Author:
Deng Robert H.,Ma Di,Shao Weizhong,Wu Yongdong
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Information Systems,Software
Reference19 articles.
1. Taubman, D.S., Marcellin, M.W.: JPEG2000 – Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Drodrecht (2000)
2. Rabbani, M., Joshi, R.: An overview of the JPEG 2000 still image compression standard. Signal Process. Image Commun. 17(1), 3–48 (2002)
3. ISO 154447ITU-T Recommendation T.800, http://www.jpeg.org
4. Schneier, B.: Applied Cryptography. Wiley, New York (1996)
5. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory;International Journal of Computational Intelligence Systems;2012
2. Scalable authentication for various representations of JPEG 2000 images;2010 IEEE International Conference on Image Processing;2010-09
3. Authentication schemes for multimedia streams;ACM Transactions on Multimedia Computing, Communications, and Applications;2010-02
4. A study of content authentication in proxy-enabled multimedia delivery systems;ACM Transactions on Multimedia Computing, Communications, and Applications;2009-10
5. Scalable Authentication and Nonrepudiation Technique for JPEG 2000 Images Using JPSEC Protection Tools;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2006-11-01