A survey of reversible data hiding in encrypted images–the first 12 years

P Puteaux, SY Ong, KS Wong, W Puech - Journal of Visual Communication …, 2021 - Elsevier
In the last few years, with the increasing popularity of cloud computing and the availability of
mobile smart devices as well as ubiquitous network connections, more and more users are …

Survey on JPEG compatible joint image compression and encryption algorithms

P Li, KT Lo - IET Signal Processing, 2020 - Wiley Online Library
In recent years, image encryption has been broadly researched. Since a large proportion of
images on Internet are compressed, and JPEG is the most widely adopted standards for …

A content-adaptive joint image compression and encryption scheme

P Li, KT Lo - IEEE Transactions on Multimedia, 2017 - ieeexplore.ieee.org
For joint image compression and encryption schemes, the encryption power and
compression efficiency are commonly two contradictory things. In this paper, we propose a …

[图书][B] Discrete cosine transform

H Ochoa-Dominguez, KR Rao - 2019 - taylorfrancis.com
Many new DCT-like transforms have been proposed since the first edition of this book. For
example, the integer DCT that yields integer transform coefficients, the directional DCT to …

Recompression of JPEG crypto-compressed images without a key

V Itier, P Puteaux, W Puech - … on Circuits and Systems for Video …, 2019 - ieeexplore.ieee.org
The rising popularity of social networks and cloud computing has greatly increased a
number of JPEG compressed image exchanges. In this context, the security of the …

[HTML][HTML] Recovering sign bits of DCT coefficients in digital images as an optimization problem

R Lin, S Liu, J Jiang, S Li, C Li, CCJ Kuo - Journal of Visual Communication …, 2024 - Elsevier
Recovering unknown, missing, damaged, distorted, or lost information in DCT coefficients is
a common task in multiple applications of digital image processing, including image …

A format compliant framework for HEVC selective encryption after encoding

B Tang, C Yang, Y Zhang - … on Circuits and Systems for Video …, 2022 - ieeexplore.ieee.org
The security protection of Ultra-High-Definition (UHD) video is facing grand challenges due
to changeable application scenarios. The video business is highly dependent on the video …

Energy-aware encryption for securing video transmission in internet of multimedia things

K Thiyagarajan, R Lu, K El-Sankary… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
High Efficiency Video Coding (HEVC) encryption, which has been proposed to encrypt intra
prediction modes (structural information), transform coefficients (texture information), and …

A novel selective encryption scheme for H. 264/AVC video with improved visual security

J He, Y Xu, W Luo, S Tang, J Huang - Signal Processing: Image …, 2020 - Elsevier
As cloud storage becomes more popular, concerns about data leakage have been
increasing. Encryption techniques can be used to protect privacy of videos stored in the …

A novel separable scheme for encryption and reversible data hiding

P Chen, Y Lei, K Niu, X Yang - Electronics, 2022 - mdpi.com
With the increasing emphasis on security and privacy, video in the cloud sometimes needs
to be stored and processed in an encrypted format. To facilitate the indexing and tampering …