Author:
Zhou Qing,Wong Kwok-wo,Liao Xiaofeng,Hu Yue
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Media Technology,Signal Processing
Reference21 articles.
1. Protecting intellectual property in digital multimedia networks;Eskicioglu;IEEE Computer,2003
2. Symmetric ciphers based on two-dimensional chaotic maps;Fridrich;International Journal of Bifurcation and Chaos,1998
3. Parallel image encryption algorithm based on discretized chaotic map;Zhou;Chaos, Solitons & Fractals,2008
4. SCAN-based compression-encryption-hiding for video on demand;Bourbakis;IEEE Multimedia,2003
5. G.A. Spanos, T.B. Maples, Performance study of a selective encryption scheme for the security of networked, real-time video, in: Proceedings of the 4th ACM International Conference on Computer Communications and Networks, 1995, pp. 2–10.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation;ACM Transactions on Multimedia Computing, Communications, and Applications;2024-01-11
2. HEliOS;Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services;2019-11-12
3. On the effective subkey space of some image encryption algorithms using external key;Journal of Visual Communication and Image Representation;2016-10
4. Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count of a Pair;Communications in Computer and Information Science;2014