An encryption-then-compression system for jpeg/motion jpeg standard
K Kurihara, M Kikuchi, S Imaizumi… - IEICE Transactions on …, 2015 - search.ieice.org
In many multimedia applications, image encryption has to be conducted prior to image
compression. This paper proposes a JPEG-friendly perceptual encryption method, which …
compression. This paper proposes a JPEG-friendly perceptual encryption method, which …
An encryption-then-compression system for jpeg standard
In many multimedia applications, image encryption has to be conducted prior to image
compression. This paper proposes an Encryption-then-Compression system using a JPEG …
compression. This paper proposes an Encryption-then-Compression system using a JPEG …
A lightweight encryption method for privacy protection in surveillance videos
X Zhang, SH Seo, C Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Privacy protection of surveillance videos is an important issue because of the pervasiveness
of surveillance cameras. Region of interest (RoI) privacy protection prefers encrypting limited …
of surveillance cameras. Region of interest (RoI) privacy protection prefers encrypting limited …
Encrypted JPEG image retrieval using block-wise feature comparison
This paper proposes a novel scheme for encrypted JPEG image retrieval, which includes
image encryption and retrieval phases. Using the scheme, the content owner encrypts JPEG …
image encryption and retrieval phases. Using the scheme, the content owner encrypts JPEG …
Bitstream-based JPEG Encryption in Real-time
The authors propose a framework to encrypt Baseline JPEG files directly at bitstream level,
ie, without the need to recompress them. The authors' approach enables encrypting more …
ie, without the need to recompress them. The authors' approach enables encrypting more …
[PDF][PDF] Enhancement of JPEG compression for GPS images
Y Wiseman - International Journal of Multimedia and Ubiquitous …, 2015 - gvpress.com
GPS devices typically make use of images that are excessively large to be stored as a Bit
Map, so the images are always compressed. The widespread compression technique is …
Map, so the images are always compressed. The widespread compression technique is …
[HTML][HTML] Identifying deficits of visual security metrics for images
H Hofbauer, A Uhl - Signal Processing: Image Communication, 2016 - Elsevier
Visual security metrics are deterministic measures with the (claimed) ability to assess
whether an encryption method for visual data does achieve its defined goal. These metrics …
whether an encryption method for visual data does achieve its defined goal. These metrics …
Length-preserving Bit-stream-based JPEG Encryption
A Unterweger, A Uhl - Proceedings of the on Multimedia and security, 2012 - dl.acm.org
We propose a new method to encrypt baseline JPEG bit streams by selective Huffman code
word swapping and coefficient value scrambling based on AES encryption. Furthermore, we …
word swapping and coefficient value scrambling based on AES encryption. Furthermore, we …
Finely tunable bitcuboid-based encryption with exception-free signed binarization for jpeg standard
K Shimizu, T Suzuki - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
We propose a finely tunable JPEG format-compliant perceptual encryption (FE) with two
novel strategies:(i) bitcuboid-based encryption (BE) and (ii) exception-free signed …
novel strategies:(i) bitcuboid-based encryption (BE) and (ii) exception-free signed …
Building a post-compression region-of-interest encryption framework for existing video surveillance systems: Challenges, obstacles and practical concerns
A Unterweger, KV Ryckegem, D Engel, A Uhl - Multimedia Systems, 2016 - Springer
We propose an encryption framework design and implementation which add region-of-
interest encryption functionality to existing video surveillance systems with minimal …
interest encryption functionality to existing video surveillance systems with minimal …