-
1
-
-
17644416045
-
Encryption and art and challenges
-
B.B. Zhu, M.D. Swanson, and S. Li, "Encryption and art and challenges," in Proc. SPIE, vol. 5601, pp. 157-170, 2004.
-
(2004)
Proc. SPIE
, vol.5601
, pp. 157-170
-
-
Zhu, B.B.1
Swanson, M.D.2
Li, S.3
-
2
-
-
33749619546
-
Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality
-
M. Fujiyoshi, Y. Seki, H. Kobayashi, and H. Kiya, "Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality," in Proc. IEEE ICIP, pp. 969-972, 2005.
-
(2005)
Proc. IEEE ICIP
, pp. 969-972
-
-
Fujiyoshi, M.1
Seki, Y.2
Kobayashi, H.3
Kiya, H.4
-
3
-
-
0035765561
-
Authentication and access control in the JPEG2000 compressed domain
-
R. Grosbois, P. Gerbelot, and T. Ebrahimi, "Authentication and access control in the JPEG2000 compressed domain," in Proc. SPIE, vol. 4472, pp. 95-104, 2001.
-
(2001)
Proc. SPIE
, vol.4472
, pp. 95-104
-
-
Grosbois, R.1
Gerbelot, P.2
Ebrahimi, T.3
-
4
-
-
0345565739
-
Partial-scrambling of image encoded using JPEG2000 without generating marker codes
-
H. Kiya, S. Imaizumi, and O. Watanabe, "Partial-scrambling of image encoded using JPEG2000 without generating marker codes," in Proc. IEEE ICIP, 2003.
-
(2003)
Proc. IEEE ICIP
-
-
Kiya, H.1
Imaizumi, S.2
Watanabe, O.3
-
5
-
-
33750957645
-
A scalable encryption method allowing backward compatibility with JPEG2000 images
-
O. Watanabe, A. Nakazaki, and H. Kiya, "A scalable encryption method allowing backward compatibility with JPEG2000 images," in Proc. IEEE ISCAS, pp. 6324-6327, 2005.
-
(2005)
Proc. IEEE ISCAS
, pp. 6324-6327
-
-
Watanabe, O.1
Nakazaki, A.2
Kiya, H.3
-
6
-
-
45249117727
-
Progressive encryption and controlled access scheme for JPEG 2000 encoded images
-
A. Haggag, M. Ghoneim, J. Lu, and T. Yahagi, "Progressive encryption and controlled access scheme for JPEG 2000 encoded images," in Proc. IEEE ISPACS, pp. 895-898, 2006.
-
(2006)
Proc. IEEE ISPACS
, pp. 895-898
-
-
Haggag, A.1
Ghoneim, M.2
Lu, J.3
Yahagi, T.4
-
7
-
-
20444487007
-
Progressive protection of JPEG 2000 codestreams
-
Y. Wu, D. Ma, and R.H. Deng, "Progressive protection of JPEG 2000 codestreams," in Proc. IEEE ICIP, pp. 3447-3450, 2004.
-
(2004)
Proc. IEEE ICIP
, pp. 3447-3450
-
-
Wu, Y.1
Ma, D.2
Deng, R.H.3
-
8
-
-
33749592767
-
Generalized hierarchical encryption of JPEG 2000 codestreams for access control
-
S. Imaizumi, O. Watanabe, M. Fujiyoshi, and H. Kiya, "Generalized hierarchical encryption of JPEG 2000 codestreams for access control," in Proc. IEEE ICIP, pp. 1094-1097, 2005.
-
(2005)
Proc. IEEE ICIP
, pp. 1094-1097
-
-
Imaizumi, S.1
Watanabe, O.2
Fujiyoshi, M.3
Kiya, H.4
-
9
-
-
48149093649
-
Collusion attack-resilient hierarchical encryption of JPEG 2000 code-streams with scalable access control
-
S. Imaizumi, M. Fujiyoshi, Y. Abe, and H. Kiya, "Collusion attack-resilient hierarchical encryption of JPEG 2000 code-streams with scalable access control," in Proc. IEEE ICIP, pp. 137-140, 2007.
-
(2007)
Proc. IEEE ICIP
, pp. 137-140
-
-
Imaizumi, S.1
Fujiyoshi, M.2
Abe, Y.3
Kiya, H.4
-
10
-
-
0003984680
-
Information technology - JPEG 2000 image coding system - Part 1: Core coding system,
-
ISO/IEC IS 15444-1
-
ISO/IEC IS 15444-1: "Information technology - JPEG 2000 image coding system - Part 1: core coding system," 2000.
-
(2000)
-
-
|