P Li, KT Lo - IET Signal Processing, 2020 - Wiley Online Library
In recent years, image encryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for …
P Li, KT Lo - IEEE Transactions on Multimedia, 2017 - ieeexplore.ieee.org
For joint image compression and encryption schemes, the encryption power and compression efficiency are commonly two contradictory things. In this paper, we propose a …
Many new DCT-like transforms have been proposed since the first edition of this book. For example, the integer DCT that yields integer transform coefficients, the directional DCT to …
V Itier, P Puteaux, W Puech - … on Circuits and Systems for Video …, 2019 - ieeexplore.ieee.org
The rising popularity of social networks and cloud computing has greatly increased a number of JPEG compressed image exchanges. In this context, the security of the …
R Lin, S Liu, J Jiang, S Li, C Li, CCJ Kuo - Journal of Visual Communication …, 2024 - Elsevier
Recovering unknown, missing, damaged, distorted, or lost information in DCT coefficients is a common task in multiple applications of digital image processing, including image …
B Tang, C Yang, Y Zhang - … on Circuits and Systems for Video …, 2022 - ieeexplore.ieee.org
The security protection of Ultra-High-Definition (UHD) video is facing grand challenges due to changeable application scenarios. The video business is highly dependent on the video …
High Efficiency Video Coding (HEVC) encryption, which has been proposed to encrypt intra prediction modes (structural information), transform coefficients (texture information), and …
As cloud storage becomes more popular, concerns about data leakage have been increasing. Encryption techniques can be used to protect privacy of videos stored in the …
P Chen, Y Lei, K Niu, X Yang - Electronics, 2022 - mdpi.com
With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be stored and processed in an encrypted format. To facilitate the indexing and tampering …