2020
DOI: 10.1049/iet-spr.2019.0276
|View full text |Cite
|
Sign up to set email alerts
|

Survey on JPEG compatible joint image compression and encryption algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 98 publications
(252 reference statements)
0
17
0
Order By: Relevance
“…Knowing the code words, or coefficient values, one can determine (h 1 + h 0 ) and (v 1 + v 0 ) and decide whether substitution is possible. If so, then these bit counts point out the group of N >= 2 pairs of code words that can be exchanged for each other in accordance with (1). Let us assume that the members of the substitute group are ordered, so that they form an array and can be indexed by the numbers from 0 to (N − 1).…”
Section: B Encryption Proceduresmentioning
confidence: 99%
See 3 more Smart Citations
“…Knowing the code words, or coefficient values, one can determine (h 1 + h 0 ) and (v 1 + v 0 ) and decide whether substitution is possible. If so, then these bit counts point out the group of N >= 2 pairs of code words that can be exchanged for each other in accordance with (1). Let us assume that the members of the substitute group are ordered, so that they form an array and can be indexed by the numbers from 0 to (N − 1).…”
Section: B Encryption Proceduresmentioning
confidence: 99%
“…These words can be combined into 12 × 161 = 1932 DC-AC pairs, which can be grouped with respect to both the total length of Huffman code words and the total number of the value bits that must accompany them. If a resulting group comprises two or more pairs of code words, then these DC-AC pairs can be substituted for each other in accordance with (1).…”
Section: A Substitution Limitations By Huffman Code Tablesmentioning
confidence: 99%
See 2 more Smart Citations
“…Secret sharing (SS) [1][2][3] is an important tool in cryptography, which constructs many security protocols, such as secure multi-party computation [4], distributed key negotiation [5,6], threshold secret system [7,8] etc. Compared with traditional security methods such as encryption [9], SS has the characteristics of loss tolerance [10], which can solve the problem of loss and damage of encrypted carriers. Therefore, it has become a very important branch of cryptography.…”
Section: Introductionmentioning
confidence: 99%