Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control

S Imaizumi, M Fujiyoshi, Y Abe… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
This paper proposes a collusion attack-resilient method of encryption for access control of
JPEG 2000 codestreams with hierarchical scalabilities. The proposed method generates …

Efficient collusion attack-free access control for multidimensionally hierarchical scalability content

S Imaizumi, M Fujiyoshi, H Kiya - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
This paper proposes an efficient access control method for content with multiple dimensions
of hierarchical scalability. The proposed method versatilely serves various quality content by …

Enhancing progressive encryption for scalable video streams

V Gergely, G Fehér - The Internet of the Future: 15th Open European …, 2009 - Springer
The technique called progressive encryption is used in many areas of content security.
However, the plain algorithm itself is only applicable in real transmission scenarios where …

Chaotic progressive access control for JPEG2000 images repositories

M Hamdi, N Boudriga - IEEE GLOBECOM 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
The paper proposes a progressive access control scheme for JPEG2000 image
codestreams based on chaotic maps. The access control scheme provides the possibility to …

Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images

N Hashimoto, S Imaizumi, M Fujiyoshi… - 2008 15th IEEE …, 2008 - ieeexplore.ieee.org
This paper proposes an encryption method that uses short keys to enable hierarchical
access controls for JPEG 2000 codestreams. The proposed method provides images of …

A key derivation scheme for hierarchical access control to JPEG 2000 coded images

S Imaizumi, M Fujiyoshi, H Kiya, N Aoki… - Advances in Image and …, 2012 - Springer
This paper proposes a key derivation scheme to control access of JPEG 2000 (JP2) coded
images, which consist of hierarchical scalability such as SNR, resolution levels, and so on …

Efficient data hiding in encrypted JPEG 2000 codestreams

W Sae-Tang, M Fujiyoshi, H Kiya - … International Symposium on …, 2014 - ieeexplore.ieee.org
In this paper, an effective data hiding method for encrypted JPEG 2000 codestreams is
proposed. By using the property of the discrete wavelet transformation (DWT), an image is …

Content-based network filtering of encrypted image data

M Hamdi, N Boudriga - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
The proliferation of multimedia encryption techniques allows securing various applications
including tele-browsing and visio-conferencing. However, these techniques may also …

Efficient Collusion Attack-Free Access Control for JPEG 2000 Coded Images

S Imaizumi, M Fujiyoshi, H Kiya - … : APSIPA ASC 2009: Asia …, 2009 - eprints.lib.hokudai.ac.jp
This paper proposes an efficient access control method for JPEG 2000 coded images with
multiple dimensions of hierarchical scalability. An access control method is required to 1) be …

再帰型ハッシュ連鎖を用いた暗号鍵生成方式と多次元階層的アクセス制御への適用

今泉祥子, 藤吉正明, 貴家仁志 - 映像情報メディア学会誌, 2011 - jstage.jst.go.jp
抄録 An efficient key generating method that uses recursive hash chains is proposed for
hierarchical access control. The proposed method introduces recursive hash chains for …