on Wavelet Applications in Signal and Image Processing X. SPIE Proceedings, vol. 5207, pp. 619-630, San Diego, CA, USA, August 2003. SPIE (2003)
    • (2003) Proceedings of SPIE Conference on Wavelet Applications in Signal and Image Processing X. SPIE Proceedings , vol.5207 , pp. 619-630
    • Xu, D.1    Do, M.N.2
  • 70
    • 41149114125 scopus 로고    scopus 로고
    • Efficient and syntax-compliant JPEG2000 encryption preserving original fine granularity of scalability
    • Yang, Y., Zhu, B.B., Yang, Y., Li, S., Yu N.: Efficient and syntax-compliant JPEG2000 encryption preserving original fine granularity of scalability. EURASIP J. Inform. Secur. (2007)
    • (2007) EURASIP J. Inform. Secur.
    • Yang, Y.1    Zhu, B.B.2    Yang, Y.3    Li, S.4    Yu, N.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.