M Johnson,
P Ishwar, V Prabhakaran… - IEEE Transactions …, 2004 - ieeexplore.ieee.org
When it is desired to transmit redundant data over an insecure and bandwidth-constrained
channel, it is customary to first compress the data and then encrypt it. In this paper, we …