2015
DOI: 10.1016/j.adhoc.2015.01.007
|View full text |Cite
|
Sign up to set email alerts
|

An integrated multimedia data reduction and content confidentiality approach for limited networked devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…While in-compression class depends on the compressor and requires a modification in the standard, the post-compression class is more efficient since it preserves the compression efficiency independently of the compressor. Moreover, a recent post-selective image crypto-compression scheme was presented in [366,367]. It consists of selecting randomly (uniform distribution) only 5% of the compressed data to reach a high visual degradation.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…While in-compression class depends on the compressor and requires a modification in the standard, the post-compression class is more efficient since it preserves the compression efficiency independently of the compressor. Moreover, a recent post-selective image crypto-compression scheme was presented in [366,367]. It consists of selecting randomly (uniform distribution) only 5% of the compressed data to reach a high visual degradation.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…Selective encryption reduces the computational complexity to the minimum possible level while preserving a sufficient security level. The selective approach is debatable since the most existing schemes are designed based on image compression algorithms, and thus they are codec-specific, while the rest are applied at the pixel level (14), (15)- (23). Recent research works presented a new kind of compression algorithms that are specific for encrypting image and video, and can ensure good performance such as (24)- (27).…”
Section: Problem Definitionmentioning
confidence: 99%
“…These requirements are somehow orthogonal and some previous research works have addressed only parts of these requirements and not all (see next section). For instance, the approach presented in [3] has addressed the three first requirements mentioned above. In fact, based on Voronoi tessellation, this approach has demonstrated its efficiency in terms of significant data reduction as well as in terms of data confidentiality preservation.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we investigate, in addition to previously mentioned requirements, the issue of resilience to frequent transmission errors and active attacks. To this end an based on Voronoi tesselation approach [3], we propose a novel mechanism (new transmission protocol coupled to an image filtering approach) to cope with these two major issues. In fact, instead of relying on retransmission protocols, the receiver could recover the missed or corrupted data through appropriate content processing techniques (i.e., image filtering).…”
Section: Introductionmentioning
confidence: 99%