2008 Tenth IEEE International Symposium on Multimedia 2008
DOI: 10.1109/ism.2008.29
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Low Cost Selective Encryption for JPEG2000

Abstract: Selective encryption is a new trend in content protec

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(31 citation statements)
references
References 16 publications
(22 reference statements)
0
31
0
Order By: Relevance
“…Lee et al [12] proposed a double receiver cryptosystem, which uses two keys for both sender and receiver to encrypt and decrypt the cipher text. Massoudi et al [13] in his research paper provided a list of assessment standards for JPEG 2000. It includes security, compression, encryption ratio; etc Priyanka et al [16] depict the basic problems of ad hoc network.…”
Section: Related Workmentioning
confidence: 99%
“…Lee et al [12] proposed a double receiver cryptosystem, which uses two keys for both sender and receiver to encrypt and decrypt the cipher text. Massoudi et al [13] in his research paper provided a list of assessment standards for JPEG 2000. It includes security, compression, encryption ratio; etc Priyanka et al [16] depict the basic problems of ad hoc network.…”
Section: Related Workmentioning
confidence: 99%
“…In [6], a selective image encryption has been presented based on the use of the standard AES-128 block cipher [19] in modified CTR mode of operation (using a conditional modular addition instead of XOR operation), in order to prevent the codewords within the interval [0xFF90, 0xFFFF] to be in the packet data. To achieve a full confidentiality, an amount of 5.43% of bytes are selected from each packet data to follow the encryption process.…”
Section: Related Workmentioning
confidence: 99%
“…We recall that this property is very useful in large scale platforms in order to ensure software compatibility and facilitate the software components deployment. -Fast Encryption: The use of our proposed approach with only two rounds of substitution-diffusion processes allow to achieve a fast encryption speed compared to [6], where AES in counter mode (CTR) is used to achieve the encryption process and [5], where the encryption is achieved in a byte-by-byte manner for the whole packet data of the code-stream.…”
Section: Introductionmentioning
confidence: 99%
“…In [Massoudi…08b] selected bits of each byte are protected considering the image as a binary file. This kind of method works well for JPEG image protection because the JPEG image files contain DCT coefficients after quantization and Huffman coding.…”
Section: Related Work and Performance Issuesmentioning
confidence: 99%