2003
DOI: 10.1007/s00530-003-0099-y
|View full text |Cite
|
Sign up to set email alerts
|

Selective encryption of wavelet-packet encoded image data: efficiency and security

Abstract: Selective encryption provides the ability to strike a balance between security and processing demands, e.g., in mobile clients. Image encoding using wavelets, and especially wavelet packets, can be used for efficient selective encryption. We will show how two such methods work and discuss their advantages and disadvantages in terms of security and speed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 90 publications
(41 citation statements)
references
References 20 publications
0
41
0
Order By: Relevance
“…Traditional systems make use of classical technologies like Encryption [20], [21] and Accessconditioning [22] for driving DRM incorporated systems. There are many crucial technologies that construct DRM system.…”
Section: IImentioning
confidence: 99%
“…Traditional systems make use of classical technologies like Encryption [20], [21] and Accessconditioning [22] for driving DRM incorporated systems. There are many crucial technologies that construct DRM system.…”
Section: IImentioning
confidence: 99%
“…Hence, a number of techniques for real-time encryption of multimedia data have been proposed in the past years. Two common approaches to realtime multimedia data encryption are selective encryption [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] and entropy coding that provides encryption [20][21][22][23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%
“…Of course, other data formats have been discussed with respect to selective encryption as well (Liu and Eskicioglu [16] give an overview with focus on shortcomings of current schemes and future issues): coding schemes based on wavelets [21], quadtrees [4,13], iterated function systems (fractal coding) [23], and vector quantization [3] have been used to create selective encryption schemes.…”
Section: Introductionmentioning
confidence: 99%