25.3.11.8.1 Encryption or JPEG Coded Images, JPEG and Encryption

Chapter Contents (Back)
Encryption. JPEG.
See also JPEG Standards and Use.
See also JPEG 2000, Discussion, Generation, and Use, JPEG2000.

Caldelli, R.[Roberto], Filippini, F.[Francesco], Barni, M.[Mauro],
Joint near-lossless compression and watermarking of still images for authentication and tamper localization,
SP:IC(21), No. 10, November 2006, pp. 890-903.
Elsevier DOI 0701
Image authentication; Near-lossless JPEG; Digital watermarking; Tamper localization; Remote sensing; Medical imagery BibRef

Li, W.H.[Wei-Hai], Yuan, Y.[Yuan],
A New Blind Attack Procedure For Dct-based Image Encryption With Spectrum Learning,
IJIG(7), No. 3, July 2007, pp. 481-496. 0707
BibRef

Shreyamsha Kumar, B.K., Patil, C.R.[Chidamber R.],
JPEG image encryption using fuzzy PN sequences,
SIViP(4), No. 4, November 2010, pp. 419-427.
WWW Link. 1101
BibRef

Watanabe, O.[Osamu], Fukuhara, T.[Takahiro], Kiya, H.[Hitoshi],
Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters,
IEICE(E95-D), No. 4, April 2012, pp. 1120-1129.
WWW Link. 1204
BibRef

Iida, K.[Kenta], Kiya, H.[Hitoshi],
Robust Image Identification without Visible Information for JPEG Images,
IEICE(E101-D), No. 1, January 2018, pp. 13-19.
WWW Link. 1801
BibRef
And:
Robust image identification with secure features for JPEG images,
ICIP17(4342-4346)
IEEE DOI 1803
Databases, Discrete cosine transforms, Feature extraction, Image coding, Quantization (signal), Robustness, Transform coding, SNSs BibRef

Iida, K.[Kenta], Kiya, H.[Hitoshi],
Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images,
IEICE(E102-D), No. 1, January 2019, pp. 2-10.
WWW Link. 1901
BibRef

Kobayashi, H.[Hiroyuki], Imaizumi, S.[Shoko], Kiya, H.[Hitoshi],
A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios,
PSIVT15(38-50).
Springer DOI 1602
BibRef

Imaizumi, S.[Shoko], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi], Aoki, N.[Naokazu], Kobayashi, H.[Hiroyuki],
A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images,
PSIVT11(II: 180-191).
Springer DOI 1111
BibRef

Hashimoto, N.[Noriaki], Imaizumi, S.[Shoko], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images,
ICIP08(3116-3119).
IEEE DOI 0810
BibRef

Imaizumi, S.[Shoko], Fujiyoshi, M.[Masaaki], Abe, Y.[Yoshito], Kiya, H.[Hitoshi],
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control,
ICIP07(II: 137-140).
IEEE DOI 0709
BibRef

Imaizumi, S., Watanabe, O., Fujiyoshi, M., Kiya, H.,
Generalized Hierarchical Encryption of JPEG 2000 Codestreams for Access Control,
ICIP05(II: 1094-1097).
IEEE DOI 0512
BibRef

Fujiyoshi, M., Saitou, W., Watanabe, O., Kiya, H.,
Hierarchical Encryption of Multimedia Contents for Access Control,
ICIP06(1977-1980).
IEEE DOI 0610
BibRef

Watanabe, O.[Osamu], Iida, T.[Tomonori], Fukuhara, T.[Takahiro], Kiya, H.[Hitoshi],
Identification of JPEG 2000 images in encrypted domain for digital cinema,
ICIP09(2065-2068).
IEEE DOI 0911
BibRef

Kishore, B., Kumar, B.K.S.[B.K. Shreyamsha], Patil, C.R.[Chidamber R.],
FPGA based simple and fast JPEG encryptor,
RealTimeIP(10), No. 3, September 2015, pp. 551-559.
Springer DOI 1509
BibRef

Naik, K.[Kshiramani], Pal, A.K.[Arup Kumar],
Design of a cryptosystem for DCT compressed image using Arnold transform and fractional Fourier transform,
IJCVR(5), No. 3, 2015, pp. 335-346.
DOI Link 1509
BibRef

Gu, G.S.[Guo-Sheng], Ling, J.[Jie], Xie, G.[Guobo], Li, Z.[Zheng],
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images,
SP:IC(40), No. 1, 2016, pp. 52-64.
Elsevier DOI 1601
Chaotic cipher BibRef

He, J., Huang, S., Tang, S., Huang, J.,
JPEG Image Encryption With Improved Format Compatibility and File Size Preservation,
MultMed(20), No. 10, October 2018, pp. 2645-2658.
IEEE DOI 1810
cryptography, data compression, decoding, image coding, compressed images, JPEG standard, bitstream BibRef

Liang, H.H.[Hai-Hua], Zhang, X.P.[Xin-Peng], Cheng, H.[Hang],
Huffman-code based retrieval for encrypted JPEG images,
JVCIR(61), 2019, pp. 149-156.
Elsevier DOI 1906
Image retrieval, Encrypted JPEG image, Quantization table, Huffman code, Confidentiality, Integrity, Format compatibility BibRef

Itier, V., Puteaux, P., Puech, W.[William],
Recompression of JPEG Crypto-Compressed Images Without a Key,
CirSysVideo(30), No. 3, March 2020, pp. 646-660.
IEEE DOI 2003
Transform coding, Image coding, Encryption, Quantization (signal), Discrete cosine transforms, Q-factor, JPEG compression, recompression BibRef

He, H.J.[Hong-Jie], Yuan, Y.[Yuan], Ye, Y.[Yuyun], Tai, H.M.[Heng-Ming], Chen, F.[Fan],
Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency,
JVCIR(90), 2023, pp. 103733.
Elsevier DOI 2301
JPEG bitstream encryption, Chosen plaintext attack, Adaptive encryption key, ACCs encryption BibRef

Li, P.Y.[Pei-Ya], Sun, Z.[Zefan], Situ, Z.[Zhenhui], He, M.L.[Mei-Ling], Song, T.T.[Ting-Ting],
Joint JPEG Compression and Encryption Scheme Based on Order-8-16 Block Transform,
ITS(24), No. 7, July 2023, pp. 7687-7696.
IEEE DOI 2307
Encryption, Image coding, Transform coding, Discrete cosine transforms, Rate-distortion, Transforms, Costs, security analysis BibRef

Ye, X.[Xi], Zhang, Y.S.[Yu-Shu], Xiao, X.L.[Xiang-Li], Yi, S.[Shuang], Lan, R.[Rushi],
Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images,
SPLetters(30), 2023, pp. 793-797.
IEEE DOI 2307
Encryption, Usability, Transform coding, Recording, Entropy, Image coding, Privacy, Reversible data hiding, visual privacy protection BibRef

Qin, C.[Chuan], Hu, J.[Jinchuan], Li, F.[Fengyong], Qian, Z.X.[Zhen-Xing], Zhang, X.P.[Xin-Peng],
JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation,
MultMed(25), 2023, pp. 2528-2542.
IEEE DOI 2307
Encryption, Transform coding, Cryptography, Discrete cosine transforms, Security, Streaming media, Histograms, RS pair permutation BibRef

Yuan, Y.[Yuan], He, H.J.[Hong-Jie], Yang, Y.L.[Yao-Ling], Mao, N.X.[Ning-Xiong], Chen, F.[Fan], Ali, M.[Muqadar],
JPEG image encryption with grouping coefficients based on entropy coding,
JVCIR(97), 2023, pp. 103975.
Elsevier DOI 2312
JPEG image encryption, Permutation encryption, Classification permutation, Modulo encryption, Undivided RSV, Coefficients group BibRef


Ting, J., Wong, K., Ong, S.,
Format-Compliant Perceptual Encryption Method for JPEG XT,
ICIP19(4559-4563)
IEEE DOI 1910
Encryption, JPEG XT, HDR, format-compliant BibRef

Maqbool, S.[Saqib], Ahmad, N.[Nisar], Muhammad, A.[Aslam], Enriquez, A.M.M.[A.M. Martinez],
Simultaneous Encryption and Compression of Digital Images Based on Secure-JPEG Encoding,
MCPR16(145-154).
Springer DOI 1608
BibRef

Hofbauer, H.[Heinz], Unterweger, A.[Andreas], Uhl, A.[Andreas],
Encrypting only AC coefficient signs considered harmful,
ICIP15(3740-3744)
IEEE DOI 1511
DCT; Encryption; coefficient signs; security BibRef

Korshunov, P.[Pavel], Ebrahimi, T.[Touradj],
Scrambling-based tool for secure protection of JPEG images,
ICIP14(3423-3425)
IEEE DOI 1502
Decoding BibRef

Pinto, M.[Michael], Puech, W.[William], Subsol, G.[Gerard],
Protection of JPEG compressed e-comics by selective encryption,
ICIP13(4588-4592)
IEEE DOI 1402
AES BibRef

Chen, B.[Brenden], Chandran, V.[Vinod],
Robust Image Hashing Using Higher Order Spectral Features,
DICTA10(100-104).
IEEE DOI 1012
robust to JPEG, etc. BibRef

Ahmed, F., Siyal, M.Y., Abbas, V.U.,
A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme,
PSIVT10(232-238).
IEEE DOI 1011
Reconstruct encryped image even after JPEG compression. BibRef

Zhu, B.B., Yang, Y.[Yang], Li, S.P.[Shi-Peng],
JPEG 2000 Syntax-Compliant Encryption Preserving Full Scalability,
ICIP05(III: 636-639).
IEEE DOI 0512
BibRef

Watanabe, O., Nakazaki, A., Kiya, H.,
A fast image-scramble method using public-key encryption allowing backward compatibility with jpeg2000,
ICIP04(V: 3435-3438).
IEEE DOI 0505
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Video Encryption, Video Cryptography, Authentication .


Last update:Apr 27, 2024 at 11:46:35