2014
DOI: 10.1186/1687-417x-2014-6
|View full text |Cite
|
Sign up to set email alerts
|

A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images

Abstract: JPEG XR is the most recent still image coding standard, and custom security features for this format are required for fast adoption of the standard. Format-compliant encryption schemes are important for many application scenarios but need to be highly customised to a specific recent format like JPEG XR. This paper proposes, discusses, and evaluates a set of format-compliant encryption methods for the JPEG XR standard: coefficient scan order permutation, sign bit encryption, transform-based encryption, random l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…A Note on the Encryption: To describe the three encryption methods, [2,3,4], used would only clutter the paper without giving any new insight. It should suffice that the encryption strength ranges from a relatively high quality to a non recognizable quality, illustrated in Fig.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…A Note on the Encryption: To describe the three encryption methods, [2,3,4], used would only clutter the paper without giving any new insight. It should suffice that the encryption strength ranges from a relatively high quality to a non recognizable quality, illustrated in Fig.…”
Section: Methodsmentioning
confidence: 99%
“…There are numerous SEnc encryption schemes, e.g., [1,2,3,4], and an important assessment is always that of quality and recognizability. It has been pointed out, [5], that the quality assessment is problematic since quality metrics are not usually built for such low quality material.…”
Section: Introductionmentioning
confidence: 99%
“…to alter the value of the DC coefficients by adding or subtracting random numbers which are derived from a key. To increase the impact of the encryption method on visual security we have recently suggested to apply RLS to all coefficients of a transform block, not only to its DC coefficient [1].…”
Section: Fig 1 Arnold's Cat Map In Picturesmentioning
confidence: 99%
“…In JPEG XR the coefficients are grouped into three frequency bands, the DC-, the Lowpass-(LP) and Highpass (HP) band. In the experiment only the coefficients of the LP and HP band are subject to the permutation process [1]. Swapping of coefficients across frequency bands is not carried out.…”
Section: Fig 1 Arnold's Cat Map In Picturesmentioning
confidence: 99%
See 1 more Smart Citation